메뉴 건너뛰기




Volumn , Issue , 2013, Pages 647-652

SPS: Secure personal health information sharing with patient-centric access control in cloud computing

Author keywords

cloud; efficient audit; eHealth; Patientcentric access control; privacy; security

Indexed keywords

CLOUD STORAGE; CRYPTOGRAPHY; DATA PRIVACY; EHEALTH; INFORMATION DISSEMINATION;

EID: 84904116666     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2013.6831145     Document Type: Conference Paper
Times cited : (24)

References (15)
  • 1
    • 79959287901 scopus 로고    scopus 로고
    • Secure and quality of service assurance scheduling scheme for wban with application to ehealth
    • Cancun, Quintana-Roo, Mexico, March
    • M. Barua, M. S. Alam, X. Liang, and X. Shen, "Secure and quality of service assurance scheduling scheme for wban with application to ehealth," in Wireless Communications and Networking Conference (WCNC), 2011 IEEE, Cancun, Quintana-Roo, Mexico, March 2011, pp. 1-5.
    • (2011) Wireless Communications and Networking Conference (WCNC), 2011 IEEE , pp. 1-5
    • Barua, M.1    Alam, M.S.2    Liang, X.3    Shen, X.4
  • 3
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • San Diego, CA, USA, march
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in INFOCOM, 2010 Proceedings IEEE, San Diego, CA, USA, march 2010, pp. 1-9.
    • (2010) INFOCOM, 2010 Proceedings IEEE , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 4
    • 70350418277 scopus 로고    scopus 로고
    • Data hemorrhages in the health-care sector
    • R. Dingledine and P. Golle, Eds. Springer Berlin / Heidelberg
    • M. Johnson, "Data hemorrhages in the health-care sector," in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, R. Dingledine and P. Golle, Eds., vol. 5628. Springer Berlin / Heidelberg, 2009, pp. 71-89.
    • (2009) Financial Cryptography and Data Security, Ser. Lecture Notes in Computer Science , vol.5628 , pp. 71-89
    • Johnson, M.1
  • 6
    • 84857178198 scopus 로고    scopus 로고
    • ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing
    • Nov
    • M. Barua, X. Liang, R. Lu, and X. Shen, "ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing," International Journal of Security and Networks, vol. 6, no. 2/3, pp. 67-76, Nov 2011.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.2-3 , pp. 67-76
    • Barua, M.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 7
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
    • M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, 2013.
    • (2013) IEEE Transactions on Parallel and Distributed Systems , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 8
    • 79957585981 scopus 로고    scopus 로고
    • Attribute-based access control with efficient revocation in data outsourcing systems
    • J. Hur and D. K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, 2011.
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.7 , pp. 1214-1221
    • Hur, J.1    Noh, D.K.2
  • 9
    • 84863392301 scopus 로고    scopus 로고
    • Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
    • Z. Wan, J. Liu, and R.-H. Deng, "Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743-754, 2012.
    • (2012) IEEE Transactions on Information Forensics and Security , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.-H.3
  • 11
    • 79959305027 scopus 로고    scopus 로고
    • Patient self-controllable access policy on phi in ehealthcare systems
    • Kitchener, Ontario, Canada
    • X. Liang, R. Lu, X. Lin, and X. Shen, "Patient self-controllable access policy on phi in ehealthcare systems," in AHIC 2010, Kitchener, Ontario, Canada, 2010, pp. 1-5.
    • (2010) AHIC 2010 , pp. 1-5
    • Liang, X.1    Lu, R.2    Lin, X.3    Shen, X.4
  • 14
    • 67349253018 scopus 로고    scopus 로고
    • Sage: A strong privacypreserving scheme against global eavesdropping for ehealth systems
    • May
    • X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "Sage: a strong privacypreserving scheme against global eavesdropping for ehealth systems," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 365-378, May 2009.
    • (2009) IEEE Journal on Selected Areas in Communications , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1    Lu, R.2    Shen, X.3    Nemoto, Y.4    Kato, N.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.