Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing
暂无分享,去创建一个
[1] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[2] Rajkumar Buyya,et al. Mastering Cloud Computing: Foundations and Applications Programming , 2013 .
[3] Keke Chen,et al. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation , 2012, IEEE Transactions on Knowledge and Data Engineering.
[4] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[5] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[6] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Li Liu,et al. The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[8] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[9] S. Vidya,et al. Secured Personal Health Records Transactions Using Homomorphic Encryption In Cloud Computing , 2012 .
[10] Philip S. Yu,et al. A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.
[11] Ling Liu,et al. A Random Rotation Perturbation Approach to Privacy Preserving Data Classification , 2005 .
[12] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[13] Keke Chen,et al. Under Consideration for Publication in Knowledge and Information Systems Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining , 2010 .
[14] Philip S. Yu,et al. A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.
[15] Keke Chen,et al. Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation , 2009, IEEE Transactions on Parallel and Distributed Systems.
[16] Gerrit Tamm,et al. Risks and Crises for Healthcare Providers: The Impact of Cloud Computing , 2014, TheScientificWorldJournal.
[17] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[18] S. Balasubramaniam,et al. A Survey on Data Retrieval Techniques in Cloud Computing , 2013 .
[19] Milan Petkovic,et al. Secure management of personal health records by applying attribute-based encryption , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.
[20] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[21] R. Badlishah Ahmad,et al. Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers , 2008 .
[22] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[23] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[24] Naranker Dulay,et al. Shared and Searchable Encrypted Data for Untrusted Servers , 2008, DBSec.
[25] Ik Rae Jeong,et al. Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage , 2014, J. Appl. Math..
[26] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[27] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[28] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[29] Li Liu,et al. The applicability of the perturbation based privacy preserving data mining for real-world data , 2008, Data Knowl. Eng..
[30] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[31] Eric Horvitz,et al. Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.