406
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Applying time-constraint access control of personal health record in cloud computing

, , ORCID Icon &
Pages 266-281 | Received 18 Mar 2018, Accepted 07 Sep 2018, Published online: 16 Sep 2018

References

  • AHIMA e-HIM Personal Health Record Work Group. 2005. “Defining the Personal Health Record,” Journal of American Health Information Management Association, 76 (6): 24–25.
  • Akl, S. G., and P. D. Taylor. 1983. “Cryptographic Solution to a Problem of Access Control in a Hierarchy,” ACM Transactions on Computer Systems, 1 (3): 239–248. doi:10.1145/357369.357372
  • Bao, F., R. Deng, and H. Zhu. 2003. “Variations of Diffie–Hellman Problem,” In Proceedings of ICICS, 2836: 301–312
  • Boneh, D., and M. Franklin. 2001. “Identity-Based Encryption from the Weil Pairing,” Proceedings of Crypto, 2139: 213–229.
  • Brief, A. Talk on Cloud Computing., 2009. Available at: http://www.cc.ntu.edu.tw/chinese/epaper/0008/20090320_8008.htm
  • Carcary, M., E. Doherty, G. Conway, and S. McLaughlin. 2014. “Cloud Computing Adoption Readiness and Benefit Realization in Irish SMEs—An Exploratory Study,” Information Systems Management, 31 (4): 313–327 doi:10.1080/10580530.2014.958028
  • Chen, S.-W., D. L. Chiang, C.-H. Liu, T.-S. Chen, F. Lai, H. Wang, and W. Wei. 2016. “Confidentiality Protection of Digital Health Records in Cloud Computing”, Journal of Medical System, 40 (5): 1–12. doi:10.1007/s10916-016-0484-7
  • Christopher, S. Y. 2011. “Cloud Computing: Architectural and Policy Implications,” Review of Industrial Organization, 38 (4): 405–421. doi:10.1007/s11151-011-9295-7
  • Huang, K. H., Y. F. Chung, C. H. Liu, F. Lai, and T. S. Chen. 2009. “Efficient Migration for Mobile Computing in Distributed Networks,” Computer Standards and Interfaces, 31, (1): 40–47. doi:10.1016/j.csi.2007.10.011
  • Hwang, M. S. 1999. “Extension of CHW Cryptographic Key Assignment Scheme in a Hierarchy,” IEEE Proceedings-Computers and Digital Techniques, 146 (4): 219. doi:10.1049/ip-cdt:19990552
  • Hwang, M. S. 2000. “An Asymmetric Cryptographic Scheme for a Totally-Ordered Hierarchy,” International Journal of Computer Mathematics, 73: 463–468. doi:10.1080/00207160008804909
  • Joux, A. 2002. “The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems,” Proceedings of Fifth ANTS, 2369: 20–32.
  • Kabachinski, J. 2006. “What Is Health Level 7?” Biomedical Instrum Technological, 40 (5): 375–379.
  • Kaelber, D. C., A. K. Jha, D. Johnston, B. Middleton, and D. W. Bates. 2008. “A Research Agenda for Personal Health Records,” Journal of the American Medical Informatics Association, 15 (6): 729–736. doi:10.1197/jamia.M2547
  • Shamir, A. 1985. “Identity-Based Cryptosystems and Signature Schemes,” Proceedings of Crypto’ 84, Lecture Notes in Computer Science No.196, 47–53.
  • Shen, V. R. L., W. C. Huang, and T. L. Chen. 2012. “A Time-Bound Hierarchical Access Control for Multicast Systems,” 2012 International Conference on Machine Learning and Cybernetics.
  • Sittig, D. F. 2002. “Personal Health Records on the Internet: A Snapshot of the Pioneers at the End of the 20th Century,” International Journal of Medical Informatics, 65 (1), 1–6. doi:10.1016/S1386-5056(01)00215-5
  • The Plan of SETI@Home, 2014.  Available at: http://scimonth.blogspot.tw/2014/08/setihome.html
  • Updated Apple Health app uses FHIR to import patient health data, 2018. Available at: https://corepointhealth.com/apple-health-fhir
  • Vaquero, L. M., L. Rodero-Merino, and D. Morán. 2011. “Locking the Sky: A Survey on IaaS Cloud Security,” Computing, 91 (1), 93–118. doi:10.1007/s00607-010-0140-x
  • Vijayakumara, P., K. Anandb, S. Bosea, V. Maheswaric, R. Kowsalyac, and A. Kannana. “Hierarchical Key Management Scheme for Securing Mobile Agents with Optimal Computation Time,” 2012 International Conference on Modeling, Optimisation and Computing (ICMOC 2012). doi:10.1016/j.proeng.2012.06.177
  • Waegemann, C. P. 2005. “Closer to reality:Personal health records represent a step in the right direction for interoperability of healthcare IT systems and accessibility of patient data,” Health Managed Technological, 26 (5), 16–18.
  • Working Group on Policies for Electronic Information Sharing between Doctors and Patients, Connecting Americans to Their Healthcare: Final Report, Markle Foundation, 2004.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.