Evaluating cloud deployment models based on security in EHR system
暂无分享,去创建一个
[1] Shadi Aljawarneh,et al. Shifted Adaption Homomorphism Encryption for Mobile and Cloud Learning , 2017, Comput. Electr. Eng..
[2] Sadie Creese,et al. Data Protection-Aware Design for Cloud Services , 2009, CloudCom.
[3] Reihaneh Safavi-Naini,et al. Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.
[4] John W. Rittinghouse,et al. Cloud Computing: Implementation, Management, and Security , 2009 .
[5] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[6] Peter Kulchyski. and , 2015 .
[7] Shadi Aljawarneh,et al. Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..
[8] Ramesh Govindan,et al. Census and survey of the visible internet , 2008, IMC '08.
[9] Shadi Aljawarneh,et al. A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.
[10] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[11] Martin Gilje Jaatun,et al. Deployment models: Towards eliminating security concerns from cloud computing , 2010, 2010 International Conference on High Performance Computing & Simulation.
[12] Ahmad-Reza Sadeghi,et al. Securing the e-health cloud , 2010, IHI.
[13] Kai Zhao,et al. Towards an Approach of Semantic Access Control for Cloud Computing , 2009, CloudCom.
[14] Jon Doyle,et al. Guardian Angel: Patient-Centered Health Information Systems , 1994 .
[15] Siani Pearson,et al. A Privacy Manager for Cloud Computing , 2009, CloudCom.
[16] L. D. Dhinesh Babu,et al. An Analysis of Security Related Issues in Cloud Computing , 2011, IC3.
[17] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[18] R. Kalaiselvi,et al. SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING , 2016 .
[19] Liang Yan,et al. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.
[20] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[21] Dennis Gannon,et al. Cloud computing architecture and application programming: DISC'09 tutorial, half day, Sept. 22nd 2009 , 2009, SIGA.
[22] David Wetherall,et al. Studying Black Holes in the Internet with Hubble , 2008, NSDI.
[23] Choi Myeonggil. The Security Risks of Cloud Computing , 2019, 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[24] Kenneth D. Mandl,et al. Indivo: a personally controlled health record for health information exchange and communication , 2007, BMC Medical Informatics Decis. Mak..
[25] Shadi Aljawarneh,et al. G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things , 2017, Future Gener. Comput. Syst..
[26] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[27] Yan Bai,et al. Design and Implementation of a Secure Healthcare Social Cloud System , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[28] Haider Abbas,et al. Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).
[29] Martin Gilje Jaatun,et al. Privacy in a Semantic Cloud: What's Trust Got to Do with It? , 2009, CloudCom.
[30] John S. Heidemann,et al. Trinocular: understanding internet reliability through adaptive probing , 2013, SIGCOMM.
[31] Krishna P. Gummadi,et al. Improving the Reliability of Internet Paths with One-hop Source Routing , 2004, OSDI.
[32] Huang Xiuli,et al. Access Control of Cloud Service Based on UCON , 2009, CLOUD-II 2009.
[33] Ítalo S. Cunha,et al. LIFEGUARD: practical repair of persistent route failures , 2012, SIGCOMM '12.
[34] Shadi Aljawarneh,et al. Cloud security engineering: Early stages of SDLC , 2017, Future Gener. Comput. Syst..
[35] Liang Zhu,et al. The Need for End-to-End Evaluation of Cloud Availability , 2014, PAM.
[36] Tadashi Dohi,et al. Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes , 2009, CloudCom.
[37] Shadi Aljawarneh,et al. A multithreaded programming approach for multimedia big data: encryption system , 2017, Multimedia Tools and Applications.