-
1
-
-
79959287901
-
Secure and quality of service assurance scheduling scheme for wban with application to ehealth
-
Cancun, Quintana-Roo, Mexico, March
-
M. Barua, M. S. Alam, X. Liang, and X. Shen, "Secure and quality of service assurance scheduling scheme for wban with application to ehealth," in Wireless Communications and Networking Conference (WCNC), 2011 IEEE, Cancun, Quintana-Roo, Mexico, March 2011, pp. 1-5.
-
(2011)
Wireless Communications and Networking Conference (WCNC), 2011 IEEE
, pp. 1-5
-
-
Barua, M.1
Alam, M.S.2
Liang, X.3
Shen, X.4
-
2
-
-
77956137294
-
Cryptographic cloud storage
-
Berlin, Heidelberg: Springer-Verlag
-
S. Kamara and K. Lauter, "Cryptographic cloud storage," in Proceedings of the 14th international conference on Financial cryptograpy and data security, ser. FC'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 136-149. [Online]. Available: http://portal. acm. org/citation. cfm?id= 1894863. 1894876
-
(2010)
Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, Ser. FC'10
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
3
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
San Diego, CA, USA, march
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in INFOCOM, 2010 Proceedings IEEE, San Diego, CA, USA, march 2010, pp. 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
4
-
-
70350418277
-
Data hemorrhages in the health-care sector
-
R. Dingledine and P. Golle, Eds. Springer Berlin / Heidelberg
-
M. Johnson, "Data hemorrhages in the health-care sector," in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, R. Dingledine and P. Golle, Eds., vol. 5628. Springer Berlin / Heidelberg, 2009, pp. 71-89.
-
(2009)
Financial Cryptography and Data Security, Ser. Lecture Notes in Computer Science
, vol.5628
, pp. 71-89
-
-
Johnson, M.1
-
5
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
Washington, DC, USA, May
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Security and Privacy, 2007. SP '07. IEEE Symposium on, Washington, DC, USA, May 2007, pp. 321-334.
-
(2007)
Security and Privacy, 2007. SP '07. IEEE Symposium on
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
6
-
-
84857178198
-
ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing
-
Nov
-
M. Barua, X. Liang, R. Lu, and X. Shen, "ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing," International Journal of Security and Networks, vol. 6, no. 2/3, pp. 67-76, Nov 2011.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 67-76
-
-
Barua, M.1
Liang, X.2
Lu, R.3
Shen, X.4
-
7
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, 2013.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
8
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems
-
J. Hur and D. K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.1
Noh, D.K.2
-
9
-
-
84863392301
-
Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
-
Z. Wan, J. Liu, and R.-H. Deng, "Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743-754, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.-H.3
-
10
-
-
84891585164
-
-
Wiley-IEEE Press
-
P. K. Sinha, G. Sunder, P. Bendale, M. Mantri, and A. Dande, Electronic Health Record: Standards, Coding Systems, Frameworks, and Infrastructures. Wiley-IEEE Press, 2012.
-
(2012)
Electronic Health Record: Standards, Coding Systems, Frameworks, and Infrastructures
-
-
Sinha, P.K.1
Sunder, G.2
Bendale, P.3
Mantri, M.4
Dande, A.5
-
11
-
-
79959305027
-
Patient self-controllable access policy on phi in ehealthcare systems
-
Kitchener, Ontario, Canada
-
X. Liang, R. Lu, X. Lin, and X. Shen, "Patient self-controllable access policy on phi in ehealthcare systems," in AHIC 2010, Kitchener, Ontario, Canada, 2010, pp. 1-5.
-
(2010)
AHIC 2010
, pp. 1-5
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.4
-
12
-
-
78249245445
-
Efficient sharing of secure cloud storage services
-
Los Alamitos, CA, USA, july
-
Q. Liu, G. Wang, and J. Wu, "Efficient sharing of secure cloud storage services," in IEEE 10th International Conference on Computer and Information Technology (CIT), Los Alamitos, CA, USA, july 2010, pp. 922-929.
-
(2010)
IEEE 10th International Conference on Computer and Information Technology (CIT)
, pp. 922-929
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
13
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
New York, NY, USA: ACM
-
G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proceedings of the 17th ACM conference on Computer and communications security, ser. CCS '10. New York, NY, USA: ACM, 2010, pp. 735-737.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, Ser. CCS '10
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
14
-
-
67349253018
-
Sage: A strong privacypreserving scheme against global eavesdropping for ehealth systems
-
May
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "Sage: a strong privacypreserving scheme against global eavesdropping for ehealth systems," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 365-378, May 2009.
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
|