References
[1] BERNAERDT J, MOERENHOUT T, DEVISCH I. Vulnerable patients' attitudes towards sharing medical data and granular control in patient portal systems: An interview study. Journal of Evaluation in Clinical Practice, 2021, 27(2): 429 -437.
[2] COOK-DEEGAN R, MAJUMDER M A, MCGUIRE A L. Introduction: Sharing data in a medical information commons. Journal of Law Medicine and Ethics, 2019, 47(1): 7 -11.
[3] COLE C L, SENGUPTA S, ROSSETTI S, et al. Ten principles for data sharing and commercialization. Journal of the American Medical Informatics Association, 2021, 28(3): 646 -649.
[4] MARWAN M, KARTIT A, OUAHMANE H. A framework to secure medical image storage in cloud computing environment. Journal of Electronic Commerce in Organizations, 2018, 16(1): 1 -16.
[5] CHEN M, QIAN Y F, CHEN J, et al. Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Transactions on Cloud Computing, 2020, 8(4): 1274 -1283.
[6] WANG Y T, CHEN K F, CHEN J H. Attribute-based traitor tracing. Journal of Information Science and Engineering, 2011, 27(1): 181 -195.
[7] NING J T, DONG X L, CAO Z F, et al. White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Transactions on Information Forensics and Security, 2015, 10(6): 1274 -1288.
[8] CUI H, DENG R H, LI Y J. Attribute-based cloud storage with secure provenance over encrypted data. Future Generation Computer Systems, 2018, 79(Part 2): 461 -472.
[9] YAN X X, YUAN X H, ZHANG Q C, et al. Traceable and weighted attribute-based encryption scheme in the cloud environment. IEEE Access, 2020, 8: 38285 -38295.
[10] WANG H, SONG Y J. Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. Journal of Medical Systems, 2018, 42(8): Article 152.
[11] FAN K, WANG S Y, REN Y H, et al. MedBlock: Efficient and secure medical data sharing via blockchain. Journal of Medical Systems, 2018, 42(8): Article 136.
[12] ZHANG A Q, LIN X D. Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. Journal of Medical Systems, 2018, 42(8): Article 140.
[13] PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems. Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06), 2006, Oct 30 - Nov 3, Alexandria, VA, USA. New York, NY, USA: ACM, 2006: 99 -112.
[14] OSTROVSKY R, SAHAI A, WATERS B. Attribute-based encryption with non-monotonic access structures. Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'06), 2007, Oct 31 - Nov 2, Alexandria, VA, USA. New York, NY, USA: ACM, 2007: 195 -203.
[15] NARUSE T, MOHRI M, SHIRAISHI Y. Attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Park J J, Stojmenovic I, Choi M, et al ( eds ). Future Information Technology: FutureTech 2013. LNEE 276. Berlin, Germany: Springer, 2014: 119 -125.
[16] XIA Z H, ZHANG L G, LIU D D. Attribute-based access control scheme with efficient revocation in cloud computing. China Communications, 2016, 13(7): 92 -99.
[17] LI J G, SHI Y R, ZHANG Y C. Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. International Journal of Communication Systems, 2017, 30(1): 2942. 1 -2942. 13.
[18] YAN X X, MENG H. Ciphertext policy attribute-based encryption scheme supporting direct revocation. Journal on Communications, 2016, 37(5): 44 -50 (in Chinese).
[19] BAI C C, ZHANG Y H, MA H, et al. Expressive ciphertext-policy attribute-based encryption with direct user revocation. International Journal of Embedded Systems, 2017, 9(6): 495 -504.
[20] ZHANG W, WU Y, XIONG H, et al. Accountable attribute-based encryption with public auditing and user revocation in the personal health record system. KSII Transactions on Internet and Information Systems, 2021, 15(1): 302 -322.
[21] MA H, ZHANG R, YANG G M, et al. Efficient fine-grained data sharing mechanism for electronic medical record systems with mobile devices. IEEE Transactions on Dependable and Secure Computing, 2020, 17(5): 1026 -1038.
[22] OGUNDOYIN S O, KAMIL I A. PAASH: A privacy-preserving authentication and fine-grained access control of outsourced data
for secure smart health in smart cities. Journal of Parallel and Distributed Computing, 2021, 155: 101 -119.
|