Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
Tài liệu tham khảo
Alshehri, 2013, Secure access control for health information sharing systems, 277
Au, 2008, Consumer-centric and privacy-preserving identity management for distributed e-health systems, 234
Barua, 2011, ESPAC: Enabling security and patient-centric access control for e-health in cloud computing, International Journal of Network Security, 6, 67, 10.1504/IJSN.2011.043666
Barua, 2011, PEACE: An efficient and secure patient-centric access control scheme for e-health care system, 970
Barua, 2013, SPS: Secure personal health information sharing with patient-centric access control in cloud computing, 647
Bertino, 2008, An efficient time-bound hierarchical key management scheme for secure broadcasting, IEEE Transactions on Dependable and Secure Computing, 5, 65, 10.1109/TDSC.2007.70241
Bethencourt, 2007, Ciphertext-policy attribute-based encryption, 321
Bleikertz, 2010, Security audits of multi-tier virtual infrastructures in public infrastructure clouds, 93
Bobba, 2009, Attribute-sets: A practically motivated enhancement to attribute-based encryption, 587
Boneh, 2001, Identity-based encryption from the Weil pairing, 213
Carrión, 2011, Usable privacy and security in personal health records, 36
Chase, 2007, Multi-authority attribute based encryption, 515, 10.1007/978-3-540-70936-7_28
Chen, 2012, Secure dynamic access control scheme of PHR in cloud computing, Journal of Medical Systems, 36, 4005, 10.1007/s10916-012-9873-8
Chen, 2013, Privacy management in dynamic groups: Understanding information privacy in medical practices, 541
Chen, 2012, A secure EHR system based on hybrid clouds, Journal of Medical Systems, 36, 3375, 10.1007/s10916-012-9830-6
Cheong, 2009, Improving Korean service delivery system in health care: Focusing on national e-health system, 263
Coppolino, 2016, Cloud security: Emerging threats and current solutions, Computers & Electrical Engineering, 10.1016/j.compeleceng.2016.03.004
Danwei, 2014, Securing patient-centric personal health records sharing system in cloud computing, China Communications, 11, 121, 10.1109/CC.2014.7022535
Díaz-Palacios, 2013, Biometric access control for e-health records in pre-hospital care, 169
Dodis, 2004, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, 523
Dong, 2012, Challenges in e-health: From enabling to enforcing privacy, 195
Eskeland, 2008, Secure team-based EPR access acquisition in wireless networks, 943
Eskeland, 2007, EPR access authorization of medical teams based on patient consent, 11
Ferraiolo, 2001, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, 4, 224, 10.1145/501978.501980
Flores Zuniga, 2010, Biometrics for electronic health records, Journal of Medical Systems, 34, 975, 10.1007/s10916-009-9313-6
Ghazvini, 2013, Security challenges and success factors of electronic healthcare system, Procedia Technology, 11, 212, 10.1016/j.protcy.2013.12.183
Gondkar, 2014, Attribute based encryption for securing personal health record on cloud, 1
Gov.uk, 2011
Goyal, 2006, Attribute-based encryption for fine-grained access control of encrypted data, 89
Grobauer, 2011, Understanding cloud computing vulnerabilities, IEEE Security and Privacy, 9, 50, 10.1109/MSP.2010.115
Hansen, 2006, Location-based security framework for use of handheld devices in medical information systems, 565
HSCIC, 2015
Hu, 2010, A hybrid public key infrastructure solution for HIPAA privacy/security regulations, Computer Standards & Interfaces, 32, 274, 10.1016/j.csi.2009.04.005
Hu, 2014, Guide to attribute based access control (ABAC) definition and considerations, National Institute of Standards and Technology Special Publication, 162
Huang, 2011, Efficient key management for preserving HIPAA regulations, Journal of Systems and Software, 84, 113, 10.1016/j.jss.2010.08.056
Ibraimi, 2009, Secure management of personal health records by applying attribute-based encryption, 71
Ibraimi, 2009, Efficient and provable secure ciphertext-policy attribute-based encryption schemes, 1
Indhumathi, 2015, On demand security for personal health record in cloud computing, 1
Jafari, 2011, A rights management approach to protection of privacy in a cloud of electronic health records, 23
Jin, 2011, Patient-centric authorization framework for electronic healthcare services, Computers & Security, 30, 116, 10.1016/j.cose.2010.09.001
Juels, 2006, A fuzzy vault scheme, Designs, Codes, and Cryptography, 38, 237, 10.1007/s10623-005-6343-z
Khan, 2012, Context-aware access control for clinical information systems, 123
Khan, 2012, Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology, 66
Lambrinoudakis, 2000, Managing medical and insurance information through a smart-card-based information system, Journal of Medical Systems, 24, 213, 10.1023/A:1005549330655
Lee, 2008, A cryptographic key management solution for HIPAA privacy/security regulations, IEEE Transactions on Information Technology in Biomedicine, 12, 34, 10.1109/TITB.2007.906101
Li, 2013, Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption, IEEE Transactions on Parallel and Distributed Systems, 24, 131, 10.1109/TPDS.2012.97
Li, 2011, A secure electronic medical record sharing mechanism in the cloud computing platform, 98
Martino, 2008, Multi-domain and privacy-aware role based access control in e-health, 131
Mirkovic, 2015, Security and privacy legislation guidelines for developing personal health records, 77
Motta, 2003, A contextual role-based access control authorization model for electronic patient record, IEEE Transactions on Information Technology in Biomedicine, 7, 202, 10.1109/TITB.2003.816562
Narayan, 2010, Privacy preserving EHR system using attribute-based infrastructure, 47
Ni, 2007, Privacy-aware role based access control, 41
O’Kane, 2013, Non-static nature of patient consent: Shifting privacy perspectives in health information sharing, 553
Par, 2012, Security standards for electronic health records, 815
Privacy Rights Clearinghouse, 2005
Ray, 2012, Design of RSA-CA based e-health system for supporting HIPAA privacy-security regulations, Procedia Technology, 6, 954, 10.1016/j.protcy.2012.10.116
Ray, 2014, A certificate authority (CA)-based cryptographic solution for HIPAA privacy/security regulations, Journal of King Saud University Computer and Information Sciences, 26, 170, 10.1016/j.jksuci.2013.10.001
Ruj, 2014, Attribute based access control in clouds: A survey, 1
Sahai, 2005, Fuzzy identity-based encryption, 457
Samydurai, 2015, Secured health care information exchange on cloud using attribute based encryption, 1
Scholl, 2008, vol. 1, 800
Shanthini, 2012, Genetic-based biometric security system for wireless sensor-based health care systems, 180
Sharma, 2014, A biometric based authentication and encryption framework for sensor health data in cloud, 49
Soceanu, 2015, Managing the privacy and security of e-health data, 439
Sui, 2009, An efficient time-bound access control scheme for dynamic access hierarchy, 279
Trojer, 2012, Considering privacy and effectiveness of authorization policies for shared electronic health records, 553
US Department of Health and Human Services, 2013, Standards for privacy of individually identifiable health information: Final rule, 78, 5566
US Department of Health and Human Services, 2015
Velciu, 2014, Bio-cryptographic authentication in cloud storage sharing, 165
Wang, 2011, Quantified risk-adaptive access control for patient privacy protection in health information systems, 406
Warren, 2014, Securing EHRs via CPMA attribute-based encryption on cloud systems, 20:1
WHO, 2006
Wu, 2012, Secure sharing of electronic health records in clouds, 711
Yang, 2006, Taiwan's perspective on electronic medical records’ security and privacy protection: Lessons learned from HIPAA, Computer Methods and Programs in Biomedicine, 82, 277, 10.1016/j.cmpb.2006.04.002
Yi, 2013, Multiparty privacy protection for electronic health records, 2730
Zhang, 2011, RBTBAC: Secure access and management of EHR data, 494