{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T03:08:33Z","timestamp":1773371313855,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2014,2,11]],"date-time":"2014-02-11T00:00:00Z","timestamp":1392076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s11042-013-1829-6","type":"journal-article","created":{"date-parts":[[2014,2,9]],"date-time":"2014-02-09T20:44:01Z","timestamp":1391978641000},"page":"3441-3458","source":"Crossref","is-referenced-by-count":59,"title":["Designing cloud-based electronic health record system with attribute-based encryption"],"prefix":"10.1007","volume":"74","author":[{"given":"Fatos","family":"Xhafa","sequence":"first","affiliation":[]},{"given":"Jingwei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Gansen","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,11]]},"reference":[{"issue":"4","key":"1829_CR1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","journal-title":"Commun ACM"},{"key":"1829_CR2","doi-asserted-by":"crossref","unstructured":"Benaloh J, Chase M, Horvitz E, Lauter K (2009) Patient controlled encryption: ensuring privacy of electronic medical records. In: CCSW \u201909 proceedings of the 2009 ACM workshop on cloud computing security, pp 103\u2013114","DOI":"10.1145\/1655008.1655024"},{"key":"1829_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: SP \u201907: proceedings of the 2007 IEEE symposium on security and privacy. IEEE Computer Society, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"1829_CR4","doi-asserted-by":"crossref","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in cryptology-eurocrypt 2004. Springer, pp 506\u2013522","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1829_CR5","doi-asserted-by":"crossref","unstructured":"Chase M (2007) Multi-authority attribute based encryption. Theory Cryptogr Lect Notes Comput Sci 4392:515\u2013534","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"1829_CR6","doi-asserted-by":"crossref","unstructured":"Chase M, Chow S (2009) Improving privacy and security in multi-authority attribute-based encryption. In: CCS \u201909 proceedings of the 16th ACM conference on computer and communications security, pp 121\u2013130","DOI":"10.1145\/1653662.1653678"},{"key":"1829_CR7","doi-asserted-by":"crossref","unstructured":"Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: CCS \u201907: proceedings of the 14th ACM conference on computer and communications security. ACM Request Permissions, pp 456\u2013465","DOI":"10.1145\/1315245.1315302"},{"issue":"3","key":"1829_CR8","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.cmpb.2009.12.001","volume":"99","author":"BS Elger","year":"2010","unstructured":"Elger BS, Iavindrasana J, Lo Iacono L, M\u00fcller H, Roduit N, Summers P, Wright J (2010) Strategies for health data exchange for secondary, cross-institutional clinical research. Comput Methods Prog Biomed 99(3):22\u201322","journal-title":"Comput Methods Prog Biomed"},{"issue":"4","key":"1829_CR9","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1007\/s10916-009-9276-7","volume":"34","author":"MM Farzandipour","year":"2010","unstructured":"Farzandipour MM, Sadoughi FF, Ahmadi MM, Karimi II (2010) Security requirements and solutions in electronic health records: lessons learned from a comparative study. J Med Syst 34(4):629\u2013642","journal-title":"J Med Syst"},{"issue":"3","key":"1829_CR10","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"JL Fern\u00e1ndez-Alem\u00e1n","year":"2013","unstructured":"Fern\u00e1ndez-Alem\u00e1n JL, Se\u00f1or IC, Lozoya P\u00c1O, Toval A (2013) Security and privacy in electronic health records: a systematic literature review. J Biomed Inform 46(3):541\u2013562","journal-title":"J Biomed Inform"},{"key":"1829_CR11","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"1829_CR12","unstructured":"Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. In: SEC\u201911: proceedings of the 20th USENIX conference on Security. USENIX Association, pp 34\u201349"},{"issue":"2","key":"1829_CR13","doi-asserted-by":"crossref","first-page":"e26","DOI":"10.1016\/j.ijmedinf.2010.10.001","volume":"80","author":"S Haas","year":"2011","unstructured":"Haas S, Wohlgemuth S, Echizen I, Sonehara N (2011) Aspects of privacy for electronic health records. Int J Med Inform 80(2):e26\u201331","journal-title":"Int J Med Inform"},{"issue":"5\u20136","key":"1829_CR14","first-page":"7","volume":"32","author":"J Hu","year":"2010","unstructured":"Hu J, Chen H-H, Hou T-W (2010) A hybrid public key infrastructure solution (HPKI) for HIPAA privacy\/security regulations. Comput Stand Interfaces 32(5\u20136):7\u20137","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"1829_CR15","first-page":"34","volume":"12","author":"WBW Lee","year":"2007","unstructured":"Lee WBW, Lee CDC (2007) A cryptographic key management solution for HIPAA privacy\/security regulations. IEEE Trans Inf Technol Biomed 12(1):34\u201341","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"1829_CR16","doi-asserted-by":"crossref","unstructured":"Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (Hierarchical) inner product encryption. In: EUROCRYPT\u201910: proceedings of the 29th annual international conference on theory and applications of cryptographic techniques. Springer-Verlag, pp 62\u201391","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"1829_CR17","doi-asserted-by":"crossref","unstructured":"Lewko A,Waters B (2010) New techniques for dual system encryption and fully secure HIBE with short ciphertexts. Theory Cryptogr Lect Notes Comput Sci 5978:455\u2013479","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"1829_CR18","doi-asserted-by":"crossref","unstructured":"Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: EUROCRYPT\u201911: proceedings of the 30th annual international conference on theory and applications of cryptographic techniques: advances in cryptology, pp 568\u2013588","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"1829_CR19","doi-asserted-by":"crossref","unstructured":"Lewko A, Waters B (2011) Unbounded HIBE and Attribute-Based Encryption. In: EUROCRYPT\u201911: proceedings of the 30th annual international conference on theory and applications of cryptographic techniques: advances in cryptology, pp 547\u2013567","DOI":"10.1007\/978-3-642-20465-4_30"},{"key":"1829_CR20","doi-asserted-by":"crossref","unstructured":"Lewko A, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. Advances in Cryptology\u2013CRYPTO 2012, pp 180\u2013198","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"1829_CR21","doi-asserted-by":"crossref","unstructured":"Li J, Chen X, Li J, Jia C, Ma J, Lou W (2013) Fine-grained access control system based on outsourced attribute-based encryption. In: Computer security\u2013ESORICS 2013, pp 592\u2013609","DOI":"10.1007\/978-3-642-40203-6_33"},{"key":"1829_CR22","doi-asserted-by":"crossref","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2013) Securely Outsourcing Attribute-based Encryption with Checkability. IEEE Trans Parallel Distrib Syst. doi: 10.1109\/TPDS.2013.271","DOI":"10.1109\/TPDS.2013.271"},{"key":"1829_CR23","doi-asserted-by":"crossref","unstructured":"Li J, Jia C, Li J, Chen X (2012) Outsourcing encryption of attribute-based encryption with mapreduce. ICICS\u201912: Proceedings of the 14th international conference on information and communications security, pp 191\u2013201","DOI":"10.1007\/978-3-642-34129-8_17"},{"key":"1829_CR24","doi-asserted-by":"crossref","unstructured":"Li J, Li J, Chen X, Liu Z, Jia C (2014) Privacy-preserving data utilization in hybrid clouds. Futur Gener Comput Syst 30:98\u2013106","DOI":"10.1016\/j.future.2013.06.011"},{"key":"1829_CR25","doi-asserted-by":"crossref","unstructured":"Li J, Li J, Liu Z, Jia C (2013) Enabling efficient and secure data sharing in cloud computing. Concurrency and computation: practice and experience","DOI":"10.1002\/cpe.3067"},{"key":"1829_CR26","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2009) Enabling efficient fuzzy keyword search over encrypted data in cloud computing. IACR Cryptology ePrint Archive, pp 1\u201316"},{"key":"1829_CR27","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM\u201910: proceedings of the 29th conference on information communications. IEEE Press, pp 1\u20135","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"1829_CR28","doi-asserted-by":"crossref","unstructured":"Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: ICDCS \u201911: proceedings of the 2011 31st international conference on distributed computing systems. IEEE Computer Society, pp 383\u2013392","DOI":"10.1109\/ICDCS.2011.55"},{"key":"1829_CR29","doi-asserted-by":"crossref","unstructured":"Menachemi N, Collum TH (2011) Benefits and drawbacks of electronic health record systems. Risk management and healthcare (4), 47\u201355","DOI":"10.2147\/RMHP.S12985"},{"key":"1829_CR30","doi-asserted-by":"crossref","unstructured":"Narayan S, Gagn\u00e9 M, Safavi-Naini R (2010) Privacy preserving EHR system using attribute-based infrastructure. In: CCSW \u201910: proceedings of the 2010 ACM workshop on cloud computing security workshop. ACM Request Permissions, pp 47\u201352","DOI":"10.1145\/1866835.1866845"},{"key":"1829_CR31","doi-asserted-by":"crossref","unstructured":"Neubauer T, Heurix J (2011) Amethodology for the pseudonymization of medical data. Int J Med Inform 80(3):190\u2013204. doi: 10.1016\/j.ijmedinf.2010.10.016","DOI":"10.1016\/j.ijmedinf.2010.10.016"},{"key":"1829_CR32","doi-asserted-by":"crossref","unstructured":"Riedl B, Grascher V, Neubauer T (2007) Applying a threshold scheme to the pseudonymization of health data. In: PRDC \u201907: proceedings of the 13th pacific rim international symposium on dependable computing. IEEE Computer Society, pp 397\u2013400","DOI":"10.1109\/PRDC.2007.24"},{"issue":"11","key":"1829_CR33","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1258\/jrsm.95.11.545","volume":"95","author":"FJ Rodr\u00edguez-Vera","year":"2002","unstructured":"Rodr\u00edguez-Vera FJ, Marin Y, Sanchez A, Borrachero C (2002) Illegible handwriting in medical records. J Roy Med Rec 95(11):545\u2013546","journal-title":"J Roy Med Rec"},{"key":"1829_CR34","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy Identity-Based Encryption. In: EUROCRYPT\u201905: proceedings of the 24th annual international conference on theory and applications of cryptographic techniques. Springer-Verlag, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"issue":"11","key":"1829_CR35","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"key":"1829_CR36","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of the IEEE symposium on security and privacy, 2000. S&P 2000, pp 44\u201355"},{"key":"1829_CR37","doi-asserted-by":"crossref","unstructured":"Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography\u2013PKC 2011. Springer, pp 53\u201370","DOI":"10.1007\/978-3-642-19379-8_4"},{"issue":"2","key":"1829_CR38","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/S0147-9563(97)90076-5","volume":"26","author":"EHE Winslow","year":"1997","unstructured":"Winslow EHE, Nestor VAV, Davidoff SKS, Thompson PGP, Borum JCJ (1997) Legibility and completeness of physicians\u2019 handwritten medication orders. Heart Lung J Acute Crit Care 26(2):158\u2013164","journal-title":"Heart Lung J Acute Crit Care"},{"key":"1829_CR39","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM. IEEE, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"1829_CR40","unstructured":"Zhang RZR, Liu LLL (2010) Security models and requirements for healthcare application clouds. 2010 IEEE 3rd international conference on cloud computing (CLOUD), pp 268\u2013275"},{"key":"1829_CR41","unstructured":"Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: 2012 8th international conference on network and service management (CNSM). IEEE, pp 37\u201345"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1829-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1829-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1829-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T09:26:03Z","timestamp":1565169963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1829-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,11]]},"references-count":41,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["1829"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1829-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,11]]}}}