-
1
-
-
84883748519
-
AHIMA e-HIM Personal health record work group
-
Accessed 20 Aug
-
AHIMA e-HIM Personal Health Record Work Group, "myPHR" http://www. myphr. com/, Accessed 20 Aug 2011
-
(2011)
MyPHR
-
-
-
2
-
-
84855537810
-
-
Microsoft Corporation Accessed 22 Aug
-
Microsoft Corporation, "HealthVault" http://www. microsoft. com/enus/ healthvault/, Accessed 22 Aug 2011
-
(2011)
HealthVault
-
-
-
3
-
-
20144362635
-
Defining the personal health record
-
AHIMAe-HIM Personal Health Record Work Group
-
AHIMAe-HIM Personal Health Record Work Group, "Defining the personal health record", J AHIMA 76(6):24-25, 2005
-
(2005)
J AHIMA
, vol.76
, Issue.6
, pp. 24-25
-
-
-
4
-
-
66149190570
-
What it takes: Characteristics of the ideal personal health record
-
Mar.
-
J. S. Kahn, V. Aulakh, and A. Bosworth. "What it takes: characteristics of the ideal personal health record", Health Aff, 28:369-376, Mar. 2009
-
(2009)
Health Aff
, vol.28
, pp. 369-376
-
-
Kahn, J.S.1
Aulakh, V.2
Bosworth, A.3
-
5
-
-
67650951127
-
Online data storage using implicit security
-
September
-
A. Parakh and S. Kak, "Online data storage using implicit security", Information Sciences, vol. 179, issue 19, pp. 3323-3333, September 2009
-
(2009)
Information Sciences
, vol.179
, Issue.19
, pp. 3323-3333
-
-
Parakh, A.1
Kak, S.2
-
6
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
J. Benaloh, M. Chase, E. Horvitz, K. Lauter, "Patient controlled encryption: ensuring privacy of electronic medical records", In: CCSW 2009: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 103-114, 2009
-
(2009)
CCSW 2009: Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
7
-
-
84872006849
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
M. Li, S. Yu, K. Ren, W. Lou, "Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings", Security and Privacy in Communication Networks, 50: p. 89-106, 2010
-
(2010)
Security and Privacy in Communication Networks
, vol.50
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
8
-
-
84867855240
-
Secure dynamic access control scheme of phr in cloud computing
-
T. S. Chen, C. H. Liu, T. L. Chen, C. S. Chen, J. G. Bau, and T. C. Lin, "Secure Dynamic access control scheme of PHR in cloud computing", Journal of Medical Systems, vol. 36, no. 6, pp. 4005-4020, 2012
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.6
, pp. 4005-4020
-
-
Chen, T.S.1
Liu, C.H.2
Chen, T.L.3
Chen, C.S.4
Bau, J.G.5
Lin, T.C.6
-
9
-
-
79960241719
-
A business model for cloud computing based on a separate encryption and decryption service
-
J. J. Hwang, K. K. Chuang, Y. C. Hsu, C. H. Wu, "A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service", ICISA-International Conference on Information Science and Applications, 2011
-
(2011)
ICISA-International Conference on Information Science and Applications
-
-
Hwang, J.J.1
Chuang, K.K.2
Hsu, Y.C.3
Wu, C.H.4
-
11
-
-
0028513932
-
Access control: Principle and practice
-
RS Sandhu, P Samarati, "Access control: principle and practice", IEEE Commun Mag 32(9):40-48, 1994
-
(1994)
IEEE Commun Mag
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
12
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Over-encryption: management of access control evolution on outsourced data", In: VLDB 2007, pp. 123-134, 2007
-
(2007)
VLDB 2007
, pp. 123-134
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
13
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data. :, In: CCS 2006, pp. 89-98, 2006
-
(2006)
CCS 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
15
-
-
50249137692
-
Shared and searchable encrypted data for untrusted servers
-
C. Dong, G. Russello, N. Dulay, "Shared and searchable encrypted data for untrusted servers", In: DBSec 2008, pp. 127-143, 2008
-
(2008)
DBSec 2008
, pp. 127-143
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
16
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag LNCS
-
A. Shamir, "Identity-based cryptosystems and signature schemes", In Advances in Cryptology-Crypto '84, Springer-Verlag LNCS 196, 47-53, 1984
-
(1984)
Advances in Cryptology-Crypto '84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
78149248764
-
Protocols for secret key agreement by public discussion based on common information
-
Ueli M. Maurer, "Protocols for Secret Key Agreement by Public Discussion Based on Common Information", CRYPTO 1992: 461-470
-
(1992)
CRYPTO
, pp. 461-470
-
-
Maurer, U.M.1
|