共 19 条
[1]
Barua M., Alam M.S., Liang X., Shen X., Secure and quality of service assurance scheduling scheme for wban with application to ehealth, Wireless Communications and Networking Conference (WCNC), pp. 1-5, (2011)
[2]
Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, Proceedings - IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
[3]
Bethencourt J., Sahai A., Waters B., Advanced Crypto Software Collection, Ciphertext-policy Attribute-based Encryption, (2011)
[4]
Boneh D., Franklin M., Identity-based encryption from the weil pairing, Lecture Notes in Computer Science, 2139, pp. 213-229, (2001)
[5]
Cassandras C.G., Lafortune S., Introduction to Discrete Event Systems, (2010)
[6]
Goyal V., Pandey O., Sahai A., Waters B., Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the ACM Conference on Computer and Communications Security, pp. 89-98, (2006)
[7]
Johnson M., Data hemorrhages in the health-care sector, Financial Cryptography and Data Security, Vol. 5628 of Lecture Notes in Computer Science, pp. 71-89, (2009)
[8]
Kamara S., Lauter K., Cryptographic cloud storage, Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, FC'10, pp. 136-149, (2010)
[9]
Liang X., Lu R., Lin X., Shen X., Patient self-controllable access policy on phi in ehealthcare systems, AHIC 2010, pp. 1-5, (2010)
[10]
Lin X., Lu R., Shen X., Nemoto Y., Kato N., Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems, Selected Areas in Communications, 27, 4, pp. 365-378, (2009)