{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:23:10Z","timestamp":1772065390288,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s00500-013-1202-8","type":"journal-article","created":{"date-parts":[[2013,12,6]],"date-time":"2013-12-06T08:38:30Z","timestamp":1386319110000},"page":"1795-1802","source":"Crossref","is-referenced-by-count":49,"title":["An efficient PHR service system supporting fuzzy keyword search and fine-grained access control"],"prefix":"10.1007","volume":"18","author":[{"given":"Fatos","family":"Xhafa","sequence":"first","affiliation":[]},{"given":"Jianfeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Krause","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"1202_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. In: Proceedings of advances in cryptology\u2014CRYPTO 2005, pp 205\u2013222","DOI":"10.1007\/11535218_13"},{"key":"1202_CR2","doi-asserted-by":"crossref","unstructured":"Agudo I, Nu\u00f1ez D, Giammatteo G, Rizomiliotis P, Lambrinoudakis C (2011) Cryptography goes to the cloud. In: Lee C, Seigneur JM, Park J, Wagner R (eds) Secure and trust computing, data management, and applications, communications in computer and information science, vol 187. Springer, New York, pp 190\u2013197","DOI":"10.1007\/978-3-642-22365-5_23"},{"key":"1202_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy 2007, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"1202_CR4","doi-asserted-by":"crossref","unstructured":"Boneh D, Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Proceedings of advances in cryptology\u2014EUROCRYPT 2004. Springer, Interlaken, pp 506\u2013522","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1202_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th theory of cryptography conference, vol 4392. Springer, Amsterdam, pp 535\u2013554","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"1202_CR6","doi-asserted-by":"crossref","unstructured":"Chang Y, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encypted data. In: Proceedings of the 3rd applied cryptography and network security, New York, pp 391\u2013421","DOI":"10.1007\/11496137_30"},{"key":"1202_CR7","doi-asserted-by":"crossref","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definition and efficient constrcutions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, Alexandria, pp 79\u201388","DOI":"10.1145\/1180405.1180417"},{"key":"1202_CR8","unstructured":"Goh E (2003) Secure indexes. In: Report 2003\/216, cryptology ePrint archive. http:\/\/eprint.iacr.org\/2003\/216"},{"key":"1202_CR9","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of the 29th IEEE international conference on computer communications (INFOCOM \u201910). IEEE, San Diego, pp 441\u2013445","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"1202_CR10","doi-asserted-by":"crossref","unstructured":"Li J, Li J, Chen X, Jia C, Liu Z (2012) Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: Proceedings of the 6th international conference on network and system security (NSS \u201912). Lecture notes in computer science, vol 7645. Springer, New York, pp 490\u2013502","DOI":"10.1007\/978-3-642-34601-9_37"},{"issue":"4","key":"1202_CR11","first-page":"5","volume":"1","author":"Y Lu","year":"2011","unstructured":"Lu Y, Tsudik G (2011) Privacy-preserving cloud database querying. J Internet Serv Inf Secur 1(4):5\u201325","journal-title":"J Internet Serv Inf Secur"},{"key":"1202_CR12","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology\u2014EUROCRYPT 2005, vol 3494. Lecture notes in computer science. Springer, Berlin\/Heidelberg, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"1202_CR13","doi-asserted-by":"crossref","unstructured":"Song D, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE symposium on security and privacy. IEEE, Berkeley, pp 44\u201355","DOI":"10.1109\/SECPRI.2000.848445"},{"issue":"2","key":"1202_CR14","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1197\/jamia.M2025","volume":"13","author":"PC Tang","year":"2006","unstructured":"Tang PC, Ash JS, Bates DW, Overhage JM, Sands DZ (2006) Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J Am Med Inform Assoc 13(2):121\u2013126","journal-title":"J Am Med Inform Assoc"},{"key":"1202_CR15","unstructured":"Yu S, Ren K, Lou W (2008) Attribute-based content distribution with hidden policy. In: 4th Workshop on secure network protocols, 2008 (NPSec 2008), pp 39\u201344"},{"key":"1202_CR16","doi-asserted-by":"crossref","unstructured":"Zhang Y, Chen X, Li J, Wong DS, Li H (2013) Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security(ASIACCS \u201913). ACM, Hangzhou, pp 511\u2013516","DOI":"10.1145\/2484313.2484381"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-013-1202-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-013-1202-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-013-1202-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T11:38:53Z","timestamp":1564918733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-013-1202-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"references-count":16,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["1202"],"URL":"https:\/\/doi.org\/10.1007\/s00500-013-1202-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,7]]}}}