{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:10:56Z","timestamp":1755925856406},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T00:00:00Z","timestamp":1403654400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s11227-014-1253-3","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T08:35:32Z","timestamp":1403598932000},"page":"1607-1619","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["Privacy-aware attribute-based PHR sharing with user accountability in cloud computing"],"prefix":"10.1007","volume":"71","author":[{"given":"Fatos","family":"Xhafa","sequence":"first","affiliation":[]},{"given":"Jianglang","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yinghui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,25]]},"reference":[{"issue":"6","key":"1253_CR1","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1197\/jamia.M2547","volume":"15","author":"DC Kaelber","year":"2008","unstructured":"Kaelber DC, Jha AK, Johnston D, Middleton B, Bates DW (2008) A research agenda for personal health records (phrs). J Am Med Inform Assoc 15(6):729\u2013736","journal-title":"J Am Med Inform Assoc"},{"key":"1253_CR2","doi-asserted-by":"crossref","unstructured":"Ibraimi L, Asim M, Petkovic M (2009) Secure management of personal health records by applying attribute-based encryption. In: Proceeding of the pHealth\u201909, IEEE, pp 71\u201374","DOI":"10.1109\/PHEALTH.2009.5754828"},{"key":"1253_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceeding of the SP\u201907, IEEE, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"1253_CR4","doi-asserted-by":"crossref","unstructured":"Akinyele JA, Pagano MW, Green MD, Lehmann CU, Peterson ZN, Rubin AD (2011) Securing electronic medical records using attribute-based encryption on mobile devices. In: Proceeding of the SPSM\u201911, ACM, pp 75\u201386","DOI":"10.1145\/2046614.2046628"},{"issue":"1","key":"1253_CR5","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131\u2013143","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1253_CR6","doi-asserted-by":"crossref","unstructured":"Chase M (2007) Multi-authority attribute based encryption. In: Proceeding of the TCC\u201907, LNCS, vol 4392. Springer, New York, pp 515\u2013534","DOI":"10.1007\/978-3-540-70936-7_28"},{"issue":"3","key":"1253_CR7","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1109\/TPDS.2012.146","volume":"24","author":"R Lu","year":"2013","unstructured":"Lu R, Lin X, Shen X (2013) Spoc: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans Parallel Distrib Syst 24(3):614\u2013624","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"1253_CR8","doi-asserted-by":"crossref","first-page":"4005","DOI":"10.1007\/s10916-012-9873-8","volume":"36","author":"TS Chen","year":"2012","unstructured":"Chen TS, Liu CH, Chen TL, Chen CS, Bau JG, Lin TC (2012) Secure dynamic access control scheme of phr in cloud computing. J Med Syst 36(6):4005\u20134020","journal-title":"J Med Syst"},{"key":"1253_CR9","doi-asserted-by":"crossref","unstructured":"Zhang R, Liu L (2010) Security models and requirements for healthcare application clouds. In: Proceeding of the CLOUD\u201910, IEEE, pp 268\u2013275","DOI":"10.1109\/CLOUD.2010.62"},{"issue":"6","key":"1253_CR10","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1109\/TPDS.2009.124","volume":"21","author":"J Sun","year":"2010","unstructured":"Sun J, Fang Y (2010) Cross-domain data sharing in distributed electronic health record systems. IEEE Trans Parallel Distrib Syst 21(6):754\u2013764","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1253_CR11","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceeding of the EUROCRYPT\u201905, LNCS, vol 3494. Springer, New York, pp 557\u2013557","DOI":"10.1007\/11426639_27"},{"key":"1253_CR12","unstructured":"Li J, Chen X, Li J, Jia C, Ma J, Lou W (2013) Fine-grained access control based on outsourced attribute-based encryption. In: Proceeding of the European symposium on research in computer security (ESORICS). LNCS, vol 3184, pp 592\u2013609"},{"issue":"9","key":"1253_CR13","doi-asserted-by":"crossref","first-page":"1681","DOI":"10.1016\/j.ins.2010.01.008","volume":"180","author":"J Li","year":"2010","unstructured":"Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inform Sci 180(9):1681\u20131689","journal-title":"Inform Sci"},{"key":"1253_CR14","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceeding of the CCS\u201906, ACM, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"1253_CR15","unstructured":"Kapadia A, Tsang PP, Smith SW (2007) Attribute-based publishing with hidden credentials and hidden policies. In: Proceeding of the NDSS\u201907, The Internet Society, pp 179\u2013192"},{"key":"1253_CR16","unstructured":"Nishide T, Yoneyama K, Ohta K (2008) Abe with partially hidden encryptor-specified access structure. In: Proceeding of the ACNS\u201908, LNCS, vol 5037. Springer, New York, pp 111\u2013129"},{"key":"1253_CR17","doi-asserted-by":"crossref","unstructured":"Zhang Y, Chen X, Li J, Wong DS, Li H (2013) Anonymous attribute-based encryption supporting efficient decryption test. In: Proceeding of the ASIACCS\u201913, ACM, New York, pp 511\u2013516","DOI":"10.1145\/2484313.2484381"},{"key":"1253_CR18","doi-asserted-by":"crossref","unstructured":"Yu S, Ren K, Lou W, Li J (2009) Defending against key abuse attacks in kp-abe enabled broadcast systems. In: Proceeding of the Securecomm\u201909, Springer, New York, pp 311\u2013329","DOI":"10.1007\/978-3-642-05284-2_18"},{"key":"1253_CR19","unstructured":"Li J, Ren K, Zhu B, Wan Z (2009) Privacy-aware attribute-based encryption with user accountability. In: Proceeding of the ISC\u201909. Springer, LNCS, vol 5735, pp 347\u2013362"},{"key":"1253_CR20","doi-asserted-by":"crossref","unstructured":"Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y (2010) Fine-grained data access control systems with user accountability in cloud computing. In: Proceeding of the CloudCom\u201910, IEEE, pp 89\u201396","DOI":"10.1109\/CloudCom.2010.44"},{"key":"1253_CR21","doi-asserted-by":"crossref","unstructured":"Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceeding of the ASIACCS\u201911, ACM, pp 386\u2013390","DOI":"10.1145\/1966913.1966964"},{"key":"1253_CR22","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Attribute based data sharing with attribute revocation. In: Proceeding of the ASIACCS\u201910, ACM, New York, pp 261\u2013270","DOI":"10.1145\/1755688.1755720"},{"key":"1253_CR23","doi-asserted-by":"crossref","unstructured":"Boyen X, Waters B (2006) Anonymous hierarchical identity-based encryption (without random oracles). In: Proceeding of the CRYPTO\u201906, Springer, LNCS, vol 4117, pp 290\u2013307","DOI":"10.1007\/11818175_17"},{"key":"1253_CR24","doi-asserted-by":"crossref","unstructured":"Chase M, Chow SS (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Proceeding of the CCS\u201909, ACM, New York, pp 121\u2013130","DOI":"10.1145\/1653662.1653678"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1253-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-014-1253-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1253-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:40:35Z","timestamp":1559371235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-014-1253-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,25]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["1253"],"URL":"https:\/\/doi.org\/10.1007\/s11227-014-1253-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,25]]}}}