Privacy Preserving Index for Encrypted Electronic Medical Records
暂无分享,去创建一个
[1] Ray Jones,et al. Using Metrics to Describe the Participative Stances of Members Within Discussion Forums , 2011, Journal of medical Internet research.
[2] Jeroen Doumen,et al. Experiments with Queries over Encrypted Data Using Secret Sharing , 2005, Secure Data Management.
[3] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[4] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[5] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[6] N. Archer,et al. A Comparison of Physician Pre-Adoption and Adoption Views on Electronic Health Records in Canadian Medical Practices , 2011, Journal of medical Internet research.
[7] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[8] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[9] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] Dong Hoon Lee,et al. On a security model of conjunctive keyword search over encrypted relational database , 2011, J. Syst. Softw..
[11] N. Terry,et al. The Emergence of National Electronic Health Record Architectures in the United States and Australia: Models, Costs, and Questions , 2005, Journal of medical Internet research.
[12] Chun-I Fan,et al. Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[13] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[14] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[15] Judith A. Effken,et al. Development and initial evaluation of the Clinical Information Systems Success Model (CISSM) , 2013, Int. J. Medical Informatics.
[16] Bo Zhang,et al. An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..
[17] Kihyun Kim,et al. Public Key Encryption with Conjunctive Field Keyword Search , 2004, WISA.
[18] Dong Hoon Lee,et al. Efficient Conjunctive Keyword Search on Encrypted Data Storage System , 2006, EuroPKI.
[19] Dong Hoon Lee,et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..
[20] Eric Horvitz,et al. Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.
[21] Ik Rae Jeong,et al. Analysis of Some Keyword Search Schemes in Encrypted Data , 2008, IEEE Communications Letters.
[22] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[23] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[24] Kenji Araki,et al. Design and Development of EMR Supporting Medical Process Management , 2012, Journal of Medical Systems.