2014 IEEE 16th International Conference on E-Health Networking, Applications and Services (Healthcom) 2014
DOI: 10.1109/healthcom.2014.7001840
|View full text |Cite
|
Sign up to set email alerts
|

A new architecture for secure storage and sharing of health records in the cloud using federated identity attributes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0
2

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
2
0
2
Order By: Relevance
“…For example: Use of encryption and decryption concepts such as character-based encryption, unique encryption, public and private key encryption, combination of private and public key encryption, symmetric, authentication, digital signature, etc. (13, 14, 16, 19-25, 27, 32, 35-37). …”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example: Use of encryption and decryption concepts such as character-based encryption, unique encryption, public and private key encryption, combination of private and public key encryption, symmetric, authentication, digital signature, etc. (13, 14, 16, 19-25, 27, 32, 35-37). …”
Section: Discussionmentioning
confidence: 99%
“…In health information systems, exchanging and sharing data and information are essential and sensitive due to separated parts from each other (14, 22, 38). Sharing the electronic health record on the cloud and using the Internet has two big obstacles.…”
Section: Discussionmentioning
confidence: 99%
“…No trabalho de [de Melo Silva et al 2014], foi proposta uma arquitetura para compartilhamento de arquivos de saúde baseada em identidades federadas, nuvens e CBA. A arquitetura retira dos pacientes toda a complexidade para gerenciamento de atributos e chaves criptográficas, provendo fácil usabilidade.…”
Section: Trabalhos Relacionadosunclassified
“…Se mecanismos para assegurar a confidencialidade e o controle de acesso não forem empregados, um provedor malicioso pode dar acesso aos arquivos a entidades não autorizadas. O acesso indevido aos arquivos dos pacientes pode levar ao uso de dados médicos em, por exemplo, propagandas e pesquisas de mercado [de Melo Silva et al 2014]. A integridade dos arquivos na nuvemé uma outra questão de segurança.…”
Section: Introductionunclassified