-
1
-
-
80053504222
-
Opportunities and challenges of cloud computing to improve health care services
-
A. Mu-Hsing Kuo Opportunities and challenges of cloud computing to improve health care services J. Med. Internet Res. 2011
-
(2011)
J. Med. Internet Res.
-
-
Mu-Hsing Kuo, A.1
-
3
-
-
23844446475
-
Structuring information and incentives to improve health
-
S. Stansfield Structuring information and incentives to improve health Bull. World Health Org. 83 8 2005 562
-
(2005)
Bull. World Health Org.
, vol.83
, Issue.8
, pp. 562
-
-
Stansfield, S.1
-
4
-
-
84874109278
-
Towards enabling cyberinfrastructure as a service in clouds
-
L. Wang, D. Chen, Y. Hu, Y. Ma, and J. Wang Towards enabling cyberinfrastructure as a service in clouds Comput. Electr. Eng. 39 1 2013 3 14
-
(2013)
Comput. Electr. Eng.
, vol.39
, Issue.1
, pp. 3-14
-
-
Wang, L.1
Chen, D.2
Hu, Y.3
Ma, Y.4
Wang, J.5
-
5
-
-
77954879049
-
Cloud computing: A perspective study
-
L. Wang, G. Laszewski, A.J. Younge, X. He, M. Kunze, J. Tao, and C. Fu Cloud computing: a perspective study New Gener. Comput. 28 2 2010 137 146
-
(2010)
New Gener. Comput.
, vol.28
, Issue.2
, pp. 137-146
-
-
Wang, L.1
Laszewski, G.2
Younge, A.J.3
He, X.4
Kunze, M.5
Tao, J.6
Fu, C.7
-
6
-
-
70349309706
-
Data security in the world of cloud computing
-
L.M. Kaufman Data security in the world of cloud computing IEEE Secur. Priv. 7 4 2009 61 64
-
(2009)
IEEE Secur. Priv.
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
8
-
-
84897913831
-
A security framework in G-Hadoop for big data computing across distributed cloud data centres
-
J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kolodziej, A. Streit, and D. Georgakopoulos A security framework in G-Hadoop for big data computing across distributed cloud data centres J. Comput. Syst. Sci. 80 5 2014 994 1007
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.5
, pp. 994-1007
-
-
Zhao, J.1
Wang, L.2
Tao, J.3
Chen, J.4
Sun, W.5
Ranjan, R.6
Kolodziej, J.7
Streit, A.8
Georgakopoulos, D.9
-
10
-
-
0013628534
-
Communicating health information in an insecure world
-
R. Bakker, B. Barber, R. Tervo-Pellikka, A.T reacher, (Eds.), Communicating health information in an insecure world, in: Proceedings of the Helsinki Working Conference. 43:1, 1995. 2.
-
(1995)
Proceedings of the Helsinki Working Conference
, vol.43
, Issue.1
, pp. 2
-
-
Bakker, R.1
Barber, B.2
Tervo-Pellikka, R.3
Reacher, A.T.4
-
11
-
-
84911448635
-
-
Durham
-
B. Barber, D. Garwood, P. Skerman, Security in Hospital Information Systems, Security and Data Protection programme presented at the IMIA WH10 Working Conference, Durham, 1994.
-
(1994)
Security in Hospital Information Systems, Security and Data Protection Programme Presented at the IMIA WH10 Working Conference
-
-
Barber, B.1
Garwood, D.2
Skerman, P.3
-
12
-
-
84878197970
-
Security and privacy in electronic health records: A systematic literature review
-
J.L. Fernández-Alemán, I.C. Señor, P.Á. Lozoya, and A. Toval Security and privacy in electronic health records: a systematic literature review J Biomed. Inf. 46 3 2013 541 562
-
(2013)
J Biomed. Inf.
, vol.46
, Issue.3
, pp. 541-562
-
-
Fernández-Alemán, J.L.1
Señor, I.C.2
Lozoya P.Á.3
Toval, A.4
-
16
-
-
77955210831
-
Privacy-aware role-based access control
-
Q. Ni, E. Bertino, C. Brodie, C.M. Karat, J. Karat, J. Lobo, and A. Trombetta Privacy-aware role-based access control ACM Trans. Inf. Syst. Secur. (TISSEC) 13 3 2010 35 43
-
(2010)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.13
, Issue.3
, pp. 35-43
-
-
Ni, Q.1
Bertino, E.2
Brodie, C.3
Karat, C.M.4
Karat, J.5
Lobo, J.6
Trombetta, A.7
-
17
-
-
84992227458
-
Proposed standard for role-based access control
-
D.F. Ferraiolo, and R. Sanhu Proposed standard for role-based access control ACM Trans. Inf. Syst. Secur. 4 3 2000 224 274
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sanhu, R.2
-
18
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu, and E.J. Coyne Role-based access control models IEEE Comput. 29 2 1996 38 47
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
-
21
-
-
30144433198
-
Privacy enforcement with an extended role-based access control model
-
North Carolina State University
-
Q. He, 2003,Privacy enforcement with an extended role-based access control model. Tech. rep. TR-2003-09, Department of Computer Science, North Carolina State University.
-
(2003)
Tech. Rep. TR-2003-09, Department of Computer Science
-
-
He, Q.1
-
28
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang, M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, in: Proc. of ACNS, 2005.
-
(2005)
Proc. of ACNS
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
29
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J.A. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in: Proc. of ACM CCS, 2006.
-
(2006)
Proc. of ACM CCS
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
30
-
-
17444370055
-
Public key encryption with keyword search
-
D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Proc. of EUROCRYPT, 2004.
-
(2004)
Proc. of EUROCRYPT
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
31
-
-
77958078259
-
Public key encryption that allows pir queries
-
D. Boneh, E. Kushilevitz, R. Ostrovsky, W. Skeith, Public key encryption that allows pir queries, in: Proc. of CRYPTO, 2007.
-
(2007)
Proc. of CRYPTO
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith, W.4
-
34
-
-
84911424659
-
-
IACR Cryptology ePrint Archive
-
C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang, J. Chen, MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud, IACR Cryptology ePrint Archive 2014, 391.
-
(2014)
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
, pp. 391
-
-
Liu, C.1
Ranjan, R.2
Yang, C.3
Zhang, X.4
Wang, L.5
Chen, J.6
-
38
-
-
33244455692
-
Simulatable auditing
-
June
-
K. Kenthapadi, N. Mishra, K. Nissim, Simulatable auditing, in: Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, June 2005, pp. 118-127.
-
(2005)
Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 118-127
-
-
Kenthapadi, K.1
Mishra, N.2
Nissim, K.3
-
39
-
-
70349305273
-
Differential privacy: A survey of results
-
M. Agrawal, D.-Z. Du, Z. Duan, A. Li, 5th International Conference, TAMC 2008, Xi'an, China, April 25-29, 2008. Proceedings Lecture Notes in Computer Science Springer
-
C. Dwork Differential privacy: a survey of results M. Agrawal, D.-Z. Du, Z. Duan, A. Li, Theory and Applications of Models of Computation 5th International Conference, TAMC 2008, Xi'an, China, April 25-29, 2008. Proceedings Lecture Notes in Computer Science vol. 4978 2008 Springer 1 19
-
(2008)
Theory and Applications of Models of Computation
, vol.4978 VOL.
, pp. 1-19
-
-
Dwork, C.1
-
40
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
June
-
A. Evfimievski, J. Gehrke, R. Srikant, Limiting privacy breaches in privacy preserving data mining, in: Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, June 2003, pp. 211-222.
-
(2003)
Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
42
-
-
43949118608
-
Caroline Fontaine and Fabien Galand, a survey of homomorphic encryption for nonspecialists
-
Caroline Fontaine and Fabien Galand, a survey of homomorphic encryption for nonspecialists, EURASIP J. Inf. Sec. (2007).
-
(2007)
EURASIP J. Inf. Sec.
-
-
-
45
-
-
34547239322
-
Achieving efficient conjunctive keyword searches over encrypted data
-
L. Ballard, S. Kamara, F. Monrose, Achieving efficient conjunctive keyword searches over encrypted data, in: Proc. of ICICS, 2005.
-
(2005)
Proc. of ICICS
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
46
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, in: Proc. of TCC, 2007, pp. 535-554.
-
(2007)
Proc. of TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
47
-
-
80052378201
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y. Hwang, P. Lee, Public key encryption with conjunctive keyword search and its extension to a multi-user system, in: Pairing, 2007.
-
(2007)
Pairing
-
-
Hwang, Y.1
Lee, P.2
-
48
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, W. Lou, Secure ranked keyword search over encrypted cloud data, in: Proc. of ICDCS'10, 2010.
-
(2010)
Proc. of ICDCS'10
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
49
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou Privacy-preserving multi-keyword ranked search over encrypted cloud data INFOCOM 2011 829 837
-
(2011)
INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
50
-
-
33947621113
-
Securing electronic health records without impeding the flow of information
-
R. Agrawal, and C. Johnson Securing electronic health records without impeding the flow of information Int. J. Med. Inf. 76 5-6 2007 471 479
-
(2007)
Int. J. Med. Inf.
, vol.76
, Issue.56
, pp. 471-479
-
-
Agrawal, R.1
Johnson, C.2
-
51
-
-
77955514675
-
Strategies for health data exchange for secondary, cross-institutional clinical research
-
B.S. Elger, J. Iavindrasana, L. Lo Iacono, H. Müller, N. Roduit, and P. Summers Strategies for health data exchange for secondary, cross-institutional clinical research Comput. Methods Programs Biomed. 99 3 2010 230 251
-
(2010)
Comput. Methods Programs Biomed.
, vol.99
, Issue.3
, pp. 230-251
-
-
Elger, B.S.1
Iavindrasana, J.2
Lo Iacono, L.3
Müller, H.4
Roduit, N.5
Summers, P.6
-
52
-
-
78449288160
-
Access control for smarter healthcare using policy spaces
-
C.A. Ardagna, S.D.C. di Vimercati, S. Foresti, T. Grandison, S. Jajodia, and P. Samarati Access control for smarter healthcare using policy spaces Comput. Secur. 29 8 2010 848 858
-
(2010)
Comput. Secur.
, vol.29
, Issue.8
, pp. 848-858
-
-
Ardagna, C.A.1
Di Vimercati, S.D.C.2
Foresti, S.3
Grandison, T.4
Jajodia, S.5
Samarati, P.6
-
53
-
-
78650160589
-
Using digital rights management for securing data in a medical research environment
-
M. Jafari, R. Safavi-Naini, C. Saunders, N.P. Sheppard, Using digital rights management for securing data in a medical research environment, in: Proc. Digital Rights Management Workshop, 2010, pp. 55-60.
-
(2010)
Proc. Digital Rights Management Workshop
, pp. 55-60
-
-
Jafari, M.1
Safavi-Naini, R.2
Saunders, C.3
Sheppard, N.P.4
-
54
-
-
33747622542
-
Personal health record systems and their security protection
-
K.T. Win, W. Susilo, and Y. Mu Personal health record systems and their security protection J. Med. Syst. 30 4 2006 309 315
-
(2006)
J. Med. Syst.
, vol.30
, Issue.4
, pp. 309-315
-
-
Win, K.T.1
Susilo, W.2
Mu, Y.3
-
55
-
-
78650118369
-
Privacy preserving EHR system using attribute-based infrastructure
-
S. Narayan, M. Gagné, R. Safavi-Naini, Privacy preserving EHR system using attribute-based infrastructure, in: Proc. ACM Workshop on Cloud Computing Security, 2010, pp. 47-52.
-
(2010)
Proc. ACM Workshop on Cloud Computing Security
, pp. 47-52
-
-
Narayan, S.1
-
56
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
J. Benaloh, M. Chase, E. Horvitz, K. Lauter, Patient controlled encryption: ensuring privacy of electronic medical records, in: Proc ACM Workshop on Cloud Computing Security, 2009, pp. 103-114.
-
(2009)
Proc ACM Workshop on Cloud Computing Security
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
57
-
-
78751704723
-
Medical record search engines, using pseudonymised patient identity: An alternative to centralised medical records
-
C. Quantin, D.O. Jaquet-Chiffelle, G. Coatrieux, E. Benzenine, and F.A. Allaert Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records Int. J. Med. Inf. 80 2 2011 e6 e11
-
(2011)
Int. J. Med. Inf.
, vol.80
, Issue.2
, pp. 6-e11
-
-
Quantin, C.1
Jaquet-Chiffelle, D.O.2
Coatrieux, G.3
Benzenine, E.4
Allaert, F.A.5
-
58
-
-
79951680016
-
Patient-centric authorization framework for electronic healthcare services
-
J. Jin, G.J. Ahn, H. Hu, M.J. Covington, and X. Zhang Patient-centric authorization framework for electronic healthcare services Comput. Secur. 30 2-3 2011 116 127
-
(2011)
Comput. Secur.
, vol.30
, Issue.23
, pp. 116-127
-
-
Jin, J.1
Ahn, G.J.2
Hu, H.3
Covington, M.J.4
Zhang, X.5
-
59
-
-
77955333989
-
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
-
J. Hu, H.H. Chen, and T.W. Hou A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations Comput. Stand. Interfaces 32 5-6 2010 274 280
-
(2010)
Comput. Stand. Interfaces
, vol.32
, Issue.56
, pp. 274-280
-
-
Hu, J.1
Chen, H.H.2
Hou, T.W.3
-
64
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
N. Li, T. Li, and S. Venkatasubramanian T-closeness: privacy beyond k-anonymity and l-diversity ICDE 2007 106 115
-
(2007)
ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
66
-
-
79960900327
-
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
-
Z. Hao, S. Zhong, and N. Yu A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability IEEE Trans. Knowl. Data Eng. 23 9 2011 1432 1437
-
(2011)
IEEE Trans. Knowl. Data Eng.
, vol.23
, Issue.9
, pp. 1432-1437
-
-
Hao, Z.1
Zhong, S.2
Yu, N.3
-
67
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM Alexandria, Virginia, USA Oct, Nov
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song Provable data possession at untrusted stores CCS07 2007 ACM Alexandria, Virginia, USA 598 610 Oct, Nov
-
(2007)
CCS07
, pp. 598-610
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
69
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions J. Cryptol. 21 3 2008 350 391
-
(2008)
J. Cryptol.
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
70
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, B. Waters, Secure conjunctive keyword search over encrypted data, in: Proc. of ACNS, 2004, pp. 31-45.
-
(2004)
Proc. of ACNS
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
72
-
-
85000158371
-
-
S.E. Robertson, S. Walker, M. Hancock-Beaulieu, A. Gull, M. Lau, Okapi at TREC. Text Retrieval Conference, 1992.
-
(1992)
Text Retrieval Conference
-
-
Robertson, S.E.1
Walker, S.2
Hancock-Beaulieu, M.3
Gull, A.4
Lau, M.5
At Trec, O.6
-
73
-
-
33749582207
-
Utility-based anonymization using local recoding
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, A. Fu, Utility-based anonymization using local recoding, in: Proc. of SIGKDD, 2006, pp. 785-790.
-
(2006)
Proc. of SIGKDD
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.6
-
74
-
-
84988315609
-
Fast data anonymization with low information loss
-
G. Ghinita, P. Karras, P. Kalnis, N. Mamoulis, Fast data anonymization with low information loss, in: Proc. of VLDB, 2007, pp. 758-769.
-
(2007)
Proc. of VLDB
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
|