-
1
-
-
84892583408
-
Cloud computing: opportunities and challenges
-
Sadiku M., Musa S., Momoh O. Cloud computing: opportunities and challenges. IEEE Potentials 2014, 33(1):34-36.
-
(2014)
IEEE Potentials
, vol.33
, Issue.1
, pp. 34-36
-
-
Sadiku, M.1
Musa, S.2
Momoh, O.3
-
2
-
-
84947710116
-
A systematic literature review on security and privacy of electronic health record systems: technical perspectives
-
Rezaeibagha F., Win K.T., Susilo W. A systematic literature review on security and privacy of electronic health record systems: technical perspectives. Health Inf. Manag. J. 2015, 44(3):23.
-
(2015)
Health Inf. Manag. J.
, vol.44
, Issue.3
, pp. 23
-
-
Rezaeibagha, F.1
Win, K.T.2
Susilo, W.3
-
3
-
-
84867855240
-
Secure dynamic access control scheme of PHR in cloud computing
-
Chen T.-S., Liu C.-H., Chen T.-L., Chen C.-S., Bau J.-G., Lin T.-C. Secure dynamic access control scheme of PHR in cloud computing. J. Med. Syst. 2012, 36(6):4005-4020.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 4005-4020
-
-
Chen, T.-S.1
Liu, C.-H.2
Chen, T.-L.3
Chen, C.-S.4
Bau, J.-G.5
Lin, T.-C.6
-
4
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Commun. ACM 1979, 22(11):612-613.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
5
-
-
84874415951
-
Secure sharing of electronic health records in clouds
-
Wu R., Ahn G.-J., Hu H. Secure sharing of electronic health records in clouds. CollaborateCom 2012, 711-718.
-
(2012)
CollaborateCom
, pp. 711-718
-
-
Wu, R.1
Ahn, G.-J.2
Hu, H.3
-
6
-
-
84929150464
-
Augmenting security and accountability within the eHealth Exchange
-
Ahmed M.A., Mariwan, Jaiswal T. Augmenting security and accountability within the eHealth Exchange. IBM J. Res. Dev. 2014, 58(1):1-8.
-
(2014)
IBM J. Res. Dev.
, vol.58
, Issue.1
, pp. 1-8
-
-
Ahmed, M.A.1
Mariwan, J.T.2
-
7
-
-
84869387191
-
Fusion: managing healthcare records at cloud scale
-
Basu S., Karp A.H., Li J., Pruyne J., Rolia J., Singhal S., Suermondt J., Swaminathan R. Fusion: managing healthcare records at cloud scale. IEEE Comput. 2012, 45(11):42-49.
-
(2012)
IEEE Comput.
, vol.45
, Issue.11
, pp. 42-49
-
-
Basu, S.1
Karp, A.H.2
Li, J.3
Pruyne, J.4
Rolia, J.5
Singhal, S.6
Suermondt, J.7
Swaminathan, R.8
-
8
-
-
77954015919
-
-
Georgia Institute of Technology
-
Mohan A., Bauer D., Blough D.M., Ahamad M., Bamba B., Krishnan R., Liu L., Mashima D., Palanisamy B. A Patient-Centric, Attribute-Based, Source-Verifiable Framework for Health Record Sharing, Techreport 2009, Georgia Institute of Technology.
-
(2009)
A Patient-Centric, Attribute-Based, Source-Verifiable Framework for Health Record Sharing, Techreport
-
-
Mohan, A.1
Bauer, D.2
Blough, D.M.3
Ahamad, M.4
Bamba, B.5
Krishnan, R.6
Liu, L.7
Mashima, D.8
Palanisamy, B.9
-
9
-
-
77957968012
-
Security models and requirements for healthcare application clouds
-
Zhang R., Liu L. Security models and requirements for healthcare application clouds. IEEE CLOUD 2010, 268-275.
-
(2010)
IEEE CLOUD
, pp. 268-275
-
-
Zhang, R.1
Liu, L.2
-
10
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Li M., Yu S., Zheng Y., Ren K., Lou W. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 2013, 24(1):131-143.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
11
-
-
84887316381
-
Attribute based DRM scheme with efficient revocation in cloud computing
-
Huang Q., Ma Z., Fu J., Niu X., Yang Y. Attribute based DRM scheme with efficient revocation in cloud computing. JCP 2013, 8(11):2776-2781.
-
(2013)
JCP
, vol.8
, Issue.11
, pp. 2776-2781
-
-
Huang, Q.1
Ma, Z.2
Fu, J.3
Niu, X.4
Yang, Y.5
-
12
-
-
84897913276
-
Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing
-
Dong X., Yu J., Luo Y., Chen Y., Xue G., Li M. Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Comput. Secur. 2014, 42:151-164.
-
(2014)
Comput. Secur.
, vol.42
, pp. 151-164
-
-
Dong, X.1
Yu, J.2
Luo, Y.3
Chen, Y.4
Xue, G.5
Li, M.6
-
13
-
-
84883281346
-
Improving security and efficiency in attribute-based data sharing
-
Hur J. Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 2013, 25(10):2271-2282.
-
(2013)
IEEE Trans. Knowl. Data Eng.
, vol.25
, Issue.10
, pp. 2271-2282
-
-
Hur, J.1
-
14
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
Yu S., Wang C., Ren K., Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing. INFOCOM 2010, 534-542.
-
(2010)
INFOCOM
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
15
-
-
84905094709
-
EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
-
Wei G., Lu R., Shao J. EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. J. Comput. Syst. Sci. 2014, 80(8):1549-1562.
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.8
, pp. 1549-1562
-
-
Wei, G.1
Lu, R.2
Shao, J.3
-
16
-
-
84891807562
-
Key-aggregate cryptosystem for scalable data sharing in cloud storage
-
Chu C.-K., Chow S.S.M., Tzeng W.-G., Zhou J., Deng R.H. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans. Parallel Distrib. Syst. 2014, 25(2):468-477.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 468-477
-
-
Chu, C.-K.1
Chow, S.S.M.2
Tzeng, W.-G.3
Zhou, J.4
Deng, R.H.5
-
17
-
-
77956230334
-
Cross-domain data sharing in distributed electronic health record systems
-
Sun J., Fang Y. Cross-domain data sharing in distributed electronic health record systems. IEEE Trans. Parallel Distrib. Syst. 2010, 21(6):754-764.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.6
, pp. 754-764
-
-
Sun, J.1
Fang, Y.2
-
18
-
-
84870514817
-
Empowering citizens with access control mechanisms to their personal health resources
-
Calvillo J., Román I., Roa L.M. Empowering citizens with access control mechanisms to their personal health resources. Int. J. Med. Inform. 2013, 82(1):58-72.
-
(2013)
Int. J. Med. Inform.
, vol.82
, Issue.1
, pp. 58-72
-
-
Calvillo, J.1
Román, I.2
Roa, L.M.3
-
19
-
-
39749152423
-
Web-based secure access from multiple patient repositories
-
Choe J., Yoo S.K. Web-based secure access from multiple patient repositories. Int. J. Med. Inform. 2008, 77(4):242-248.
-
(2008)
Int. J. Med. Inform.
, vol.77
, Issue.4
, pp. 242-248
-
-
Choe, J.1
Yoo, S.K.2
-
20
-
-
75949120095
-
Aspect-oriented design and implementation of adaptable access control for electronic medical records
-
Chen K., Chang Y.-C., Wang D.-W. Aspect-oriented design and implementation of adaptable access control for electronic medical records. Int. J. Med. Inform. 2010, 79(3):181-203.
-
(2010)
Int. J. Med. Inform.
, vol.79
, Issue.3
, pp. 181-203
-
-
Chen, K.1
Chang, Y.-C.2
Wang, D.-W.3
-
21
-
-
84888205419
-
The EHR-ARCHE project: Satisfying clinical information needs in a shared electronic health record system based on IHE XDS and archetypes
-
Duftschmid G., Rinner C., Kohler M., Huebner-Bloder G., Saboor S., Ammenwerth E. The EHR-ARCHE project: Satisfying clinical information needs in a shared electronic health record system based on IHE XDS and archetypes. Int. J. Med. Inform. 2013, 82(12):1195-1207.
-
(2013)
Int. J. Med. Inform.
, vol.82
, Issue.12
, pp. 1195-1207
-
-
Duftschmid, G.1
Rinner, C.2
Kohler, M.3
Huebner-Bloder, G.4
Saboor, S.5
Ammenwerth, E.6
-
22
-
-
77952362084
-
Attribute based proxy re-encryption with delegating capabilities
-
Liang X., Cao Z., Lin H., Shao J. Attribute based proxy re-encryption with delegating capabilities. Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009 2009, 276-286.
-
(2009)
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009
, pp. 276-286
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Shao, J.4
-
24
-
-
84938073542
-
Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption
-
Liu J., Huang X., Liu J.K. Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption. Future Gener. Comput. Syst. 2015, 52:67-76.
-
(2015)
Future Gener. Comput. Syst.
, vol.52
, pp. 67-76
-
-
Liu, J.1
Huang, X.2
Liu, J.K.3
-
26
-
-
84899907071
-
An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process
-
Yu Y.-C., Hou T.-W. An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process. Med. Biol. Eng. Comput. 2014, 52(5):449-457.
-
(2014)
Med. Biol. Eng. Comput.
, vol.52
, Issue.5
, pp. 449-457
-
-
Yu, Y.-C.1
Hou, T.-W.2
|