期刊文献+

Securing Patient-Centric Personal Health Records Sharing System in Cloud Computing

Securing Patient-Centric Personal Health Records Sharing System in Cloud Computing
下载PDF
导出
出处 《China Communications》 SCIE CSCD 2014年第A01期121-127,共7页 中国通信(英文版)
基金 the National Natural Science Foundation of China under contract NO 61271235 and No.60973146,and the Fundamental Research Funds for the Central Universities under Grant No.BUPT2013RC0308
关键词 共享系统 健康档案 患者 保护 计算 密钥管理 属性集 个人健康 personal health records attribute- based encryption data privacy fine-grained access control
  • 相关文献

参考文献18

  • 1Boldyreva A, Goyal V, Kumar V. Identity- based encryption with efficient revocation[C]// Proceedings of the 15th ACM conference on Computer and communications security. ACM, 2008:417-426.
  • 2Ibraimi L, Petkovic M, Nikova S, et al. Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes[J]. Univeristy of Twente, Tech. Rep, 2009.
  • 3Yu S, Wang C, Ren K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C]//INFOCOM, 2010 Proceedings IEEE.IEEE, 2010: 1-9.
  • 4Yu S, Wang C, Ren K, et al. Attribute based data sharing with attribute revocation[C]// Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010:261-270.
  • 5Narayan S, Gagn6 M, Safavi-Naini R. Privacy preserving EHR system using attribute-based infrastructure[C]//Proceedings of the 2010 ACM workshop on Cloud computing security workshop. ACM, 2010: 47-52.
  • 6Liang X, Lu R, Lin X, et al. Patient self- controllable access policy on phi in e health care systems[J]. AHIC 2010, 1-5.
  • 7Ibraimi L, Asim M, Petkovic M. Secure management of persona/ health records by applying attribute-based encryption[C]// Wearable Micro and Nano Technologies for Personalized Health (pHealth), 6th International Workshop on. IEEE, 2009: 71-74.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext- policy attribute-based encryption[C]//Security and Privacy, SP'07. IEEE Symposium on. IEEE, 2007: 321-334.
  • 9Li M, Yu S, Ren K, et al. Securing personal health records in cloud computing: Patient- centric and fine-grained data access control in multi-owner settings[M]//Security and Privacy in Communication Networks. Springer Berlin Heidelberg, 2010: 89-106.
  • 10M. Chase and S.S. Chow, Improving Privacy and Security in Multi-Authority Attribute- Based Encryption[C]//Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), pp. 121-130, 2009.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部