메뉴 건너뛰기




Volumn , Issue , 2013, Pages

A trusted and efficient cloud computing service with personal health record

Author keywords

identity based cryptography; personal health records; separated cloud computing service

Indexed keywords

CLOUD COMPUTING SERVICES; CLOUD SERVICES; IDENTITY BASED CRYPTOGRAPHY; PERSONAL HEALTH RECORD; SECURITY AND PRIVACY PROTECTION; SYMMETRIC KEY CRYPTOGRAPHY;

EID: 84883806079     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICISA.2013.6579425     Document Type: Conference Paper
Times cited : (7)

References (19)
  • 1
    • 84883748519 scopus 로고    scopus 로고
    • AHIMA e-HIM Personal health record work group
    • Accessed 20 Aug
    • AHIMA e-HIM Personal Health Record Work Group, "myPHR" http://www. myphr. com/, Accessed 20 Aug 2011
    • (2011) MyPHR
  • 2
    • 84855537810 scopus 로고    scopus 로고
    • Microsoft Corporation Accessed 22 Aug
    • Microsoft Corporation, "HealthVault" http://www. microsoft. com/enus/ healthvault/, Accessed 22 Aug 2011
    • (2011) HealthVault
  • 3
    • 20144362635 scopus 로고    scopus 로고
    • Defining the personal health record
    • AHIMAe-HIM Personal Health Record Work Group
    • AHIMAe-HIM Personal Health Record Work Group, "Defining the personal health record", J AHIMA 76(6):24-25, 2005
    • (2005) J AHIMA , vol.76 , Issue.6 , pp. 24-25
  • 4
    • 66149190570 scopus 로고    scopus 로고
    • What it takes: Characteristics of the ideal personal health record
    • Mar.
    • J. S. Kahn, V. Aulakh, and A. Bosworth. "What it takes: characteristics of the ideal personal health record", Health Aff, 28:369-376, Mar. 2009
    • (2009) Health Aff , vol.28 , pp. 369-376
    • Kahn, J.S.1    Aulakh, V.2    Bosworth, A.3
  • 5
    • 67650951127 scopus 로고    scopus 로고
    • Online data storage using implicit security
    • September
    • A. Parakh and S. Kak, "Online data storage using implicit security", Information Sciences, vol. 179, issue 19, pp. 3323-3333, September 2009
    • (2009) Information Sciences , vol.179 , Issue.19 , pp. 3323-3333
    • Parakh, A.1    Kak, S.2
  • 7
    • 84872006849 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
    • M. Li, S. Yu, K. Ren, W. Lou, "Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings", Security and Privacy in Communication Networks, 50: p. 89-106, 2010
    • (2010) Security and Privacy in Communication Networks , vol.50 , pp. 89-106
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 11
    • 0028513932 scopus 로고
    • Access control: Principle and practice
    • RS Sandhu, P Samarati, "Access control: principle and practice", IEEE Commun Mag 32(9):40-48, 1994
    • (1994) IEEE Commun Mag , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 13
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data. :, In: CCS 2006, pp. 89-98, 2006
    • (2006) CCS 2006 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 15
    • 50249137692 scopus 로고    scopus 로고
    • Shared and searchable encrypted data for untrusted servers
    • C. Dong, G. Russello, N. Dulay, "Shared and searchable encrypted data for untrusted servers", In: DBSec 2008, pp. 127-143, 2008
    • (2008) DBSec 2008 , pp. 127-143
    • Dong, C.1    Russello, G.2    Dulay, N.3
  • 16
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag LNCS
    • A. Shamir, "Identity-based cryptosystems and signature schemes", In Advances in Cryptology-Crypto '84, Springer-Verlag LNCS 196, 47-53, 1984
    • (1984) Advances in Cryptology-Crypto '84 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 17
    • 78149248764 scopus 로고
    • Protocols for secret key agreement by public discussion based on common information
    • Ueli M. Maurer, "Protocols for Secret Key Agreement by Public Discussion Based on Common Information", CRYPTO 1992: 461-470
    • (1992) CRYPTO , pp. 461-470
    • Maurer, U.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.