Analysis of Time Bound Collaborative Access Control Delegation Model in Electronic Health Records
暂无分享,去创建一个
[1] May D. Wang,et al. –Omic and Electronic Health Record Big Data Analytics for Precision Medicine , 2017, IEEE Transactions on Biomedical Engineering.
[2] Deepti Mehrotra,et al. Proposing hierarchy-similarity based access control framework: A multilevel Electronic Health Record data sharing approach for interoperable environment , 2017, J. King Saud Univ. Comput. Inf. Sci..
[3] Jimeng Sun,et al. Publishing data from electronic health records while preserving privacy: A survey of algorithms , 2014, J. Biomed. Informatics.
[4] Ling Liu,et al. Role-based and time-bound access and management of EHR data , 2014, Secur. Commun. Networks.
[5] Cheng-Chi Lee,et al. A New Public Key Encryption with Conjunctive Field Keyword Search Scheme , 2014, Inf. Technol. Control..
[6] Weiran Liu,et al. Anonymous Role-Based Access Control on E-Health Records , 2016, IACR Cryptol. ePrint Arch..
[7] Renato Iannella,et al. Privacy oriented access control for electronic health records , 2012, WWW 2012.
[8] Zahir Tari,et al. Hybrid Cryptographic Access Control for Cloud-Based EHR Systems , 2016, IEEE Cloud Computing.
[9] G. Hema,et al. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re Encryption Function for E-Health Clouds , 2018 .
[10] Lifeng Guo,et al. Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage , 2015, Journal of Medical Systems.
[11] Hua Zhang,et al. An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings , 2012, 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content.
[12] James R. Cordy,et al. Authentication and Access Control in e-Health Systems in the Cloud , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).