{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:55:15Z","timestamp":1772063715239,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T00:00:00Z","timestamp":1474416000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10916-016-0588-0","type":"journal-article","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T07:01:24Z","timestamp":1474441284000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":83,"title":["Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds"],"prefix":"10.1007","volume":"40","author":[{"given":"Cheng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Ruhan","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Yingmo","family":"Jie","sequence":"additional","affiliation":[]},{"given":"Yizhi","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,21]]},"reference":[{"key":"588_CR1","unstructured":"Microsoft HealthVault (2015) http:\/\/www.healthvault.com . Accessed May 1, 2015"},{"key":"588_CR2","unstructured":"Google Health (2013) https:\/\/www.google.com\/health . Accessed Jan. 1, 2013"},{"key":"588_CR3","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cose.2014.11.006","volume":"49","author":"NHA Rahman","year":"2015","unstructured":"Rahman, N. H. A., and Choo, K. R., A survey of information security incident handling in the cloud. Comput. Secur. 49:45\u201369, 2015. doi: 10.1016\/j.cose.2014.11.006 .","journal-title":"Comput. Secur."},{"issue":"1","key":"588_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MCC.2016.18","volume":"3","author":"C Esposito","year":"2016","unstructured":"Esposito, C., Castiglione, A., and Choo, K. K. R., Encryption-Based Solution for Data Sovereignty in Federated Clouds. IEEE Cloud Comput. 3(1):12\u201317, 2016. doi: 10.1109\/MCC.2016.18 .","journal-title":"IEEE Cloud Comput."},{"issue":"2","key":"588_CR5","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MCC.2015.36","volume":"2","author":"S Nepal","year":"2015","unstructured":"Nepal, S., Ranjan, R., and Choo, K. K. R., Trustworthy Processing of Healthcare Big Data in Hybrid Clouds. IEEE Cloud Comput. 2(2):78\u201384, 2015. doi: 10.1109\/MCC.2015.36 .","journal-title":"IEEE Cloud Comput."},{"key":"588_CR6","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-1-4899-7439-6_6","volume-title":"ICTs and the Millennium Development Goals: A United Nations Perspective","author":"K-KR Choo","year":"2014","unstructured":"Choo, K.-K. R., A Conceptual Interdisciplinary Plug-and-Play Cyber Security Framework. In: Kaur, H., and Tao, X. (Eds.), ICTs and the Millennium Development Goals: A United Nations Perspective. Springer US, Boston, MA, pp. 81\u201399, 2014. doi: 10.1007\/978-1-4899-7439-6_6 ."},{"key":"588_CR7","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1093\/oxfordhb\/9780199730445.013.003","volume-title":"Oxford Handbook of Organized Crime","author":"KKR Choo","year":"2013","unstructured":"Choo, K. K. R., and Grabosky, P., Cyber Crime. In: Paoli, L. (Ed.), Oxford Handbook of Organized Crime. Oxford University Press, New York, pp. 482\u2013499, 2013. doi: 10.1093\/oxfordhb\/9780199730445.013.003 ."},{"key":"588_CR8","first-page":"1","volume":"408","author":"CR Kim-Kwang","year":"2011","unstructured":"Kim-Kwang, C. R., Cyber threat landscape faced by financial and insurance industry. Trends Issues Crime Crim. Justice 408:1\u20136, 2011. http:\/\/www.aic.gov.au\/publications\/current%20series\/tandi\/401-420\/tandi408.html .","journal-title":"Trends Issues Crime Crim. Justice"},{"key":"588_CR9","first-page":"6","volume":"2","author":"US Congress","year":"1996","unstructured":"Congress, U. S., Health Insurance Portability and Accountability Act of. Tabers Cyclopedic Med. Dictionary 2:6, 1996.","journal-title":"Tabers Cyclopedic Med. Dictionary"},{"issue":"2","key":"588_CR10","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Shen, J., Wang, J., Han, J., and Lee, S., Mutual Verifiable Provable Data Auditing in Public Cloud Storage. J. Internet Technol. 16(2):317\u2013323, 2015.","journal-title":"J. Internet Technol."},{"issue":"4","key":"588_CR11","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1587\/transinf.2014EDP7283","volume":"98","author":"T Ma","year":"2015","unstructured":"Ma, T., Zhou, J., Tang, M., Tian, Y., Aldhelaan, A., Alrodhaan, M., and Lee, S., Social Network and Tag Sources Based Augmenting Collaborative Recommender System. IEICE Trans. Inf. Syst. 98(4):902\u2013910, 2015.","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"8","key":"588_CR12","doi-asserted-by":"publisher","first-page":"1847","DOI":"10.1109\/TIFS.2016.2561241","volume":"11","author":"L Li","year":"2016","unstructured":"Li, L., Lu, R., Choo, K. K. R., Datta, A., and Shao, J., Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases. IEEE Trans. Inf. Forensics Secur. 11(8):1847\u20131861, 2016. doi: 10.1109\/TIFS.2016.2561241 .","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"588_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536601","author":"X Liu","year":"2016","unstructured":"Liu, X., Choo, R., Deng, R., Lu, R., and Weng, J., Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. IEEE Trans. Depend. Secure Comput. 2016. doi: 10.1109\/TDSC.2016.2536601 .","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"1","key":"588_CR14","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1109\/TIFS.2016.2573770","volume":"11","author":"X Liu","year":"2016","unstructured":"Liu, X., Deng, R., Choo, K. K. R., and Weng, J., An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys. IEEE Trans. Inf. Forensics Secur. 11(1):2401\u20132414, 2016. doi: 10.1109\/TIFS.2016.2573770 .","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"588_CR15","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Sun, X., and Wang, Q., A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans. Parallel Distrib. Syst. 27(2):340\u2013352, 2016.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"588_CR16","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98.B","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Sun, X., Liu, Q., Zhou, L., and Shu, J., Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing. IEICE Trans. Commun. E98.B(1):190\u2013200, 2015.","journal-title":"IEICE Trans. Commun."},{"key":"588_CR17","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19\u201323, 2001 Proceedings","author":"D Boneh","year":"2001","unstructured":"Boneh, D., and Franklin, M., Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (Ed.), Advances in Cryptology \u2014 CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19\u201323, 2001 Proceedings. Springer, Berlin Heidelberg, pp. 213\u2013229, 2001. doi: 10.1007\/3-540-44647-8_13 ."},{"key":"588_CR18","doi-asserted-by":"publisher","unstructured":"Tep KS, Martini B, Hunt R, Choo KKR A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management. In: Trustcom\/BigDataSE\/ISPA, 2015 IEEE, 20\u201322 Aug. 2015 2015. pp 1073\u20131080. doi: 10.1109\/Trustcom.2015.485","DOI":"10.1109\/Trustcom.2015.485"},{"key":"588_CR19","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, 2005. Proceedings","author":"A Sahai","year":"2005","unstructured":"Sahai, A., and Waters, B., Fuzzy Identity-Based Encryption. In: Cramer, R. (Ed.), Advances in Cryptology \u2013 EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, 2005. Proceedings. Springer, Berlin Heidelberg, pp. 457\u2013473, 2005. doi: 10.1007\/11426639_27 ."},{"key":"588_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11","author":"J Bethencourt","year":"2007","unstructured":"Bethencourt, J., Sahai, A., and Waters, B., Ciphertext-Policy Attribute-Based Encryption. Sci. Program. 2007. doi: 10.1109\/SP.2007.11 .","journal-title":"Sci. Program."},{"key":"588_CR21","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. Paper presented at the Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, Virginia, USA.","DOI":"10.1145\/1180405.1180418"},{"issue":"7","key":"588_CR22","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1109\/TIFS.2015.2491261","volume":"11","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Seo, H., Gro\u00dfsch\u00e4dl, J., and Kim, H., Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes. IEEE Trans. Inf. Forensics Secur. 11(7):1385\u20131397, 2016.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"588_CR23","doi-asserted-by":"crossref","unstructured":"Liu Z, Huang X, Hu Z, Khan MK (2016) On emerging family of elliptic curves to secure internet of things: ECC Comes of Age. IEEE Transactions on Dependable & Secure Computing:1\u20131","DOI":"10.1109\/TDSC.2016.2577022"},{"key":"588_CR24","doi-asserted-by":"crossref","unstructured":"Boldyreva A, Goyal V, Kumar V (2008) Identity-based encryption with efficient revocation. Paper presented at the Proceedings of the 15th ACM conference on Computer and communications security, Alexandria, Virginia, USA.","DOI":"10.1145\/1455770.1455823"},{"key":"588_CR25","volume-title":"Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes (extended version). Centre for Telematics and Information Technology","author":"L Ibraimi","year":"2009","unstructured":"Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., and Jonker, W., Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes (extended version). Centre for Telematics and Information Technology. University of Twente, Enschede, 2009."},{"key":"588_CR26","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Attribute based data sharing with attribute revocation. Paper presented at the Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China.","DOI":"10.1145\/1755688.1755720"},{"key":"588_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174","author":"S Yu","year":"2010","unstructured":"Yu, S., Wang, C., Ren, K., and Lou, W., Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. Int. Conf. Comput. Commun. 2010. doi: 10.1109\/INFCOM.2010.5462174 .","journal-title":"Int. Conf. Comput. Commun."},{"key":"588_CR28","doi-asserted-by":"publisher","unstructured":"Ibraimi L, Asim M, Petkovic M (2009) Secure management of personal health records by applying attribute-based encryption. doi: 10.1109\/PHEALTH.2009.5754828","DOI":"10.1109\/PHEALTH.2009.5754828"},{"key":"588_CR29","unstructured":"Akinyele JA, Lehmann CU, Green MD, Pagano MW, Peterson ZNJ, Rubin AD (2010) Self-Protecting Electronic Medical Records Using Attribute-Based Encryption. Faculty Publications 2010"},{"key":"588_CR30","unstructured":"University of California, Irvine. (1990). https:\/\/archive.ics.uci.edu\/ml\/datasets.html ."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0588-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0588-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0588-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T13:56:28Z","timestamp":1497966988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0588-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,21]]},"references-count":30,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["588"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0588-0","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,21]]},"article-number":"235"}}