{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:33Z","timestamp":1725771273985},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_5","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"57-69","source":"Crossref","is-referenced-by-count":5,"title":["Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryption"],"prefix":"10.1007","author":[{"given":"D.","family":"Sangeetha","sequence":"first","affiliation":[]},{"given":"Vaidehi","family":"Vijayakumar","sequence":"additional","affiliation":[]},{"given":"Valliammai","family":"Thirunavukkarasu","sequence":"additional","affiliation":[]},{"given":"Aiswarya","family":"Ramesh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Ren, Y.Z.K., Lou, W.: Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. IEEE Transactions on Parallel and Distributed Systems\u00a024 (2013)","key":"5_CR1","DOI":"10.1109\/TPDS.2012.97"},{"issue":"6","key":"5_CR2","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1109\/TPDS.2012.206","volume":"24","author":"C. Wang","year":"2013","unstructured":"Wang, C., Ren, K., Wang, J., Wang, Q.: Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Transactions on Parallel and Distributed Systems\u00a024(6), 1172\u20131181 (2013)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute based encryption. In: Shands, D. (ed.) Proceedings of the 28th IEEE Symposium on Security and Privacy, pp. 321\u2013334 (2007)","key":"5_CR3","DOI":"10.1109\/SP.2007.11"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-00843-6_1","volume-title":"Information Security Practice and Experience","author":"L. Ibraimi","year":"2009","unstructured":"Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol.\u00a05451, pp. 1\u201312. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Prasad, P., Ojha, B., Shahi, R.R., Lal, R., Vaish, A., Goel, U.: 3 dimensional security in cloud computing. In: 3rd International Conference on Computer Research and Development (ICCRD), vol.\u00a03, pp. 198\u2013201 (2011)","key":"5_CR5","DOI":"10.1109\/ICCRD.2011.5764279"},{"doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine grained access control of encrypted data. In: CCS 2006, pp. 89\u201398 (2006)","key":"5_CR6","DOI":"10.1145\/1180405.1180418"},{"unstructured":"Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., Jonker, W.: Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes (2009)","key":"5_CR7"},{"doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Cao, N., Lou, W.: Authorized Private Keyword Search over encrypted data in Cloud Computing. In: 31st International Conference on Distributed Computing Systems (2011)","key":"5_CR8","DOI":"10.1109\/ICDCS.2011.55"},{"doi-asserted-by":"crossref","unstructured":"Ibraimi, L., Asim, M., Petkovic, M.: Secure Management of Personal Health Records by applying attribute based encryption. In: 6th International Workshop on Wearable Micro and Nano Technologies for Personalized Health (2009)","key":"5_CR9","DOI":"10.1109\/PHEALTH.2009.5754828"},{"issue":"5","key":"5_CR10","doi-asserted-by":"crossref","first-page":"799","DOI":"10.3233\/JCS-2009-0383","volume":"18","author":"M. Pirretti","year":"2010","unstructured":"Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute based systems. Journal of Computer Security\u00a018(5), 799\u2013837 (2010)","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"crossref","unstructured":"Wan, Z., Liu, J., Deng, R.H.: A hierarchical attribute based solution for flexible and scalable access control in cloud computing. IEEE Transactions on Information Forensics and Security\u00a07(2) (2012)","key":"5_CR11","DOI":"10.1109\/TIFS.2011.2172209"},{"unstructured":"online, At risk of exposure \u2013 in the push for electronic medical records, concern is growing about how well privacy can be safeguarded (2006)","key":"5_CR12"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T06:06:10Z","timestamp":1558850770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}