Wireless sensor networks for healthcare: A survey, Computer Networks, vol.54, issue.15, pp.2688-2710, 2010. ,
DOI : 10.1016/j.comnet.2010.05.003
Data security and privacy in wireless body area networks, IEEE Wireless Communications, vol.17, issue.1, pp.51-58, 2010. ,
DOI : 10.1109/MWC.2010.5416350
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, vol.25, issue.6, pp.599-616, 2009. ,
DOI : 10.1016/j.future.2008.12.001
Opportunities and challenges of wireless sensor networks using cloud services, Proceedings of the workshop on Internet of Things and Service Platforms, IoTSP '11, pp.41-47, 2011. ,
DOI : 10.1145/2079353.2079357
Integration of Wireless Sensor Network with Cloud, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp.321-323, 2010. ,
DOI : 10.1109/ITC.2010.88
A Cloud Computing Solution for Patient's Data Collection in Health Care Institutions, 2010 Second International Conference on eHealth, Telemedicine, and Social Medicine, pp.95-99, 2010. ,
DOI : 10.1109/eTELEMED.2010.19
Combining cloud computing and wireless sensor networks, Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, iiWAS '09, pp.512-518, 2009. ,
DOI : 10.1145/1806338.1806435
Extending sensor networks into the Cloud using Amazon Web Services, 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications, pp.1-7, 2010. ,
DOI : 10.1109/NESEA.2010.5678063
A framework of sensor-cloud integration opportunities and challenges, Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC '09, pp.618-626, 2009. ,
DOI : 10.1145/1516241.1516350
Context-aware Human Activity Recognition and decision making, The 12th IEEE International Conference on e-Health Networking, Applications and Services, pp.112-118, 2010. ,
DOI : 10.1109/HEALTH.2010.5556585
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing, International Journal of Security and Networks, vol.6, issue.2/3, pp.67-76, 2011. ,
DOI : 10.1504/IJSN.2011.043666
Plutus: Scalable secure file sharing on untrusted storage, Proceedings of the 2nd USENIX Conference on File and Storage Technologies, pp.29-42, 2003. ,
Sirius: Securing remote untrusted storage Network and distributed systems security, NDSS'03, pp.131-145, 2003. ,
Patient controlled encryption, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.103-114, 2009. ,
DOI : 10.1145/1655008.1655024
Over-encryption: management of access control evolution on outsourced data, Proceedings of the 33rd international conference on Very large data bases, ser. VLDB '07, pp.123-134, 2007. ,
Secure and efficient access to outsourced data, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.55-66, 2009. ,
DOI : 10.1145/1655008.1655016
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.702.3540
Secure management of personal health records by applying attribute-based encryption, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health, pp.71-74, 2009. ,
DOI : 10.1109/PHEALTH.2009.5754828
Securing personal health records in cloud computing: Patient-Centric and Fine- Grained data access control in multi-owner settings, Security and Privacy in Communication Networks, pp.89-106, 2010. ,
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744
Fuzzy Identity-Based Encryption, Lecture Notes in Computer Science, vol.3494, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.261-270, 2010. ,
DOI : 10.1145/1755688.1755720
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption, IEEE Transactions on Parallel and Distributed Systems, vol.24, issue.1, pp.131-143, 2013. ,
DOI : 10.1109/TPDS.2012.97
Attribute-Based Encryption with Break-Glass, Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010. ,
DOI : 10.1109/CONGRESS.2009.11
URL : https://hal.archives-ouvertes.fr/hal-01056083
Caac an adaptive and proactive access control approach for emergencies for smart infrastructures, ACM Transactions on Autonomous and Adaptive Systems Special Issue on Adaptive Security, 2012. ,