Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme
暂无分享,去创建一个
Xuemin Shen | Ju Ren | Yaoxue Zhang | Deyu Zhang | Kuan Zhang | Wenjuan Tang | Xuemin Shen | Kuan Zhang | Yaoxue Zhang | Ju Ren | Wenjuan Tang | Deyu Zhang
[1] Shaobo Zhang,et al. A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services , 2019, Future Gener. Comput. Syst..
[2] Lei Yang,et al. Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[3] Scott D. Stoller,et al. Mining Attribute-Based Access Control Policies , 2013, IEEE Transactions on Dependable and Secure Computing.
[4] Yuval Elovici,et al. Cyber Security and the Role of Intelligent Systems in Addressing its Challenges , 2017, ACM Trans. Intell. Syst. Technol..
[5] Shengli Xie,et al. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.
[6] Ju Ren,et al. Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing , 2017, IEEE Network.
[7] Woei-Jiunn Tsaur,et al. Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control , 2017, ACM Trans. Intell. Syst. Technol..
[8] Xiaodong Lin,et al. FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System , 2016, AsiaCCS.
[9] Pan Li,et al. Towards auditable cloud-assisted access of encrypted health data , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[10] Ju Ren,et al. Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features , 2019, IEEE Transactions on Mobile Computing.
[11] Jian Shen,et al. Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[12] Jianfeng Ma,et al. Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification , 2016, IEEE Journal of Biomedical and Health Informatics.
[13] Jie Ling,et al. Secure and fine-grained access control on e-healthcare records in mobile cloud computing , 2018, Future Gener. Comput. Syst..
[14] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[15] Weixin Xie,et al. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[16] Yang Xu,et al. A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.
[17] Meikang Qiu,et al. Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data , 2017, IEEE Systems Journal.
[18] Jianqiang Li,et al. A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..
[19] Xiaohui Liang,et al. Security and privacy for mobile healthcare networks: from a quality of protection perspective , 2015, IEEE Wireless Communications.
[20] Robert H. Deng,et al. Hybrid privacy-preserving clinical decision support system in fog-cloud computing , 2018, Future Gener. Comput. Syst..
[21] Xiaohui Liang,et al. Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage , 2018, IEEE Transactions on Dependable and Secure Computing.
[22] Hao Wu,et al. Evaluation of data quality of multisite electronic health record data for secondary analysis , 2015, 2015 IEEE International Conference on Big Data (Big Data).
[23] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[24] Keqin Li,et al. A query privacy-enhanced and secure search scheme over encrypted data in cloud computing , 2017, J. Comput. Syst. Sci..
[25] Adi Shamir,et al. How to share a secret , 1979, CACM.
[26] Robert H. Deng,et al. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[27] Carmen C. Y. Poon,et al. Attenuation of Systolic Blood Pressure and Pulse Transit Time Hysteresis During Exercise and Recovery in Cardiovascular Patients , 2014, IEEE Transactions on Biomedical Engineering.
[28] Jie Wang,et al. Distributed Analytics and Edge Intelligence: Pervasive Health Monitoring at the Era of Fog Computing , 2015, Mobidata@MobiHoc.
[29] W. Liu,et al. Big Data as an e-Health Service , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[30] Dan Dobre,et al. Hybris: Robust Hybrid Cloud Storage , 2014, SoCC.
[31] Tooska Dargahi,et al. On the Feasibility of Attribute-Based Encryption on Smartphone Devices , 2015, IoT-Sys@MobiSys.
[32] Mingzhe Jiang,et al. Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..
[33] Jianqing Zhang,et al. Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).
[34] Ju Ren,et al. Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision , 2019, IEEE Communications Magazine.
[35] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[36] Edith C. H. Ngai,et al. Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context , 2017, 2017 Global Internet of Things Summit (GIoTS).
[37] Ju Ren,et al. DPPro: Differentially Private High-Dimensional Data Release via Random Projection , 2017, IEEE Transactions on Information Forensics and Security.
[38] Philipp Neuhaus,et al. Portal of medical data models: information infrastructure for medical research and healthcare , 2016, Database J. Biol. Databases Curation.
[39] Min Chen,et al. Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing , 2020, IEEE Transactions on Cloud Computing.
[40] Zhen Liu,et al. Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.
[41] Ju Ren,et al. BOAT: A Block-Streaming App Execution Scheme for Lightweight IoT Devices , 2018, IEEE Internet of Things Journal.
[42] Xiaohui Liang,et al. Poster: Balancing disclosure and utility of personal information , 2014, MobiSys.
[43] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[44] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.