2013
DOI: 10.11591/telkomnika.v11i4.2406
|View full text |Cite
|
Sign up to set email alerts
|

Securing Personal Health Records in the Cloud by Enforcing Sticky Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…Leng et al [4] proposed a solution that allows patients to specify a policy to support fine-grained access control. They primarily utilized Conditional Proxy Re-Encryption to enforce sticky policies and provided users with write privileges for PHRs.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Leng et al [4] proposed a solution that allows patients to specify a policy to support fine-grained access control. They primarily utilized Conditional Proxy Re-Encryption to enforce sticky policies and provided users with write privileges for PHRs.…”
Section: Related Workmentioning
confidence: 99%
“…Preliminary [4,5] In the proposed scheme, we mainly utilizes Conditional Proxy Re-Encryption (C-PRE) scheme to complete our scheme, which consists of the following algorithms:…”
Section: A Access Control Policy For Phr Datamentioning
confidence: 99%
See 3 more Smart Citations