{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T06:04:05Z","timestamp":1747202645101,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_11","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"111-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud"],"prefix":"10.1007","author":[{"given":"Zainab","family":"Abaid","sequence":"first","affiliation":[]},{"given":"Arash","family":"Shaghaghi","sequence":"additional","affiliation":[]},{"given":"Ravin","family":"Gunawardena","sequence":"additional","affiliation":[]},{"given":"Suranga","family":"Seneviratne","sequence":"additional","affiliation":[]},{"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[]},{"given":"Sanjay","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutorials 18(3), 2027\u20132051 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., Shaghaghi, A.: Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations, pp. 143\u2013165. Springer International Publishing, Cham (2018)","DOI":"10.1007\/978-3-030-04834-1_8"},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1197\/jamia.M1888","volume":"13","author":"RH Dolin","year":"2006","unstructured":"Dolin, R.H., et al.: Hl7 clinical document architecture, release 2. J. Am. Med. Inform. Assoc. 13(1), 30\u201339 (2006)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Doshi, N., Oza, M., Gorasia, N.: An enhanced scheme for PHR on cloud servers using CP-ABE. In: Information and Communication Technology for Competitive Strategies, pp. 439\u2013446. Springer (2019)","DOI":"10.1007\/978-981-13-0586-3_44"},{"issue":"12","key":"11_CR6","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10916-016-0621-3","volume":"40","author":"J Eom","year":"2016","unstructured":"Eom, J., Lee, D.H., Lee, K.: Patient-controlled attribute-based encryption for secure electronic health records system. J. Med. Syst. 40(12), 253 (2016)","journal-title":"J. Med. Syst."},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.smhl.2018.01.003","volume":"12","author":"E Greene","year":"2018","unstructured":"Greene, E., Proctor, P., Kotz, D.: Secure sharing of mhealth data streams through cryptographically-enforced access control. Smart Health 12, 49\u201365 (2018)","journal-title":"Smart Health"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., Jonker, W.: Mediated ciphertext-policy attribute-based encryption and its application. In: International Workshop on Information Security Applications, pp. 309\u2013323. Springer (2009)","DOI":"10.1007\/978-3-642-10838-9_23"},{"issue":"5","key":"11_CR9","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1109\/TPDS.2017.2782253","volume":"29","author":"M JahanJahan","year":"2017","unstructured":"JahanJahan, M., et al.: Light weight write mechanism for cloud data. IEEE Trans. Parallel Distrib. Syst. 29(5), 1131\u20131146 (2017)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Jahan, M., Roy, P.S., Sakurai, K., Seneviratne, A., Jha, S.: Secure and light weight fine-grained access mechanism for outsourced data. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp. 201\u2013209. IEEE (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.238"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.comnet.2017.03.018","volume":"121","author":"HH Jazi","year":"2017","unstructured":"Jazi, H.H., Gonzalez, H., Stakhanova, N., Ghorbani, A.A.: Detecting http-based application layer dos attacks on web servers in the presence of sampling. Comput. Netw. 121, 25\u201336 (2017)","journal-title":"Comput. Netw."},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2012","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","volume":"52","author":"J Liu","year":"2015","unstructured":"Liu, J., Huang, X., Liu, J.K.: Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Future Gener. Comput. Syst. 52, 67\u201376 (2015)","journal-title":"Future Gener. Comput. Syst."},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.ins.2012.09.034","volume":"258","author":"Q Liu","year":"2014","unstructured":"Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355\u2013370 (2014)","journal-title":"Inf. Sci."},{"issue":"14","key":"11_CR15","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1001\/jama.2015.2252","volume":"313","author":"V Liu","year":"2015","unstructured":"Liu, V., Musen, M.A., Chou, T.: Data breaches of protected health information in the united states. JAMA 313(14), 1471\u20131473 (2015)","journal-title":"JAMA"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Matos, D.R., Pardal, M.L., Ad\u00e3o, P., Silva, A.R., Correia, M.: Securing electronic health records in the cloud. In: Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, p. 1. ACM (2018)","DOI":"10.1145\/3195258.3195259"},{"issue":"5","key":"11_CR17","doi-asserted-by":"publisher","first-page":"3943","DOI":"10.1007\/s11042-019-7494-7","volume":"79","author":"A Mubarakali","year":"2020","unstructured":"Mubarakali, A., Ashwin, M., Mavaluru, D., Kumar, A.D.: Design an attribute based health record protection algorithm for healthcare services in cloud environment. Multimedia Tools Appl. 79(5), 3943\u20133956 (2020)","journal-title":"Multimedia Tools Appl."},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Nair, S.K., et al.: Towards secure cloud bursting, brokerage and aggregation. In: 2010 Eighth IEEE European Conference on Web Services, pp. 189\u2013196. IEEE (2010)","DOI":"10.1109\/ECOWS.2010.33"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Narayan, S., Gagn\u00e9, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, pp. 47\u201352. ACM (2010)","DOI":"10.1145\/1866835.1866845"},{"issue":"6","key":"11_CR20","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s10207-014-0270-9","volume":"14","author":"H Qian","year":"2015","unstructured":"Qian, H., Li, J., Zhang, Y., Han, J.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14(6), 487\u2013497 (2015)","journal-title":"Int. J. Inf. Secur."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Wu, R., Ahn, G.-J., Hu, H.: Secure sharing of electronic health records in clouds. In: 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 711\u2013718. IEEE (2012)","DOI":"10.4108\/icst.collaboratecom.2012.250497"},{"issue":"10","key":"11_CR22","doi-asserted-by":"publisher","first-page":"3441","DOI":"10.1007\/s11042-013-1829-6","volume":"74","author":"F Xhafa","year":"2015","unstructured":"Xhafa, F., Li, J., Zhao, G., Li, J., Chen, X., Wong, D.S.: Designing cloud-based electronic health record system with attribute-based encryption. Multimedia Tools Appl. 74(10), 3441\u20133458 (2015)","journal-title":"Multimedia Tools Appl."},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462174"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:09:10Z","timestamp":1599476950000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}