- · 《智慧健康》刊物宗旨[05/29]
- · 《智慧健康》征稿要求[05/29]
- · 《智慧健康》投稿方式[05/29]
- · 《智慧健康》收稿方向[05/29]
- · 《智慧健康》栏目设置[05/29]
智慧健康研究综述: 从云端到边缘的系统(18)
作者:网站采编关键词:
摘要:[87]Patel V. A framework for secure and decentralized sharing of medical imaging data via blockchain consensus[EB/OL]. (2018-04-25) [2019-06-21]. [88]Azaria A, Ekblaw A, Vieira T, et al. Medrec: Using
[87]Patel V. A framework for secure and decentralized sharing of medical imaging data via blockchain consensus[EB/OL]. (2018-04-25) [2019-06-21].
[88]Azaria A, Ekblaw A, Vieira T, et al. Medrec: Using blockchain for medical data access and permission management[C] //Proc of the 2nd Int Conf on Open and Big Data. Piscataway, NJ: IEEE, 2016: 25-30
[89]Kuo T T, Ohno-Machado L. ModelChain: Decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks[J]. arXiv preprint arXiv:, 2018
[90]Benchoufi M, Ravaud P. Blockchain technology for improving clinical research quality[J]. Trials, 2017, 18(1): 335-340
[91]Taylor P. Applying blockchain technology to medicine traceability[EB/OL]. (2016-04-27) [2019-06-21].
[92]Sch?ner M M, Kourouklis D, Sandner P, et al. Blockchain technology in the pharmaceutical industry[EB/OL]. (2017-07-01)[2019-06-21].
[93]Prisco G. The blockchain for healthcare: Gem launches gem health network with philips blockchain lab[EB/OL]. (2016-04-26)[2019-06-21].
[94]Williams-Grut O. Estonia is using the technology behind bitcoin to secure 1 million health records[EB/OL]. (2016-03-03) [2019-06-23].
[95]Witchey N J. Healthcare transaction validation via blockchain proof-of-work, systems and methods: United States, US2A1[P]. 2015-11-19
[96]Li Ming, Yu Shucheng, Cao Ning, et al. Authorized private keyword search over encrypted data in cloud computing[C] //Proc of the 31st Int Conf on Distributed Computing Systems. Piscataway, NJ: IEEE, 2011: 383-392
[97]L?hr H, Sadeghi A R, Winandy M. Securing the e-health cloud[C] //Proc of the 1st ACM Int Health Informatics Symp. New York: ACM, 2010: 220-229
[98]Mandl K D, Markwell D, MacDonald R, et al. Public standards and patients’ control: How to keep electronic medical records accessible but private[J]. British Medical Journal, 2001, 322(7281): 283-287
[99]Yu Shucheng, Wang Cong, Ren Kui, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C] //Proc of the IEEE Int Conf on Computer Communications. Piscataway, NJ: IEEE, 2010: 534-542
[100]Ibraimi L, Petkovic M, Nikova S, et al. Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes[R]. Enschede, Netherland: University of Twente, 2009
[101]Liang Xiaohui, Lu Rongxing, Lin Xiaodong, et al. Ciphertext policy attribute based encryption with efficient revocation[R]. Waterloo, Ontario, Canada: University of Waterloo, 2010
[102]Ibraimi L, Asim M, Petkovi M. Secure management of personal health records by applying attribute-based encryption[C] //Proc of the 6th Int Workshop on Wearable, Micro, and Nano Technologies for Personalized Health. Piscataway, NJ: IEEE, 2009: 71-74
[103]Hur J, Noh D K. Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(7): 1214-1221
[104]Li Ming, Yu Shucheng, Zheng Yao, et al. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(1): 131-143
[105]Narayan S, Gagné M, Safavi-Naini R. Privacy preserving EHR system using attribute-based infrastructure[C] //Proc of the ACM Workshop on Cloud Computing Security. New York: ACM, 2010: 47-52
[106]Jahid S, Mittal P, Borisov N. EASiER: Encryption-based access control in social networks with efficient revocation[C] //Proc of the 6th ACM Symp on Information, Computer and Communications Security. New York: ACM, 2011: 411-415
[107]Boldyreva A, Goyal V, Kumar V. Identity-based encryption with efficient revocation[C] //Proc of the 15th ACM Conf on Computer and Communications Security. New York: ACM, 2008: 417-426
[108]Lu Rongxing, Lin Xiaodong, Shen Xueming. SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(3): 614-624
[109]Avvenuti M, Corsini P, Masci P, et al. Opportunistic computing for wireless sensor networks[C] //Proc of the IEEE Int Conf on Mobile Adhoc and Sensor Systems. Piscataway, NJ: IEEE, 2007: 1-6
[110]Bussani A, Griffin J L, Jansen B, et al. Trusted virtual domains: Secure foundations for business and IT services, RC[R]. Almaden, CA: IBM Research, 2005
[111]Cabuk S, Dalton C I, Eriksson K, et al. Towards automated security policy enforcement in multi-tenant virtual data centers[J]. Journal of Computer Security, 2010, 18(1): 89-121
[112]Li Qi, Zhu Hongbo, Xiong Jinbo, et al. Multi-authority attribute-based access control system in mHealth with traceability[J]. Journal on Communications, 2018, 39(6): 1-10 (in Chinese)(李琦, 朱洪波, 熊金波, 等. mHealth中可追踪多授权机构基于属性的访问控制方案[J]. 通信学报, 2018, 39(6): 1-10)
[113]Yuce M R, Ng S W P, Myo N L, et al. Wireless body sensor network using medical implant band[J]. Journal of Medical Systems, 2007, 31(6): 467-474
文章来源:《智慧健康》 网址: http://www.zhjkzz.cn/qikandaodu/2020/0715/380.html