[go: up one dir, main page]

Zhang et al., 2014 - Google Patents

Role‐based and time‐bound access and management of EHR data

Zhang et al., 2014

View PDF
Document ID
4321035287209817519
Author
Zhang R
Liu L
Xue R
Publication year
Publication venue
Security and communication Networks

External Links

Snippet

Security and privacy are widely recognized as important requirements for access and management of electronic health record (EHR) data. In this paper, we argue that EHR data need to be managed with customizable access control in both spatial and temporal …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Similar Documents

Publication Publication Date Title
Zhang et al. Role‐based and time‐bound access and management of EHR data
Thwin et al. Blockchain‐based access control model to preserve privacy for personal health record systems
Chen et al. A blockchain‐based medical data sharing mechanism with attribute‐based access control and privacy protection
Chenthara et al. Security and privacy-preserving challenges of e-health solutions in cloud computing
Fabian et al. Collaborative and secure sharing of healthcare data in multi-clouds
Akinyele et al. Securing electronic medical records using attribute-based encryption on mobile devices
Zhang et al. Security models and requirements for healthcare application clouds
Benaloh et al. Patient controlled encryption: ensuring privacy of electronic medical records
Annane et al. Blockchain based context-aware CP-ABE schema for Internet of Medical Things security
Wang et al. Implementing a personal health record cloud platform using ciphertext-policy attribute-based encryption
CN102687132A (en) Trusted Extensible Markup Language for Trusted Computing and Data Services
Huang et al. FSSR: Fine-grained EHRs sharing via similarity-based recommendation in cloud-assisted eHealthcare system
Ibrahim et al. A secure framework for sharing electronic health records over clouds
Liu et al. A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
Zhou et al. A secure role-based cloud storage system for encrypted patient-centric health records
Saravanan et al. Lattice based access control for protecting user data in cloud environments with hybrid security
Li et al. Electronic medical record sharing system based on hyperledger fabric and interplanetary file system
Natarajan et al. Quantum secure patient login credential system using blockchain for electronic health record sharing framework
Wang et al. Data verifiable personalized access control electronic healthcare record sharing based on blockchain in IoT environment
Chen et al. MASS: A multi-attribute sketch secure data sharing scheme for IoT wearable medical devices based on blockchain
Bansal et al. A post-quantum consortium blockchain based secure EHR framework
Jain et al. Quantum resistant blockchain-based architecture for secure medical data sharing
Nie et al. Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT
Yang et al. A personalized and efficient EMR sharing and management scheme based on smart contracts
Dabra et al. An improved finegrained ciphertext policy based temporary keyword search on encrypted data for secure cloud storage