165
Views
2
CrossRef citations to date
0
Altmetric
Information Engineering

An improved electronic medical record system (IEMRS) using oblivious transfer

ORCID Icon &
Pages 48-53 | Received 25 May 2017, Accepted 11 Jun 2018, Published online: 20 Feb 2019

References

  • Ammenwerth, E., C. Iller, and U. Mansmann. 2003. “Can Evaluation Studies Benefit from Triangulation? A Case Study.” International Journal of Medical Informatics 70 (2): 237–248. doi:10.1016/S1386-5056(03)00059-5.
  • Belyaev, K., W. Sun, I. Ray, and I. Ray. 2016. “On the Design and Analysis of Protocols for Personal Health Record Storage on Personal Data Server Devices.” Future Generation Computer Systems. doi:10.1016/j.future.2016.05.027.
  • Caine, K., and R. Hanania. 2013. “Patients Want Granular Privacy Control over Health Information in Electronic Medical Records.” Journal of the American Medical Informatics Association 20 (1): 7–15. doi:10.1136/amiajnl-2012-001023.
  • Chen, S. W., D. L. Chiang, C. H. Liu, T. S. Chen, F. P. Lai, H. H. Wang, and W. Wei. 2016. “Confidentiality Protection of Digital Health Records in Cloud Computing.” Journal of Medical Systems 40 (5): 124. doi:10.1007/s10916-016-0484-7.
  • Chor, B., O. Goldreich, E. Kushilevitz, and M. Sudan. 1998. “Private Information Retrieval.” Journal of the ACM 45 (6): 965–981. doi:10.1145/293347.293350.
  • Do, N. V., R. Barnhill, K. A. Heermann-Do, and R. W. Gimbel. 2011. “The Military Health System’s Personal Health Record Pilot with Microsoft HealthVault and Google Health.” Journal of the American Medical Informatics Association 18 (2): 118–124. doi:10.1136/jamia.2010.004671.
  • Fernández-Alemán, J. L., I. C. Señor, P. Á. O. Lozoya, and A. Toval. 2013. “Security and Privacy in Electronic Health Records: A Systematic Literature Review.” Journal of Biomedical Informatics 46 (3): 541–562. doi:10.1016/j.jbi.2012.12.003.
  • Greenhalgh, T., S. Hinder, K. Stramer, T. Bratan, and J. Russell. 2010. “Adoption, Nonadoption,And Abandonment of a Personal Electronic Health Record: Case Study of HealthSpace.” British Medical Journal 341: c5814. doi:10.1136/bmj.c5814.
  • Hasman, A. 2002. “Medical Informatics: Quo Vadis?” International Journal of Medical Informatics 66 (1): 113–120. doi:10.1016/S1386-5056(02)00042-4.
  • He, D., S. Zeadally, N. Kumar, and W. Wu. 2016. “Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.” IEEE Transactions on Information Forensics and Security11, no. 9: 2052–2064. doi:10.1109/TIFS.2016.2573746.
  • Hesse, B. W., D. Hansen, T. Finholt, S. Munson, W. Kellogg, and J. C. Thomas. 2010. “Social Participation in Health 2.0.” Computer 43 (11): 45–52. doi:10.1109/MC.2010.326.
  • Jackson, C., A. Bortz, D. Boneh, and J. C. Mitchell. 2006. “Protecting Browser State from Web Privacy Attacks.” Proceedings of the 15th International Conference on World Wide Web, Scotland, UK. 23-26 May :737–744. New York: ACM.
  • Langner, R. 2011. “Stuxnet: Dissecting a Cyberwarfare Weapon.” IEEE Security & Privacy 9 (3): 49–51. doi:10.1109/MSP.2011.67.
  • Li, M., S. Yu, Y. Zheng, K. Ren, and W. J. Lou. 2013. “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.” IEEE Transactions on Parallel and Distributed Systems 24 (1): 131–143. doi:10.1109/TPDS.2012.97.
  • Liu, Y. N., W. Guo, C. I. Fan, L. Chang, and C. Cheng. 2018. “A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid.” IEEE Transactions on Industrial Informatics.Doi. doi:10.1109/TII.2018.2809672.
  • Lou, D. C., and H. F. Huang. 2014. “An Efficient T-Out-Of-N Oblivious Transfer for Information Security and Privacy Protection.” International Journal of Communication Systems 27 (12): 3759–3767. doi:10.1002/dac.2573.
  • Mandl, K. D., W. W. Simons, W. C. R. Crawford, and J. M. Abbett. 2007. “Indivo: A Personally Controlled Health Record for Health Information Exchange and Communication.” BMC Medical Informatics and Decision Making 7 (1): 25. doi:10.1186/1472-6947-7-25.
  • Mandl, K. D., P. Szolovits, and I. S. Kohane. 2001. “Public Standards and Patients’ Control: How to Keep Electronic Medical Records Accessible but Private.” British Medical Journal 322 (7281): 283–287. doi:10.1136/bmj.322.7281.283.
  • Marchetti, M., F. Pierazzi, M. Colajanni, and A. Guido. 2016. “Analysis of High Volumes of Network Traffic for Advanced Persistent Threat Detection.” Computer Networks 109 (Pt 2): 127–141. doi:10.1016/j.comnet.2016.05.018.
  • Menezes, A. 2009. “An Introduction to Pairing-Based Cryptography.” American Mathematical Society 477: 47–65. doi:10.1090/conm/477/09303.
  • PHWG(The Personal Health Working Group). 2003. The Personal Health Working Group Final Report. Washington, DC: Connecting for Health: A Public-Private Collaborative.
  • Qian, H., J. Li, Y. C. Zhang, and J. G. Han. 2015. “Privacy-Preserving Personal Health Record Using Multi-Authority Attribute-Based Encryption with Revocation.” International Journal of Information Security 14 (6): 487–497. doi:10.1007/s10207-014-0270-9.
  • Rothstein, M. A., and M. K. Talbott. 2007. “Compelled Authorizations for Disclosure of Health Records: Magnitude and Implications.” The American Journal of Bioethics 7 (3): 38–45. doi:10.1080/15265160601171887.
  • Yan, H., J. Li, J. G. Han, and Y. C. Zhang. 2017. “A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage.” IEEE Transactions on Information Forensics and Security 12 (1): 78–88. doi:10.1109/TIFS.2016.2601070.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.