Protection of electronic health records (EHRs) in cloud
暂无分享,去创建一个
[1] S.Charanyaa,et al. Certain Investigations on Securing MovingData Objects , 2014 .
[2] K. Sangeetha,et al. Term Frequency Based Sequence Generation Algorithm for Graph Based Data Anonymization , 2014 .
[3] Carmelo Pino,et al. A Survey of Cloud Computing Architecture and Applications in Health , 2013 .
[4] S. Balamurugan,et al. Certain Investigations on Strategies for Protecting Medical Data in Cloud , 2014 .
[5] Pieter Van Gorp,et al. Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud , 2014, IEEE Journal of Biomedical and Health Informatics.
[6] R R Frerichs,et al. Introduction of a microcomputer for health research in a developing country--the Bangladesh experience. , 1985, Public health reports.
[7] T. Shanmugapriya,et al. Certain Investigations on Approaches for Protecting Graph Privacy in Data Anonymization , 2013 .
[8] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..
[9] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[10] Selim G. Akl,et al. Adaptive Cryptographic Access Control , 2010, Advances in Information Security.
[11] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[12] David W. Bates,et al. Viewpoint Paper: A Research Agenda for Personal Health Records (PHRs) , 2008, J. Am. Medical Informatics Assoc..
[13] S. Charanyaa,et al. Privacy Preserving Personal Health Care Data in Cloud , 2014 .
[14] Chin-Chen Chang,et al. A new key assignment scheme for enforcing complicated access control policies in hierarchy , 2003, Future Gener. Comput. Syst..
[15] K. Sangeetha,et al. Proposing a Novel Synergized K-Degree L-Diversity T-Closeness Model for Graph Based Data Anonymization , 2014 .
[16] Pekka Ruotsalainen. A cross-platform model for secure Electronic Health Record communication , 2004, Int. J. Medical Informatics.
[17] Alison Richardson,et al. Does the patient‐held record improve continuity and related outcomes in cancer care: a systematic review , 2007, Health expectations : an international journal of public participation in health care and health policy.
[18] Wendy L. Currie,et al. Conflicting institutional logics: a national programme for IT in the organisational field of healthcare , 2007, J. Inf. Technol..
[19] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[20] G. Mini,et al. Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud , 2014 .
[21] Kalaignar Karunanidhi,et al. Modified Partitioning Algorithm for Privacy Preservation in Microdata Publishing with Full Functional Dependencies , 2013 .