{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T12:43:22Z","timestamp":1745757802624},"reference-count":56,"publisher":"Oxford University Press (OUP)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12,1]]},"DOI":"10.1093\/comjnl\/bxx071","type":"journal-article","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T19:12:10Z","timestamp":1501096330000},"page":"1871-1888","source":"Crossref","is-referenced-by-count":5,"title":["Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds"],"prefix":"10.1093","volume":"60","author":[{"given":"Weiran","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2017,8,10]]},"reference":[{"key":"key\n\t\t\t\t20171208024723_bxx071C1","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MITP.2010.53","article-title":"Developing electronic health records in Taiwan","volume":"12","year":"2010","journal-title":"IT Prof."},{"key":"key\n\t\t\t\t20171208024723_bxx071C2","year":"2010"},{"key":"key\n\t\t\t\t20171208024723_bxx071C3","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1504\/IJSN.2011.043666","article-title":"Espac: enabling security and patient-centric access control for ehealth in cloud computing","volume":"6","year":"2011","journal-title":"Int. J. Secur. Netw."},{"key":"key\n\t\t\t\t20171208024723_bxx071C4","year":"2010"},{"key":"key\n\t\t\t\t20171208024723_bxx071C5","year":"2010"},{"key":"key\n\t\t\t\t20171208024723_bxx071C6","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","article-title":"Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption","volume":"24","year":"2013","journal-title":"IEEE Trans. Parallel Distributed Syst."},{"key":"key\n\t\t\t\t20171208024723_bxx071C7","year":"2009"},{"key":"key\n\t\t\t\t20171208024723_bxx071C8","year":"2012"},{"key":"key\n\t\t\t\t20171208024723_bxx071C9","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/TDSC.2013.2297110","article-title":"Robust multi-factor authentication for fragile communications","volume":"11","year":"2014","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"key\n\t\t\t\t20171208024723_bxx071C10","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TC.2014.2315619","article-title":"Cost-effective authentic and anonymous data sharing with forward security","volume":"64","year":"2015","journal-title":"IEEE. Trans. Comput."},{"key":"key\n\t\t\t\t20171208024723_bxx071C11","year":"2009"},{"key":"key\n\t\t\t\t20171208024723_bxx071C12","year":"2008"},{"key":"key\n\t\t\t\t20171208024723_bxx071C13","author":"Report 2010\/565","year":"2010"},{"key":"key\n\t\t\t\t20171208024723_bxx071C14","year":"2010"},{"key":"key\n\t\t\t\t20171208024723_bxx071C15","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TDSC.2014.2366471","article-title":"New publicly verifiable databases with efficient updates","volume":"12","year":"2015","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"key\n\t\t\t\t20171208024723_bxx071C16","doi-asserted-by":"crossref","first-page":"3293","DOI":"10.1109\/TC.2015.2401036","article-title":"Verifiable auditing for outsourced database in cloud computing","volume":"64","year":"2015","journal-title":"IEEE. Trans. Comput."},{"key":"key\n\t\t\t\t20171208024723_bxx071C17","year":"2005"},{"key":"key\n\t\t\t\t20171208024723_bxx071C18","year":"2006"},{"key":"key\n\t\t\t\t20171208024723_bxx071C19","first-page":"1","article-title":"New threats to health data privacy","volume":"12","year":"2011","journal-title":"BMC. Bioinform."},{"key":"key\n\t\t\t\t20171208024723_bxx071C20","year":"2008"},{"key":"key\n\t\t\t\t20171208024723_bxx071C21","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1109\/TITB.2009.2033055","article-title":"Ibe-lite: a lightweight identity-based cryptography for body sensor networks","volume":"13","year":"2009","journal-title":"IEEE. Trans. Inf. Technol. Biomed."},{"key":"key\n\t\t\t\t20171208024723_bxx071C22","year":"2012"},{"key":"key\n\t\t\t\t20171208024723_bxx071C23","doi-asserted-by":"crossref","first-page":"1992","DOI":"10.1109\/TC.2015.2462840","article-title":"Two-factor data security protection mechanism for cloud storage system","volume":"65","year":"2016","journal-title":"IEEE. Trans. Comput."},{"key":"key\n\t\t\t\t20171208024723_bxx071C24","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1109\/TPDS.2009.124","article-title":"Cross-domain data sharing in distributed electronic health record systems","volume":"21","year":"2010","journal-title":"IEEE Trans. Parallel Distributed Syst."},{"key":"key\n\t\t\t\t20171208024723_bxx071C25","year":"2011"},{"key":"key\n\t\t\t\t20171208024723_bxx071C26","year":"2016"},{"key":"key\n\t\t\t\t20171208024723_bxx071C27","year":"2006"},{"key":"key\n\t\t\t\t20171208024723_bxx071C28","year":"2012"},{"key":"key\n\t\t\t\t20171208024723_bxx071C29","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","article-title":"Hasbe: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing","volume":"7","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t20171208024723_bxx071C30","year":"2011"},{"key":"key\n\t\t\t\t20171208024723_bxx071C31","year":"2012"},{"key":"key\n\t\t\t\t20171208024723_bxx071C32","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/TIFS.2016.2549004","article-title":"Attribute-based data sharing scheme revisited in cloud computing","volume":"11","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t20171208024723_bxx071C33","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.ijmedinf.2006.09.015","article-title":"Securing electronic health records without impeding the flow of information","volume":"76","year":"2007","journal-title":"Int. J. Med. Inform."},{"key":"key\n\t\t\t\t20171208024723_bxx071C34","year":"2009"},{"key":"key\n\t\t\t\t20171208024723_bxx071C35","year":"2005"},{"key":"key\n\t\t\t\t20171208024723_bxx071C36","year":"2014"},{"key":"key\n\t\t\t\t20171208024723_bxx071C37","year":"2005"},{"key":"key\n\t\t\t\t20171208024723_bxx071C38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJSN.2013.055036","article-title":"Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption","volume":"8","year":"2013","journal-title":"Int. J. Secur. Netw."},{"key":"key\n\t\t\t\t20171208024723_bxx071C39","doi-asserted-by":"crossref","first-page":"1220","DOI":"10.1093\/comjnl\/bxw007","article-title":"Revocable and decentralized attribute-based encryption","volume":"59","year":"2016","journal-title":"The Comput. J."},{"key":"key\n\t\t\t\t20171208024723_bxx071C40","year":"2016"},{"key":"key\n\t\t\t\t20171208024723_bxx071C41","first-page":"12:1","article-title":"Encryption policies for regulating access to outsourced data","volume":"35","year":"2010","journal-title":"ACM Trans. Database Syst."},{"key":"key\n\t\t\t\t20171208024723_bxx071C42","volume-title":"The Design of Rijndael: AES \u2013 The Advanced Encryption Standard","year":"2002"},{"key":"key\n\t\t\t\t20171208024723_bxx071C43","year":"2003"},{"key":"key\n\t\t\t\t20171208024723_bxx071C44","year":"2007"},{"key":"key\n\t\t\t\t20171208024723_bxx071C45","year":"2011"},{"key":"key\n\t\t\t\t20171208024723_bxx071C46","year":"2010"},{"key":"key\n\t\t\t\t20171208024723_bxx071C47","year":"2012"},{"key":"key\n\t\t\t\t20171208024723_bxx071C48","year":"2012"},{"key":"key\n\t\t\t\t20171208024723_bxx071C49","year":"2014"},{"key":"key\n\t\t\t\t20171208024723_bxx071C50","year":"2010"},{"key":"key\n\t\t\t\t20171208024723_bxx071C51","year":"2014"},{"key":"key\n\t\t\t\t20171208024723_bxx071C52","year":"2009"},{"key":"key\n\t\t\t\t20171208024723_bxx071C53","doi-asserted-by":"crossref","first-page":"2386","DOI":"10.1109\/TPDS.2013.180","article-title":"New algorithms for secure outsourcing of modular exponentiations","volume":"25","year":"2014","journal-title":"IEEE Trans. Parallel Distributed Syst."},{"key":"key\n\t\t\t\t20171208024723_bxx071C54","year":"2010"},{"key":"key\n\t\t\t\t20171208024723_bxx071C55","year":"2009"},{"key":"key\n\t\t\t\t20171208024723_bxx071C56","volume-title":"Recommendation for Key Management \u2013 Part 1: General (Revision 4)","year":"2016"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/60\/12\/1871\/22297527\/bxx071.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T07:47:33Z","timestamp":1512719253000},"score":1,"resource":{"primary":{"URL":"http:\/\/academic.oup.com\/comjnl\/article\/60\/12\/1871\/4080205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,10]]},"references-count":56,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2017,8,10]]},"published-print":{"date-parts":[[2017,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx071","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2017,12]]},"published":{"date-parts":[[2017,8,10]]}}}