Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks
暂无分享,去创建一个
Yacine Challal | Abdelmadjid Bouabdallah | Abdelkrim Hadjidj | Ahmed Lounis | A. Bouabdallah | Y. Challal | Abdelkrim Hadjidj | A. Lounis
[1] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.
[2] Wouter Joosen,et al. Extending sensor networks into the Cloud using Amazon Web Services , 2010, 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications.
[3] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[4] Ruoshui Liu,et al. Opportunities and challenges of wireless sensor networks using cloud services , 2011, IoTSP '11.
[5] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[6] Milan Petkovic,et al. Secure management of personal health records by applying attribute-based encryption , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.
[7] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[8] Jorge Werner,et al. A Cloud Computing Solution for Patient's Data Collection in Health Care Institutions , 2010, 2010 Second International Conference on eHealth, Telemedicine, and Social Medicine.
[9] Eric Horvitz,et al. Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.
[10] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[11] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[12] Biao Song,et al. A framework of sensor-cloud integration opportunities and challenges , 2009, ICUIMC '09.
[13] Xiaohui Liang,et al. ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.
[14] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[15] Young-Koo Lee,et al. Context-aware Human Activity Recognition and decision making , 2010, The 12th IEEE International Conference on e-Health Networking, Applications and Services.
[16] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[17] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[18] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] W. Kurschl,et al. Combining cloud computing and wireless sensor networks , 2009, iiWAS.
[20] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[21] R. S. Ponmagal,et al. Integration of Wireless Sensor Network with Cloud , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[22] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.