-
1
-
-
84896476722
-
-
U.S. Department of Health & Human Service [Online]. Available
-
U.S. Department of Health & Human Service, "Breaches Affecting 500 or More Individuals," (2001). [Online]. Available: http://www.hhs.gov/ ocr/privacy/hipaa/administrative/breachnotificationr ule/breachtool.html
-
(2001)
Breaches Affecting 500 or More Individuals
-
-
-
2
-
-
34047136102
-
The need for technical solutions for maintaining the privacy of EHR
-
DOI 10.1109/IEMBS.2006.260862, 4030464, 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS'06
-
P. Ray and J.Wimalasiri, "The need for technical solutions formaintaining the privacy of EHR," in Proc. IEEE 28th Annu. Int. Conf., New York City, NY, USA, Sep. 2006, pp. 4686-4689. (Pubitemid 46520959)
-
(2006)
Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings
, pp. 4686-4689
-
-
Ray, P.1
Wimalasiri, J.2
-
3
-
-
27144464694
-
A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care
-
Prague, Czech Republic
-
M. C. Mont, P. Bramhall, and K. Harrison, "A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care," presented at the 14th Int. Workshop Database Expert Syst. Appl., Prague, Czech Republic, 2003.
-
(2003)
14th Int. Workshop Database Expert Syst. Appl.
-
-
Mont, M.C.1
Bramhall, P.2
Harrison, K.3
-
4
-
-
35248819132
-
Medical information privacy assurance: Cryptographic and system aspects
-
Amalfi, Italy Sep.
-
G. Ateniese, R. Curtmola, B. de Medeiros, and D. Davis, "Medical information privacy assurance: Cryptographic and system aspects," presented at the 3rd Conf. Security Commun. Netw., Amalfi, Italy, Sep. 2002.
-
(2002)
3rd Conf. Security Commun. Netw.
-
-
Ateniese, G.1
Curtmola, R.2
De Medeiros, B.3
Davis, D.4
-
5
-
-
0242456746
-
A role-based delegation framework for healthcare information systems
-
Monterey, CA, USA
-
L. Zhang, G. J. Ahn, and B. T. Chu, "A role-based delegation framework for healthcare information systems," in 7th ACM Symp. Access Control Models Technol., Monterey, CA, USA, 2002, pp. 125-134.
-
(2002)
7th ACM Symp. Access Control Models Technol.
, pp. 125-134
-
-
Zhang, L.1
Ahn, G.J.2
Chu, B.T.3
-
6
-
-
3042684910
-
A rule-based framework for rolebased delegation and revocation
-
L. Zhang, G. J. Ahn, and B. T. Chu, "A rule-based framework for rolebased delegation and revocation," ACM Trans. Inf. Syst. Security, vol. 6, no. 3, pp. 404-441, 2003.
-
(2003)
ACM Trans. Inf. Syst. Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.J.2
Chu, B.T.3
-
7
-
-
0037623983
-
Identity-based encryption from the Weil pairing. Extended abstract in CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing. Extended abstract in CRYPTO 2001," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
77955229114
-
An identity-based security system for user privacy in vehicular ad hoc networks
-
Sep.
-
J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An identity-based security system for user privacy in vehicular ad hoc networks," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 9, pp. 1227-1239, Sep. 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.9
, pp. 1227-1239
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
9
-
-
79551632924
-
Preserving privacy in emergency response based on wireless body sensor networks
-
Dec.
-
J. Sun, X. Zhu, and Y. Fang, "Preserving privacy in emergency response based on wireless body sensor networks," in Proc. IEEE Global Telecommun. Conf., Dec. 2010, pp. 1-6.
-
(2010)
Proc. IEEE Global Telecommun. Conf.
, pp. 1-6
-
-
Sun, J.1
Zhu, X.2
Fang, Y.3
-
10
-
-
77649172678
-
Privacy and emergency response in ehealthcare leveraging wireless body sensor networks
-
Feb.
-
J. Sun, X. Zhu, and Y. Fang, "Privacy and emergency response in ehealthcare leveraging wireless body sensor networks," IEEE Wireless Commun., vol. 17, no. 1, pp. 66-73, Feb. 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.1
, pp. 66-73
-
-
Sun, J.1
Zhu, X.2
Fang, Y.3
-
11
-
-
80051864290
-
HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare
-
Jun.
-
J. Sun, X. Zhu, C. Zhang, andY. Fang, "HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare," in Proc. IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2011, pp. 373-382.
-
(2011)
Proc. IEEE Int. Conf. Distrib. Comput. Syst.
, pp. 373-382
-
-
Sun, J.1
Zhu, X.2
Zhang, C.3
Fang, Y.4
-
12
-
-
84866889971
-
PAAS: Privacy-preserving attribute-based authentication system for eHealth networks
-
Jun.
-
L. Guo, C. Zhang, J. Sun, and Y. Fang, "PAAS: Privacy-preserving attribute-based authentication system for eHealth networks," in Proc. IEEE Intl. Conf. Distrib. Comput. Syst., Jun. 2012, pp. 224-233.
-
(2012)
Proc. IEEE Intl. Conf. Distrib. Comput. Syst.
, pp. 224-233
-
-
Guo, L.1
Zhang, C.2
Sun, J.3
Fang, Y.4
-
13
-
-
84893584610
-
Security and privacy for mobile healthcare (m-Health) systems
-
S. Das, K. Kant, and N. Zhang, Eds. Amsterdam, The Netherlands: Elsevier
-
J. Sun, X. Zhu, C. Zhang, and Y. Fang, Security and Privacy for Mobile Healthcare (m-Health) Systems, in Handbook on Securing Cyber-Physical Infrastructure, S. Das, K. Kant, and N. Zhang, Eds. Amsterdam, The Netherlands: Elsevier, 2011.
-
(2011)
Handbook on Securing Cyber-Physical Infrastructure
-
-
Sun, J.1
Zhu, X.2
Zhang, C.3
Fang, Y.4
-
15
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," presented at the ACM Conf. Comput. Commun. Security, Alexandria, VA, USA, 2006.
-
(2006)
ACM Conf. Comput. Commun. Security, Alexandria, VA, USA
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
16
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
Y. C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in Proc. 3rd Int. Conf. Appl. Cryptogr. Netw. Security, 2005, pp. 442-455. (Pubitemid 41422132)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
17
-
-
0033705124
-
Practical techniques for searching on encrypted data
-
D. Song, D.Wagner, and A. Perrig, "Practical techniques for searching on encrypted data," in Proc. IEEE Symp. Security Privacy, 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Security Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
18
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs," J. ACM, vol. 43, pp. 431-473, 1996. (Pubitemid 126607640)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
19
-
-
0025154732
-
Efficient computation on oblivious RAMs
-
R. Ostrovsky, "Efficient computation on oblivious RAMs," in Proc. ACM Symp. Theory Comput., 1990, pp. 514-523.
-
(1990)
Proc. ACM Symp. Theory Comput.
, pp. 514-523
-
-
Ostrovsky, R.1
-
20
-
-
84861636543
-
Achieving usable and privacyassured similarity search over outsourced cloud data
-
Mar.
-
C. Wang, K. Ren, S. Yu, and K. Urs, "Achieving usable and privacyassured similarity search over outsourced cloud data," in Proc. IEEE Conf. Comput. Commun., Mar. 2012, pp. 451-459.
-
(2012)
Proc. IEEE Conf. Comput. Commun.
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Urs, K.4
-
21
-
-
80051914330
-
Privacy-preserving query over encrypted graph-structured data in cloud computing
-
Jun.
-
N. Cao, Z. Yang, C.Wang, K. Ren, andW. Lou, "Privacy-preserving query over encrypted graph-structured data in cloud computing," in Proc. IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2011, pp. 393-402.
-
(2011)
Proc. IEEE Int. Conf. Distrib. Comput. Syst.
, pp. 393-402
-
-
Cao, N.1
Yang, Z.2
Wang, C.3
Ren, K.4
Lou, W.5
-
22
-
-
79959305027
-
Patient self-controllable access policy on PHI in ehealthcare systems
-
Apr.
-
X. Liang, R. Lu, X. Lin, and X. S. Shen, "Patient self-controllable access policy on PHI in ehealthcare systems," Adv. Health Inform. Conf., pp. 1-5, Apr. 2010.
-
(2010)
Adv. Health Inform. Conf.
, pp. 1-5
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.S.4
-
24
-
-
0032218229
-
A security architecture for computational grids
-
San Francisco, CA, USA
-
I. Foster, C.Kesselman,G. Tsudik, and S. Tuecke, "A security architecture for computational grids," in Proc. ACMConf. Comput. Commun. Security, San Francisco, CA, USA, 1998, pp. 83-92.
-
(1998)
Proc. ACMConf. Comput. Commun. Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
25
-
-
79956315983
-
PEC:Aprivacy-preserving emergency call scheme formobile healthcare social networks
-
X. Liang, R. Lu, L.Chen, X. Lin, andX. Shen, "PEC:Aprivacy- preserving emergency call scheme formobile healthcare social networks" J. Commun. Netw., vol. 13, no. 2, pp. 102-112, 2011.
-
(2011)
J. Commun. Netw.
, vol.13
, Issue.2
, pp. 102-112
-
-
Liang, X.1
Lu, R.2
Chen, L.3
Lin, X.4
Shen, X.5
-
26
-
-
84896454729
-
A privacy-preserving attribute-based authentication system for mobile health networks
-
L. Guo, C. Zhang, J. Sun, and Y. Fang, "A privacy-preserving attribute-based authentication system for mobile health networks," IEEE Trans. Mobile Comput., vol. PP, no. 99, pp. 1-1, 2013.
-
(2013)
IEEE Trans. Mobile Comput.
, vol.PP
, Issue.99
, pp. 1-1
-
-
Guo, L.1
Zhang, C.2
Sun, J.3
Fang, Y.4
-
27
-
-
39449106296
-
A cryptographic key management solution for HIPAA privacy/security regulations
-
DOI 10.1109/TITB.2007.906101
-
W.-B. Lee and C.-D. Lee, "A cryptographic key management solution for HIPAA privacy/security regulations," IEEE Trans. Inf. Technol. Biomed., vol. 12, no. 1, pp. 34-41, Jan. 2008. (Pubitemid 351266641)
-
(2008)
IEEE Transactions on Information Technology in Biomedicine
, vol.12
, Issue.1
, pp. 34-41
-
-
Lee, W.-B.1
Lee, C.-D.2
-
28
-
-
56749165131
-
Body sensor network security: An identity-based cryptography approach
-
Apr.
-
C. C. Tan, H.Wang, S. Zhong, and Q. Li, "Body sensor network security: An identity-based cryptography approach," in Proc. ACM Conf. Wireless Netw. Security, Apr. 2008, pp. 148-153.
-
(2008)
Proc. ACM Conf. Wireless Netw. Security
, pp. 148-153
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
29
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronicmedical records
-
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient controlled encryption: Ensuring privacy of electronicmedical records," in Proc. ACM Workshop Cloud Comput. Security, 2009, pp. 103-114.
-
(2009)
Proc. ACM Workshop Cloud Comput. Security
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
30
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Jan.
-
M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
31
-
-
84891807562
-
Keyaggregate cryptosystem for scalable data sharing in cloud storage
-
PrePrints Available
-
C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, "Keyaggregate cryptosystem for scalable data sharing in cloud storage," IEEE Trans. Parallel Distrib. Syst., vol. 99, no. PrePrints, p. 1, 2013. Available: http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.112
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.99
, pp. 1
-
-
Chu, C.-K.1
Chow, S.S.M.2
Tzeng, W.-G.3
Zhou, J.4
Deng, R.H.5
-
32
-
-
74049163235
-
Improving privacy and security in multiauthority attribute-based encryption
-
M. Chase and S. S. M. Chow, "Improving privacy and security in multiauthority attribute-based encryption," in Proc. ACM Conf. Comput. Commun. Security, 2009, pp. 121-130.
-
(2009)
Proc. ACM Conf. Comput. Commun. Security
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.M.2
-
33
-
-
79956053735
-
New privacy-preserving architectures for identity-/attribute-based encryption
-
Ph.D. dissertation New York University, New York, NY, USA
-
S. S. M. Chow, "New privacy-preserving architectures for identity-/attribute-based encryption" Ph.D. dissertation, Courant Inst. Math. Sci., New York University, New York, NY, USA, 2010.
-
(2010)
Courant Inst. Math. Sci.
-
-
Chow, S.S.M.1
-
34
-
-
84863469103
-
SPICE-Simple privacy-preserving identity-management for cloud environment
-
S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, "SPICE-Simple privacy-preserving identity-management for cloud environment," in Proc. 10th Int. Conf. Appl. Cryptography Netw. Security, 2012, pp. 526-543.
-
(2012)
Proc. 10th Int. Conf. Appl. Cryptography Netw. Security
, pp. 526-543
-
-
Chow, S.S.M.1
He, Y.J.2
Hui, L.C.K.3
Yiu, S.-M.4
-
35
-
-
84863238100
-
Dynamic secure cloud storage with provenance
-
Berlin, Germany, Springer-Verlag
-
S. S. M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R. H. Deng, "Dynamic secure cloud storage with provenance," in Cryptography and Security, Berlin, Germany, Springer-Verlag, 2012, pp. 442-464.
-
(2012)
Cryptography and Security
, pp. 442-464
-
-
Chow, S.S.M.1
Chu, C.-K.2
Huang, X.3
Zhou, J.4
Deng, R.H.5
-
36
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
37
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attributed-based encryption for fine-grained access control of encrypted data," in Proc. ACMConf. Comput. Commun. Security, 2006, pp. 89-98. (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
38
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
San Diego, CA, USA, Mar.
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," presented at the IEEE Conf. Comput. Commun., San Diego, CA, USA, Mar. 2010.
-
(2010)
IEEE Conf. Comput. Commun.
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
39
-
-
70350244874
-
CAP: A context-aware privacy protection system for location-based services
-
A. Pingley,W. Yu, N. Zhang, X. Fu, andW. Zhao, "CAP: A context-aware privacy protection system for location-based services," in Proc. IEEE Int. Conf. Distrib. Comput. Syst., 2009, pp. 49-57.
-
(2009)
Proc. IEEE Int. Conf. Distrib. Comput. Syst.
, pp. 49-57
-
-
Pingley, A.1
Yu, W.2
Zhang, N.3
Fu, X.4
Zhao, W.5
-
40
-
-
67650394655
-
Location cloaking for safety protection of ad hoc networks
-
T. Xu and Y. Cai, "Location cloaking for safety protection of ad hoc networks," in Proc. IEEE Conf. Comput. Commun., 2009, pp. 1944-1952.
-
(2009)
Proc. IEEE Conf. Comput. Commun.
, pp. 1944-1952
-
-
Xu, T.1
Cai, Y.2
-
41
-
-
84860406821
-
Searchable symmetric encryption: Review and evaluation
-
Y. Earn, R. Alsaqour, M. Abdelhaq, and T. Abdullah, "Searchable symmetric encryption: Review and evaluation," J. Theoret. Appl. Inf. Technol., vol. 30, no. 1, pp. 48-54, 2011.
-
(2011)
J. Theoret. Appl. Inf. Technol.
, vol.30
, Issue.1
, pp. 48-54
-
-
Earn, Y.1
Alsaqour, R.2
Abdelhaq, M.3
Abdullah, T.4
|