{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:53:20Z","timestamp":1770843200985,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T00:00:00Z","timestamp":1475712000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100004358","name":"Samsung Electronics","doi-asserted-by":"crossref","award":["SRFC-TB1403-03"],"award-info":[{"award-number":["SRFC-TB1403-03"]}],"id":[{"id":"10.13039\/100004358","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Research Foundation of Korea (KR)","award":["2013H1A2A1033834"],"award-info":[{"award-number":["2013H1A2A1033834"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10916-016-0621-3","type":"journal-article","created":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T09:19:49Z","timestamp":1475745589000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System"],"prefix":"10.1007","volume":"40","author":[{"given":"Jieun","family":"Eom","sequence":"first","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kwangsu","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,6]]},"reference":[{"key":"621_CR1","unstructured":"104th United States Congress. Health Insurance Portability and Accountability Act (HIPAA), 1996. http:\/\/aspe.hhs.gov\/admnsimp\/pl104191.htm"},{"issue":"4","key":"621_CR2","doi-asserted-by":"crossref","first-page":"1431","DOI":"10.1109\/JBHI.2014.2300846","volume":"18","author":"A Abbas","year":"2014","unstructured":"Abbas, A., and Khan, S. U. h., A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J. Biomed. Health Inf. 18(4):1431\u20131441, 2014.","journal-title":"IEEE J. Biomed. Health Inf."},{"issue":"3","key":"621_CR3","doi-asserted-by":"crossref","first-page":"621","DOI":"10.3390\/fi4030621","volume":"4","author":"E AbuKhousa","year":"2012","unstructured":"AbuKhousa, E., Mohamed, N., and Al-Jaroodi, J., e-health cloud: opportunities and challenges. Futur. Internet 4(3):621\u2013645, 2012.","journal-title":"Futur. Internet"},{"issue":"2","key":"621_CR4","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"JA Akinyele","year":"2013","unstructured":"Akinyele, J. A., Garman, C., Miers, I., Pagano, M. W., Rushanan, M., Green, M., and Rubin, A. D., Charm: a framework for rapidly prototyping cryptosystems. J. Cryptograph. Eng. 3(2):111\u2013128, 2013.","journal-title":"J. Cryptograph. Eng."},{"key":"621_CR5","doi-asserted-by":"crossref","unstructured":"Akinyele, J. A., Pagano, M. W., Green, M. D., Lehmann, C. U., Peterson, Z. N. J., and Rubin, A. D., Securing electronic medical records using attribute-based encryption on mobile devices. In: SPSM\u201911, pp. 75\u201386. ACM (2011)","DOI":"10.1145\/2046614.2046628"},{"issue":"3","key":"621_CR6","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"JL Ferna\u0307ndez Alema\u0307n","year":"2013","unstructured":"Ferna\u0307ndez Alema\u0307n, J. L., Carrio\u0307n Sen\u0307or, I., Lozoya, P. A\u0307. O., and Toval, A., Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inf. 46(3):541\u2013562, 2013.","journal-title":"J. Biomed. Inf."},{"key":"621_CR7","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Chase, M., Horvitz, E., and Lauter, K. E., Patient controlled encryption: ensuring privacy of electronic medical records. In: CCSW 2009, pp. 103\u2013114. ACM, 2009","DOI":"10.1145\/1655008.1655024"},{"key":"621_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Boyen, X., Efficient selective-id secure identity-based encryption without random oracles. In: Cachin, C., and Camenisch, J. (Eds.) Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pp. 223\u2013238. Springer, 2004.","DOI":"10.1007\/978-3-540-24676-3_14"},{"issue":"6","key":"621_CR9","doi-asserted-by":"crossref","first-page":"4005","DOI":"10.1007\/s10916-012-9873-8","volume":"36","author":"T-S Chen","year":"2012","unstructured":"Chen, T.-S., Liu, C.-H., Chen, T.-L., Chen, C.-S., Bau, J.-G., and Lin, T.-C., Secure dynamic access control scheme of PHR in cloud computing. J. Med. Syst. 36(6):4005\u20134020, 2012.","journal-title":"J. Med. Syst."},{"key":"621_CR10","unstructured":"Dong, N., Jonker, H., and Pang, J., Challenges in ehealth: From enabling to enforcing privacy. In: Foundations of Health Informatics Engineering and Systems, pp. 195\u2013206. Springer, 2011."},{"key":"621_CR11","unstructured":"European Comission. Directive 95\/46\/EC on Data Protection - data protection in the area of public health, 2011. http:\/\/ec.europa.eu\/health\/data_collection\/data_protection\/"},{"key":"621_CR12","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.is.2014.05.004","volume":"48","author":"B Fabian","year":"2015","unstructured":"Fabian, B., Ermakova, T., and Junghanns, P., Collaborative and secure sharing of healthcare data in multi- clouds. Inf. Syst. 48:132\u2013150, 2015.","journal-title":"Inf. Syst."},{"issue":"9","key":"621_CR13","first-page":"2546","volume":"27","author":"F Zhangjie","year":"2015","unstructured":"Zhangjie, F., Ren, K., Shu, J., Sun, X., and Huang, F., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9):2546\u20132559, 2015.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"621_CR14","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98-B","author":"F Zhangjie","year":"2015","unstructured":"Zhangjie, F., Sun, X., Qi, L., Zhou, L., and Shu, J., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1):190\u2013200, 2015.","journal-title":"IEICE Trans. Commun."},{"issue":"2","key":"621_CR15","doi-asserted-by":"crossref","first-page":"e26","DOI":"10.1016\/j.ijmedinf.2010.10.001","volume":"80","author":"S Haas","year":"2011","unstructured":"Haas, S, Wohlgemuth, S., Echizen, I., Sonehara, N., and Mu\u0307ller, G., Aspects of privacy for electronic health records. I. J. Med. Inf. 80(2):e26\u2013e31, 2011.","journal-title":"I. J. Med. Inf."},{"issue":"5\u20136","key":"621_CR16","first-page":"274","volume":"32","author":"H Jiankun","year":"2010","unstructured":"Jiankun, H., Chen, H.-H., and Hou, T.-W., A hybrid public key infrastructure solution (HPKI) for HIPAA privacy\/security regulations. Comput. Standards Interf. 32(5\u20136):274\u2013280, 2010.","journal-title":"Comput. Standards Interf."},{"issue":"1","key":"621_CR17","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10623-015-0039-9","volume":"79","author":"K Lee","year":"2016","unstructured":"Lee, K., Self-updatable encryption with short public parameters and its extensions. Des. Codes Cryptograph. 79(1):121\u2013161, 2016.","journal-title":"Des. Codes Cryptograph."},{"key":"621_CR18","unstructured":"Lee, K., Choi, S. G., Lee, D. H., Park, J. H., and Yung, M., Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency. In: Sako, K., and Sarkar, P. (Eds.) Advances in Cryptology - ASIACRYPT 2013, volume 8269 of Lecture Notes in Computer Science, pp. 235\u2013254. Springer ,2013."},{"issue":"1","key":"621_CR19","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TITB.2007.906101","volume":"12","author":"W-B Lee","year":"2008","unstructured":"Lee, W.-B., and Lee, C.-D., A cryptographic key management solution for HIPAA privacy\/security regulations. IEEE Trans. Inf. Technol. Biomed. 12(1):34\u201341, 2008.","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"621_CR20","doi-asserted-by":"crossref","unstructured":"Li, M., Shucheng, Y., Cao, N., and Lou, W., Authorized private keyword search over encrypted data in cloud computing. In: International Conference on Distributed Computing Systems, pp. 383\u2013392. IEEE, 2011.","DOI":"10.1109\/ICDCS.2011.55"},{"key":"621_CR21","unstructured":"Li, M., Shucheng, Y., Ren, K., and Lou, W., Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In: SecureComm 2010, pp. 89\u2013106. Springer, 2010."},{"issue":"1","key":"621_CR22","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Shucheng, Y., Zheng, Y., Ren, K., and Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1):131\u2013143, 2013.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"621_CR23","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","volume":"52","author":"J Liu","year":"2015","unstructured":"Liu, J., Huang, X., and Liu, J. K., Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption. Futur. Gen. Comp. Syst. 52:67\u201376, 2015.","journal-title":"Futur. Gen. Comp. Syst."},{"key":"621_CR24","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1186\/1472-6947-7-25","volume":"7","author":"KD Mandl","year":"2007","unstructured":"Mandl, K. D., Simons, W. W., Crawford, W. C. R., and Abbett, J. M., Indivo: a personally controlled health record for health information exchange and communication. BMC Med. Inf. Decis. Making 7:25, 2007.","journal-title":"BMC Med. Inf. Decis. Making"},{"key":"621_CR25","doi-asserted-by":"crossref","unstructured":"Narayan, S., Gagn\u0117, M., and Safavi-Naini, R., Privacy preserving EHR system using attribute-based infrastructure. In: CCSW 2010, pp. 47\u201352. ACM, 2010.","DOI":"10.1145\/1866835.1866845"},{"issue":"3","key":"621_CR26","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.ijmedinf.2010.10.016","volume":"80","author":"T Neubauer","year":"2011","unstructured":"Neubauer, T., and Heurix, J., A methodology for the pseudonymization of medical data. I. J. Med. Inf. 80 (3):190\u2013204, 2011.","journal-title":"I. J. Med. Inf."},{"key":"621_CR27","doi-asserted-by":"crossref","unstructured":"Prince, P. B., Krishnamoorthy, K., Anandaraj, R., Jeno Lovesum, S. P., Rsa-dabe: A novel approach for secure health data sharing in ubiquitous computing environment. Indian J. Sci. Technol. 8(17), 2015.","DOI":"10.17485\/ijst\/2015\/v8i17\/69535"},{"issue":"6","key":"621_CR28","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1007\/s10207-014-0272-7","volume":"14","author":"Q Bo","year":"2015","unstructured":"Bo, Q., Deng, H., Qianhong, W., Domingo-Ferrer, J., Naccache, D., and Zhou, Y., Flexible attribute-based encryption applicable to secure e-healthcare records. Int. J. Inf. Sec. 14(6):499\u2013511, 2015.","journal-title":"Int. J. Inf. Sec."},{"issue":"2","key":"621_CR29","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1016\/j.jbi.2009.08.014","volume":"43","author":"A Rosenthal","year":"2010","unstructured":"Rosenthal, A., Mork, P., Li, M.H., Stanford, J., Koester, D., and Reynolds, P., Cloud computing: A new business paradigm for biomedical information sharing. J. Biomed. Inf. 43(2):342\u2013353, 2010.","journal-title":"J. Biomed. Inf."},{"key":"621_CR30","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., Waters, B., and Gligor, V. D., Practical constructions and new proof methods for large universe attribute-based encryption. In: Sadeghi, A.-R., and Yung, M. (Eds.) CCS 2013, pp. 463\u2013474. ACM, 2013.","DOI":"10.1145\/2508859.2516672"},{"key":"621_CR31","doi-asserted-by":"crossref","unstructured":"Shi, J., Lai, J., Li, Y., Deng, R. H., and Weng, J., Authorized keyword search on encrypted data. In: ESORICS 2014, vol. 8712, pp. 419\u2013435. Springer, 2014.","DOI":"10.1007\/978-3-319-11203-9_24"},{"key":"621_CR32","unstructured":"Sunyaev, A., Chornyi, D., Mauro, C., and Krcmar, H., Evaluation framework for personal health records: Microsoft healthvault vs. google health. In: HICSS-43 2010, pp. 1\u201310. IEEE, 2010."},{"key":"621_CR33","unstructured":"Szolovits, P., Doyle, J., Long, W. J, Kohane, I., and Pauker, S. G., Guardian angel: Patient-centered health information systems. Technical report, Cambridge, MA, USA, 1994."},{"issue":"2","key":"621_CR34","first-page":"121","volume":"13","author":"PC Tang","year":"2006","unstructured":"Tang, P. C., Ash, J. S., Bates, D. W., Marc Overhage, J., and Sands, D. Z., Personal health records: Definitions, benefits, and strategies for overcoming barriers to adoption. JAMIA 13(2):121\u2013126, 2006.","journal-title":"JAMIA"},{"key":"621_CR35","unstructured":"U.S. Department of Health and Human Services. Health Information Technology for Economic and Clinical Health (HITECH) Act, 2009, http:\/\/www.hhs.gov\/hipaa\/for-professionals\/special-topics\/HITECH-act-enforcement-interim-final-rule\/"},{"issue":"2","key":"621_CR36","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2012","unstructured":"Wan, Z., Liu, J., Deng, R. H, HSBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forens. Secur. 7(2):743\u2013754 , 2012.","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"621_CR37","doi-asserted-by":"crossref","unstructured":"Wang, C., Xu, X.-L., Shi, D.-Y., Fang, J., Privacy-preserving cloud-based personal health record system using attribute-based encryption and anonymous multi-receiver identity-based encryption. Informatica 39(4), 2015.","DOI":"10.1109\/3PGCIC.2014.38"},{"issue":"2","key":"621_CR38","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia, Z., Wang, X., Sun, X., and Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2):340\u2013352, 2015.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"621_CR39","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43\u201344","author":"J-J Yang","year":"2015","unstructured":"Yang, J.-J., Li, J., Niu, Y., A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gen. Comp. Syst. 43\u201344:74\u201386, 2015.","journal-title":"Future Gen. Comp. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0621-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0621-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0621-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T06:48:53Z","timestamp":1589698133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0621-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,6]]},"references-count":39,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["621"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0621-3","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,6]]},"article-number":"253"}}