I. Chiuchisan, I. Chiuchisan, and M. Dimian, Internet of Things for e-Health: An approach to medical applications, 2015 International Workshop on Computational Intelligence for Multimedia Understanding (IWCIM), pp.1-5, 2015.

H. Lin, J. Shao, C. Zhang, and Y. Fang, CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.985-997, 2013.

H. S. Pussewalage and V. Oleshchuk, A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), 2016.

R. Zhang and L. Liu, Security Models and Requirements for Healthcare Application Clouds, 2010 IEEE 3rd International Conference on Cloud Computing, pp.268-275, 2010.

A. L. Ferrara, G. Fachsbauer, B. Liu, and B. Warinschi, Policy Privacy in Cryptographic Access Control, Computer Security Foundations Symposium (CSF), pp.46-60, 2015.

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.

M. Li, S. Yu, K. Ren, and W. Lou, Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings," in Security and Privacy in Communication Networks, pp.89-106, 2010.

A. Botta, W. D. Donato, V. Persico, and A. Pescap, On the Integration of Cloud Computing and Internet of Things, 2014 International Conference on Future Internet of Things and Cloud, 2014.

T. Gong, H. Huang, P. Li, K. Zhang, and H. Jiang, A Medical Healthcare System for Privacy Protection Based on IoT, p.2015

, Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), pp.217-222, 2015.

H. Khemissa and D. Tandjaoui, A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pp.90-95, 2015.

J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang, Securely Outsourcing Attribute-Based Encryption with Checkability, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.8, 2014.

L. Touati and Y. , Instantaneous proxy-based key update for cp-abe, 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp.591-594, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01353898

Q. Huang, Y. Yang, and L. Wang, Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things, vol.5, p.950, 2017.

O. Kocabas, T. Soyata, and M. K. Aktas, Emerging Security Mechanisms for Medical Cyber Physical Systems, IEEE/ACM transactions on computational biology and bioinformatics, vol.13, pp.401-416, 2016.

S. R. Hemalatha and M. , Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing, International Journal of Innovative Research in Computer and Communication Engineering, 2014.

F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, CP-ABE With Constant-Size Keys for Lightweight Devices, IEEE Transactions on Information Forensics and Security, vol.9, issue.5, pp.763-771, 2014.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based Encryption for Fine-grained Access Control of Encrypted Data, Proceedings of the 13th ACM Conference on Computer and Communications Security, ser. CCS '06, pp.89-98, 2006.

R. Materese, Recommendation for Key Management, Part 1: General, 2016.

X. Wang, J. Zhang, E. M. Schooler, and M. Ion, Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT, 2014 IEEE International Conference on Communications (ICC), pp.725-730, 2014.

M. Ambrosin, M. Conti, and T. Dargahi, On the Feasibility of Attribute-Based Encryption on Smartphone Devices, Proceedings of the 2015 Workshop on IoT Challenges in Mobile and Industrial Systems, pp.49-54, 2015.

K. T. Nguyen, M. Laurent, and N. Oualha, Survey on secure communication protocols for the Internet of Things, Ad Hoc Networks, vol.32, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01272046

, The AVISPA Project

, PBC library -pairing-based cryptography

, Small portable AES128/192/256 in c

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, Proceedings of the 2007 IEEE Symposium on Security and Privacy, ser. SP '07, pp.321-334, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01788815

Y. Yahia, S. Banerjee, S. Bouzefrane, and H. Boucheneb, Exploring formal strategy framework for the security in IoT towards e-health context using computational intelgence," in Internet of Things and Big Data Technologies for Next Generation Healthcare, ser. Studies in Big Data, pp.63-90, 2017.