2018
DOI: 10.1016/j.cose.2017.09.014
|View full text |Cite
|
Sign up to set email alerts
|

An efficient privacy mechanism for electronic health records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
45
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 53 publications
(47 citation statements)
references
References 12 publications
1
45
0
1
Order By: Relevance
“…The Petri Nets are modeling tools used for the graphical and mathematical modeling of various systems that can be characteristically concurrent, asynchronous, distributed, parallel, non-deterministic, or stochastic [13]. In this work, a variant of the classical Petri Nets, namely the High-level Petri Nets (HLPNs) [13], have been used to model the proposed schemes. Relevant details on the Petri Nets have been presented in [14].…”
Section: High-level Petri Netsmentioning
confidence: 99%
See 2 more Smart Citations
“…The Petri Nets are modeling tools used for the graphical and mathematical modeling of various systems that can be characteristically concurrent, asynchronous, distributed, parallel, non-deterministic, or stochastic [13]. In this work, a variant of the classical Petri Nets, namely the High-level Petri Nets (HLPNs) [13], have been used to model the proposed schemes. Relevant details on the Petri Nets have been presented in [14].…”
Section: High-level Petri Netsmentioning
confidence: 99%
“…Definition 1 (HLPN) [13]. A HLPN can be defined as a 7-tuple, N = (P, T, F, φ, R, L, M 0 ), where the variable:…”
Section: High-level Petri Netsmentioning
confidence: 99%
See 1 more Smart Citation
“…Where, C 1 and C 2 are ciphertext images before and after one pixel changes in a plaintext image. In the proposed approach, the fitness function that is used to measure the performance of each individual chromosome is defined using the Equation (12).…”
Section: Fitness Functionmentioning
confidence: 99%
“…Accordingly, ensuring the privacy of these digital records requires additional security measures. In this regard, a broad range of parameters need to be taken into account when designing a secure framework [11][12][13], including availability, integrity, authorization, confidentiality, data ownership, authentication and anonymization. To this purpose, various approaches and schemes are suggested to secure data processing in an untrusted cloud environment.…”
Section: Introductionmentioning
confidence: 99%