{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T07:05:47Z","timestamp":1747119947072,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/atsip.2016.7523054","type":"proceedings-article","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T20:43:41Z","timestamp":1469738621000},"page":"93-96","source":"Crossref","is-referenced-by-count":9,"title":["Privacy protection and security in eHealth cloud platform for medical image sharing"],"prefix":"10.1109","author":[{"given":"Johann","family":"Vincent","sequence":"first","affiliation":[]},{"given":"Wei","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"99","article-title":"Sapphire: Anonymity for enhanced control and private collaboration in healthcare clouds","author":"john","year":"2012","journal-title":"Cloud Computing Technology and Science (CloudCom) 2012 IEEE 4th InternationalConference on"},{"key":"ref11","first-page":"985","article-title":"Cam: cloud-assisted privacy preserving mobile health monitoring","author":"huang","year":"2013","journal-title":"Information Forensics and Security IEEE Transactions on"},{"key":"ref12","article-title":"Aspects of privacy for electronic health records","author":"sebastian","year":"2011","journal-title":"International Journal of Medical Informatics"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1145\/293347.293350","article-title":"Private information retrieval","volume":"45","author":"benny","year":"1998","journal-title":"Journal of the ACM (JACM)"},{"key":"ref14","first-page":"151","article-title":"Protecting data privacy in private information retrieval schemes","author":"yael","year":"1998","journal-title":"Proceedings of the thirtieth annual ACM symposium on Theory of computing"},{"key":"ref15","first-page":"239","article-title":"Efficient techniques for privacy-preserving sharing of sensitive information","author":"emiliano de","year":"2011","journal-title":"Trust and Trustworthy Computing"},{"key":"ref16","first-page":"1","article-title":"Computationally secure oblivious transfer","author":"moni","year":"2005","journal-title":"Journal of Cryptology"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1431","DOI":"10.1109\/JBHI.2014.2300846","article-title":"A review on the state-of-the-art privacy-preserving approaches in the e-health clouds","volume":"18","author":"asad","year":"2014","journal-title":"Biomedical and Health Informatics IEEE Journal of"},{"article-title":"A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management","year":"2010","author":"andreas","key":"ref3"},{"key":"ref6","first-page":"213","article-title":"Identity-based encryption from the weil pairing","author":"dan","year":"2001","journal-title":"Advances in Cryptology-Crypto 2001"},{"key":"ref5","first-page":"506","article-title":"Public key encryption with keyword search","author":"dan","year":"2004","journal-title":"Advances in Cryptology-EUROCRYPT 2004"},{"key":"ref8","first-page":"169","article-title":"Fully homomorphic encryption using ideal lattices","volume":"9","author":"craig","year":"2009","journal-title":"STOC"},{"key":"ref7","first-page":"146","article-title":"Predicate encryption supporting disjunctions, polynomial equations, and inner products","author":"jonathan","year":"2008","journal-title":"Advances in Cryptology-Eurocrypt 2008"},{"key":"ref2","first-page":"251","article-title":"Secure public cloud platform for medical images sharing","volume":"210","author":"wei","year":"2014","journal-title":"Studies in Health Technology and Informatics"},{"key":"ref1","first-page":"1","article-title":"Evaluation framework for personal health records: Microsoft healthvault vs. google health","author":"ali","year":"2010","journal-title":"System Sciences (HICSS) 2010 43rd Hawaii InternationalConference on"},{"key":"ref9","first-page":"268","article-title":"Security models and requirements for healthcare application clouds","author":"rui","year":"2010","journal-title":"Cloud Computing (CLOUD) 2010 IEEE 3rd InternationalConference on"}],"event":{"name":"2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP)","start":{"date-parts":[[2016,3,21]]},"location":"Monastir, Tunisia","end":{"date-parts":[[2016,3,23]]}},"container-title":["2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7504793\/7523041\/07523054.pdf?arnumber=7523054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:46:13Z","timestamp":1602690373000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7523054"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/atsip.2016.7523054","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}