Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records

[1]  Francesco Schiavone,et al.  The effect of digital technologies adoption in healthcare industry: a case based analysis , 2018, Bus. Process. Manag. J..

[2]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[3]  Xianyi Zeng,et al.  An interpretable knowledge-based decision support system and its applications in pregnancy diagnosis , 2021, Knowl. Based Syst..

[4]  Sheng Huang,et al.  Decentralized data access control over consortium blockchains , 2020, Inf. Syst..

[5]  Ganesh Chandra Deka,et al.  The Revolution of Blockchain: State-of-the-Art and Research Challenges , 2020, Archives of Computational Methods in Engineering.

[6]  Jie Wu,et al.  Dynamic access policy in cloud-based personal health record (PHR) systems , 2017, Inf. Sci..

[7]  Jie Ling,et al.  Secure and fine-grained access control on e-healthcare records in mobile cloud computing , 2018, Future Gener. Comput. Syst..

[8]  Ravi S. Sandhu,et al.  The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.

[9]  I. Indu,et al.  Hybrid authentication and authorization model for web based applications , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[10]  Ratna Dutta,et al.  Efficient attribute-based signature and signcryption realizing expressive access structures , 2015, International Journal of Information Security.

[11]  Xinyi Huang,et al.  Supporting dynamic updates in storage clouds with the Akl-Taylor scheme , 2017, Information Sciences.

[12]  Qiang Ye,et al.  A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks , 2019, Inf. Fusion.

[13]  Mazhar Ali,et al.  SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud , 2021, IEEE Transactions on Cloud Computing.

[14]  Javier Del Ser,et al.  Online heart monitoring systems on the internet of health things environments: A survey, a reference model and an outlook , 2020, Inf. Fusion.

[15]  Jian-Guo Bau,et al.  Secure Dynamic Access Control Scheme of PHR in Cloud Computing , 2012, Journal of Medical Systems.

[17]  Yi Mu,et al.  Distributed clinical data sharing via dynamic access-control policy transformation , 2016, Int. J. Medical Informatics.

[18]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[19]  Yang Ming,et al.  Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System , 2018, Sensors.

[20]  Roberto Di Pietro,et al.  A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks , 2020, IEEE Transactions on Dependable and Secure Computing.

[21]  D. A. Quadling Lagrange’s Interpolation Formula , 1966 .

[22]  Alptekin Küpçü,et al.  Research issues for privacy and security of electronic health services , 2017, Future Gener. Comput. Syst..

[23]  Victor I. Chang,et al.  Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..

[24]  Zhiming Luo,et al.  Joint imbalanced classification and feature selection for hospital readmissions , 2020, Knowl. Based Syst..

[25]  Jin Tong,et al.  Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).

[26]  Shehzad Khalid,et al.  Security and privacy based access control model for internet of connected vehicles , 2019, Future Gener. Comput. Syst..

[27]  Xiaohui Liang,et al.  Attribute based proxy re-encryption with delegating capabilities , 2009, ASIACCS '09.

[28]  Kevin Curran,et al.  A multimodal smartphone sensor system for behaviour measurement and health status inference , 2020, Inf. Fusion.

[29]  D. Richard Kuhn,et al.  Adding Attributes to Role-Based Access Control , 2010, Computer.