메뉴 건너뛰기




Volumn 455, Issue , 2015, Pages 585-598

A cloud-based ehealth architecture for privacy preserving data integration

Author keywords

Access control; Interoperability; Point of care system

Indexed keywords

ACCESS CONTROL; COMPUTER ARCHITECTURE; DATA PRIVACY; HETEROGENEOUS NETWORKS; INTEROPERABILITY; MEDICAL COMPUTING; NETWORK ARCHITECTURE; PATIENT TREATMENT; SECURITY OF DATA;

EID: 84942683996     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-18467-8_39     Document Type: Conference Paper
Times cited : (30)

References (27)
  • 1
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
    • (2006) ACM Trans. Inf. Syst. Secur , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 3
    • 84902336183 scopus 로고    scopus 로고
    • How to Collect Consent for an Anonymous Medical Database
    • Benoist, E., Sliwa, J.: How to Collect Consent for an Anonymous Medical Database. HEALTHINF (2014)
    • (2014) HEALTHINF
    • Benoist, E.1    Sliwa, J.2
  • 5
    • 35048901123 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search
    • In: Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 11
    • 84905223399 scopus 로고    scopus 로고
    • Publishing data from electronic health records while preserving privacy: A survey of algorithms
    • Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: A survey of algorithms. Journal of Biomedical Informatics 50, 4–19 (2014)
    • (2014) Journal of Biomedical Informatics , vol.50 , pp. 4-19
    • Gkoulalas-Divanis, A.1    Loukides, G.2    Sun, J.3
  • 15
    • 84872006849 scopus 로고    scopus 로고
    • Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings
    • In: Jajodia, S., Zhou, J. (eds.), Springer, Heidelberg
    • Li, M., Yu, S., Ren, K., Lou, W.: Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89–106. Springer, Heidelberg (2010)
    • (2010) Securecomm 2010. LNICST, Vol. 50 , pp. 89-106
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 16
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
    • Li, M., Yu, S., Zheng, Y.: Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Tranyactions on Parallel and Distributed Systems 24(1), 131–143 (2013)
    • (2013) IEEE Tranyactions on Parallel and Distributed Systems , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3
  • 18
    • 34548557737 scopus 로고    scopus 로고
    • Multi-centric universal pseudonymisation for secondary use of the EHR
    • Lo Iacono, L.: Multi-centric universal pseudonymisation for secondary use of the EHR. Studies in Health Technology and Informatics 126, 239–247 (2007)
    • (2007) Studies in Health Technology and Informatics , vol.126 , pp. 239-247
    • Lo Iacono, L.1
  • 20
    • 84908042100 scopus 로고    scopus 로고
    • Multi-key searchable encryption
    • ePrint Archive, Report 2013/508
    • Popa, R.A., Zeldovich, N.: Multi-key searchable encryption. Cryptology ePrint Archive, Report 2013/508 (2013)
    • (2013) Cryptology
    • Popa, R.A.1    Zeldovich, N.2
  • 21
    • 84886568546 scopus 로고    scopus 로고
    • Anonymizing Data with Relational and Transaction Attributes
    • Blockeel, H., Kersting, K., Nijssen, S., Železný, F. (eds.) , Springer, Heidelberg
    • Poulis, G., Loukides, G., Gkoulalas-Divanis, A., Skiadopoulos, S.: Anonymizing Data with Relational and Transaction Attributes. In: Blockeel, H., Kersting, K., Nijssen, S., Železný, F. (eds.) ECML PKDD 2013, Part III. LNCS, vol. 8190, pp. 353–369. Springer, Heidelberg (2013)
    • (2013) ECML PKDD 2013, Part III. LNCS , vol.8190 , pp. 353-369
    • Poulis, G.1    Loukides, G.2    Gkoulalas-Divanis, A.3    Skiadopoulos, S.4
  • 26
    • 84902319993 scopus 로고    scopus 로고
    • A Decentralized Pseudonym Scheme for Cloud-based eHealth Systems
    • Xu, L., Cremers, A.B.: A Decentralized Pseudonym Scheme for Cloud-based eHealth Systems. HEALTHINF (2014)
    • (2014) HEALTHINF
    • Xu, L.1    Cremers, A.B.2
  • 27
    • 77953310709 scopus 로고    scopus 로고
    • Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    • Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: INFOCOM. IEEE (2010)
    • (2010) INFOCOM. IEEE
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.