Zhang et al., 2014 - Google Patents
Role‐based and time‐bound access and management of EHR dataZhang et al., 2014
View PDF- Document ID
- 4321035287209817519
- Author
- Zhang R
- Liu L
- Xue R
- Publication year
- Publication venue
- Security and communication Networks
External Links
Snippet
Security and privacy are widely recognized as important requirements for access and management of electronic health record (EHR) data. In this paper, we argue that EHR data need to be managed with customizable access control in both spatial and temporal …
- 239000008187 granular material 0 abstract description 57
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Role‐based and time‐bound access and management of EHR data | |
Thwin et al. | Blockchain‐based access control model to preserve privacy for personal health record systems | |
Chen et al. | A blockchain‐based medical data sharing mechanism with attribute‐based access control and privacy protection | |
Chenthara et al. | Security and privacy-preserving challenges of e-health solutions in cloud computing | |
Fabian et al. | Collaborative and secure sharing of healthcare data in multi-clouds | |
Akinyele et al. | Securing electronic medical records using attribute-based encryption on mobile devices | |
Zhang et al. | Security models and requirements for healthcare application clouds | |
Benaloh et al. | Patient controlled encryption: ensuring privacy of electronic medical records | |
Annane et al. | Blockchain based context-aware CP-ABE schema for Internet of Medical Things security | |
Wang et al. | Implementing a personal health record cloud platform using ciphertext-policy attribute-based encryption | |
CN102687132A (en) | Trusted Extensible Markup Language for Trusted Computing and Data Services | |
Huang et al. | FSSR: Fine-grained EHRs sharing via similarity-based recommendation in cloud-assisted eHealthcare system | |
Ibrahim et al. | A secure framework for sharing electronic health records over clouds | |
Liu et al. | A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption | |
Zhou et al. | A secure role-based cloud storage system for encrypted patient-centric health records | |
Saravanan et al. | Lattice based access control for protecting user data in cloud environments with hybrid security | |
Li et al. | Electronic medical record sharing system based on hyperledger fabric and interplanetary file system | |
Natarajan et al. | Quantum secure patient login credential system using blockchain for electronic health record sharing framework | |
Wang et al. | Data verifiable personalized access control electronic healthcare record sharing based on blockchain in IoT environment | |
Chen et al. | MASS: A multi-attribute sketch secure data sharing scheme for IoT wearable medical devices based on blockchain | |
Bansal et al. | A post-quantum consortium blockchain based secure EHR framework | |
Jain et al. | Quantum resistant blockchain-based architecture for secure medical data sharing | |
Nie et al. | Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT | |
Yang et al. | A personalized and efficient EMR sharing and management scheme based on smart contracts | |
Dabra et al. | An improved finegrained ciphertext policy based temporary keyword search on encrypted data for secure cloud storage |