2013
DOI: 10.1002/sec.759
|View full text |Cite
|
Sign up to set email alerts
|

Access control for cloud‐based eHealth social networking: design and evaluation

Abstract: eHealth is being rapidly deployed. Lower cost and greater productivity attract government and healthcare enterprise to transit from traditional healthcare service to eHealth service. Security and privacy are growing concerns with the widespread deployment of eHealth and the development of next generation of eHealth services. In this paper, we discuss these security problems and propose a high‐level security framework that captures required features in the next‐generation eHealth infrastructure. Our framework c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…Bai et al [6] describe use social networking to manage access control in eHealth networks (Husky eHealth). They use tag-based trust architecture in determining what data to share and with whom.…”
Section: Introductionmentioning
confidence: 99%
“…Bai et al [6] describe use social networking to manage access control in eHealth networks (Husky eHealth). They use tag-based trust architecture in determining what data to share and with whom.…”
Section: Introductionmentioning
confidence: 99%