메뉴 건너뛰기




Volumn , Issue , 2013, Pages 17-23

A fuzzy modeling approach for risk-based access control in eHealth cloud

Author keywords

access control; cloud computing; eHealth; fuzzy modeling; risk; security

Indexed keywords

CLOUD APPLICATIONS; CLOUD ENVIRONMENTS; DIFFERENT RISK FACTORS; EHEALTH; FUZZY MODELING; HEALTH CARE APPLICATION; INFORMATION ACCESS; SECURITY;

EID: 84893460788     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2013.66     Document Type: Conference Paper
Times cited : (33)

References (30)
  • 1
    • 78650131963 scopus 로고    scopus 로고
    • Risk assessment is fuzzy business-fuzzy logic provides the way to assess off-site risk from industrial installations
    • N. D. Mahant, "Risk Assessment is Fuzzy Business-Fuzzy Logic Provides the Way to Assess Off-site Risk from Industrial Installations", Risk 2004, No. 206.
    • (2004) Risk , Issue.206
    • Mahant, N.D.1
  • 2
    • 0033904306 scopus 로고    scopus 로고
    • Cognitive fuzzy modeling for enhanced risk assessment in health care institution
    • March/ April
    • E. Smith and J. Eloff, "Cognitive Fuzzy Modeling for Enhanced Risk Assessment in Health Care Institution", IEEE Intelligent Systems and Their Applications. March/ April 2000, pp.69-75.
    • (2000) IEEE Intelligent Systems and Their Applications , pp. 69-75
    • Smith, E.1    Eloff, J.2
  • 5
    • 78651293524 scopus 로고    scopus 로고
    • Feasibility of an ehealth service to support collaborative depression care: Results of a pilot study
    • M. Meglic and et.al, "Feasibility of an eHealth Service to Support Collaborative Depression Care: Results of a Pilot Study", Journal of Medical Internet Research, Dec. 2010; 12(5):e63.
    • (2010) Journal of Medical Internet Research, Dec. , vol.12 , Issue.5
    • Meglic, M.1
  • 8
    • 34447565099 scopus 로고    scopus 로고
    • Application of a fuzzy based decision making methodology to construction project risk assessment
    • Zeng, J., M. An, and N. J. Smith., "Application of a Fuzzy Based Decision Making Methodology to Construction Project Risk Assessment", International Journal of Project Management 25 (6): 589-600, 2007.
    • (2007) International Journal of Project Management , vol.25 , Issue.6 , pp. 589-600
    • Zeng, J.1    An, M.2    Smith, N.J.3
  • 9
    • 84857178198 scopus 로고    scopus 로고
    • Espac: Enabling security and patient-centric access control for ehealth in cloud computing
    • M. Barua, X.Liang, R. Lu, and X.Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing", International Journal of Security and Networks, 6 (2), pp. 67-76 (2011).
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2 , pp. 67-76
    • Barua, M.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 11
    • 85016097744 scopus 로고    scopus 로고
    • E-health cloud: Opportunities and challenges
    • N. Mohamed, E. AbuKhousa, J. Al-Jaroodi, "e-Health Cloud: Opportunities and Challenges", Future Internet, Vol. 4(3), 2011, pp.621-645.
    • (2011) Future Internet , vol.4 , Issue.3 , pp. 621-645
    • Mohamed, N.1    Abukhousa, E.2    Al-Jaroodi, J.3
  • 12
    • 79955991024 scopus 로고    scopus 로고
    • Quantified risk-adaptive access control for patient privacy protection in health information systems
    • Hong Kong, China, Mar.
    • Q. Wang and H. Jin "Quantified Risk-Adaptive Access Control for Patient Privacy Protection in Health Information Systems", the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, Mar. 2011.
    • (2011) The 6th ACM Symposium on Information, Computer and Communications Security
    • Wang, Q.1    Jin, H.2
  • 13
  • 15
    • 84893457088 scopus 로고    scopus 로고
    • Health Level Seven International: http://www.hl7.org/
  • 17
    • 74049110390 scopus 로고    scopus 로고
    • Patient controlled encryption: Ensuring privacy of electronic medical records
    • J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient controlled encryption: ensuring privacy of electronic medical records," in CCSW '09, 2009, pp. 103-114.
    • (2009) CCSW '09 , pp. 103-114
    • Benaloh, J.1    Chase, M.2    Horvitz, E.3    Lauter, K.4
  • 19
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in CCS '06, 2006, pp. 89-98.
    • (2006) CCS '06 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 21
    • 84870706931 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
    • Li M., Logan Yu S., Zheng Y., Ren K., and Lou W. Scalable and secure sharing of personal health records in cloud computing using attributebased encryption. Parallel and Distributed Systems, 2012, Issue: 99:1.
    • (2012) Parallel and Distributed Systems , Issue.99 , pp. 1
    • Li, M.1    Logan Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 23
    • 84857178198 scopus 로고    scopus 로고
    • Espac: Enabling security and patientcentric access control for ehealth in cloud computing
    • November 2011
    • Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, and Xuemin Shen. 2011. ESPAC: Enabling Security and Patientcentric Access Control for eHealth in cloud computing. Int. J. Secur. Netw. 6, 2/3 (November 2011), 67-76.
    • (2011) Int. J. Secur. Netw. , vol.6 , Issue.2-3 , pp. 67-76
    • Barua, M.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 28
    • 84861100364 scopus 로고    scopus 로고
    • Dynamic risk-based decision methods for access control systems
    • R. A. Shaikh, K. Adi, and L Logrippo,"Dynamic Risk-based Decision Methods for Access Control Systems", Computers & Security, vol. 31, Nr. 4 (2012), pp. 447-464.
    • (2012) Computers & Security , vol.31 , Issue.4 , pp. 447-464
    • Shaikh, R.A.1    Adi, K.2    Logrippo, L.3
  • 29
    • 79955991024 scopus 로고    scopus 로고
    • Quantified risk-adaptive access control for patient privacy protection in health information systems
    • Hong Kong, China, Mar.
    • Q. Wang and H. Jin "Quantified Risk-Adaptive Access Control for Patient Privacy Protection in Health Information Systems", the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, Mar. 2011.
    • (2011) The 6th ACM Symposium on Information, Computer and Communications Security
    • Wang, Q.1    Jin, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.