4.5 Article

Fog-Based Secure Framework for Personal Health Records Systems

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Classification of optimization problems in fog computing

Julian Bellendorf et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Health Care Sciences & Services

Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment

Jalal Al-Muhtadi et al.

HEALTH INFORMATICS JOURNAL (2019)

Article Automation & Control Systems

Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications

Sandip Roy et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Theory & Methods

Quality of Experience (QoE)-aware placement of applications in Fog computing environments

Redowan Mahmud et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Computer Science, Hardware & Architecture

A Lightweight And privacy-preserving public cloud auditing scheme without bilinear pairings in smart cities

Jing Han et al.

COMPUTER STANDARDS & INTERFACES (2019)

Article Computer Science, Information Systems

Fog Computing for the Internet of Things: A Survey

Carlo Puliafito et al.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2019)

Article Computer Science, Hardware & Architecture

An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks

Hui Cui et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2019)

Article Computer Science, Information Systems

Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems

Changhee Hahn et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things

Syh-Yuan Tan et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Software Engineering

Augmenting Quality of Experience in Distance Learning Using Fog Computing

Riccardo Pecori

IEEE INTERNET COMPUTING (2019)

Article Computer Science, Theory & Methods

Towards secure and privacy preserving collision avoidance system in 5G fog based Internet of Vehicles

Lewis Nkenyereye et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Editorial Material Medicine, General & Internal

Personal Health Records More Promising in the Smartphone Era?

Christian Dameff et al.

JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2019)

Article Computer Science, Information Systems

A trustworthy agent-based encrypted access control method for mobile cloud computing environment

Neha Agrawal et al.

PERVASIVE AND MOBILE COMPUTING (2019)

Article Computer Science, Information Systems

A Secure G-Cloud-Based Framework for Government Healthcare Services

Sanaa Sharaf et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption

Zhidan Li et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing

Lewis Nkenyereye et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Computer Science, Theory & Methods

CCA-secure ABE with outsourced decryption for fog computing

Cong Zuo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing

Y. Sreenivasa Rao

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Theory & Methods

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

Ming Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Hardware & Architecture

Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated Key Exchange without Random Oracles

Kazuki Yoneyama

IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES (2013)