Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing
暂无分享,去创建一个
Min Chen | Kai Hwang | Long Hu | Shiwen Mao | Jing Chen | Yongfeng Qian | K. Hwang | Min Chen | Long Hu | S. Mao | Yongfeng Qian | J. Chen
[1] Jianqiang Li,et al. A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..
[2] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[3] Y.T. Zhang,et al. Wearable medical devices for tele-home healthcare , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[4] Xiaohui Liang,et al. Security and privacy for mobile healthcare networks: from a quality of protection perspective , 2015, IEEE Wireless Communications.
[5] Min Chen,et al. Smart Clothing: Connecting Human with Clouds and Big Data for Sustainable Health Monitoring , 2016, Mobile Networks and Applications.
[6] Jinjun Chen,et al. A security framework in G-Hadoop for big data computing across distributed Cloud data centres , 2014, J. Comput. Syst. Sci..
[7] Leigh Griffin,et al. Social networking healthcare , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.
[8] Ling Liu,et al. Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[9] Jing Chen,et al. Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[10] Mani Krishna,et al. SPOC : A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2012 .
[11] G. Nagarajan,et al. Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach☆ , 2015 .
[12] Kai Hwang,et al. Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[13] M KaufmanLori. Data Security in the World of Cloud Computing , 2009, S&P 2009.
[14] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[15] Piyush Jha,et al. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments , 2017 .
[16] Sarmistha Neogy,et al. A cloud security framework for a data centric WSN application , 2016, ICDCN.
[17] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[18] Randi Karlsen,et al. Privacy preserving health data processing , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).
[19] Albert Y. Zomaya,et al. Associative Big Data Sharing in Community Clouds: The MeePo Approach , 2015, IEEE Cloud Computing.
[20] Christos Grecos,et al. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications , 2014, Photonics Europe.
[21] LiMing,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[22] Jianqiang Li,et al. Emerging information technologies for enhanced healthcare , 2015, Comput. Ind..
[23] Muhammad Yousaf,et al. Neighbor Node Trust based Intrusion Detection System for WSN , 2015, EUSPN/ICTH.
[24] Melanie Swan,et al. Big Desire to Share Big Health Data: A Shift in Consumer Attitudes toward Personal Health Information , 2014, AAAI Spring Symposia.
[25] Ing-Ray Chen,et al. Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems , 2015, IEEE Transactions on Dependable and Secure Computing.
[26] Qinghua Li,et al. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing , 2014, IEEE Transactions on Dependable and Secure Computing.
[27] Wei Xiang,et al. Big video data for light-field-based 3D telemedicine , 2016, IEEE Network.
[28] Xiaohui Liang,et al. PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs , 2014, Inf. Sci..
[29] Fei Wang,et al. Supervised patient similarity measure of heterogeneous patient records , 2012, SKDD.
[30] Medromi Hicham,et al. A collaborative intrusion detection and Prevention System in Cloud Computing , 2013, 2013 Africon.
[31] M. Shamim Hossain,et al. Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring , 2016, Comput. Networks.
[32] Qing Guo,et al. Mining Cloud 3D Video Data for Interactive Video Services , 2015, Mob. Networks Appl..
[33] Benjamin Fabian,et al. Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..
[34] Haider Abbas,et al. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges , 2016, Journal of Medical Systems.
[35] Yuguang Fang,et al. Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.
[36] EMMANOUIL VASILOMANOLAKIS,et al. Taxonomy and Survey of Collaborative Intrusion Detection , 2015, ACM Comput. Surv..
[37] Javier López,et al. NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU , 2015, AsiaCCS.
[38] M. Shamim Hossain,et al. Cloud-Supported Cyber–Physical Localization Framework for Patients Monitoring , 2017, IEEE Systems Journal.
[39] Joseph K. Liu,et al. Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.
[40] Kirti A. Dongre,et al. Secure cloud storage of data , 2014, 2014 International Conference on Computer Communication and Informatics.
[41] Kurt Rohloff,et al. A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU , 2014, Financial Cryptography Workshops.
[42] Jianqiang Li,et al. A top-down approach for approximate data anonymisation , 2013, Enterp. Inf. Syst..
[43] M. Shamim Hossain,et al. Audio-Visual Emotion Recognition Using Big Data Towards 5G , 2016, Mob. Networks Appl..
[44] Yaser Jararweh,et al. Cloudlet-based Efficient Data Collection in Wireless Body Area Networks , 2015, Simul. Model. Pract. Theory.