Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption, IEEE Transactions on Parallel and Distributed Systems, vol.24, issue.1, pp.131-143, 2013. ,
DOI : 10.1109/TPDS.2012.97
Securing electronic medical records using attribute-based encryption on mobile devices, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, p.7586, 2011. ,
DOI : 10.1145/2046614.2046628
URL : http://hdl.handle.net/10945/45482
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing, International Journal of Security and Networks, vol.6, issue.2/3, pp.67-76, 2011. ,
DOI : 10.1504/IJSN.2011.043666
Securing personal health records in cloud computing: Patient-Centric and Fine- Grained data access control in multi-owner settings, Security and Privacy in Communication Networks, pp.89-106, 2010. ,
Secure management of personal health records by applying attribute-based encryption, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health, pp.71-74, 2009. ,
DOI : 10.1109/PHEALTH.2009.5754828
Patient controlled encryption, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.103-114, 2009. ,
DOI : 10.1145/1655008.1655024
Fuzzy Identity-Based Encryption, Lecture Notes in Computer Science, vol.3494, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744
Attribute-Based Encryption with Break-Glass, Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010. ,
DOI : 10.1109/CONGRESS.2009.11
URL : https://hal.archives-ouvertes.fr/hal-01056083
Caac an adaptive and proactive access control approach for emergencies for smart infrastructures, ACM Transactions on Autonomous and Adaptive Systems Special Issue on Adaptive Security, 2012. ,