{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:29:40Z","timestamp":1773761380222,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750223","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"363-368","source":"Crossref","is-referenced-by-count":2,"title":["Towards healthcare data security in cloud computing"],"prefix":"10.1109","author":[{"given":"Huda","family":"Elmogazy","sequence":"first","affiliation":[]},{"given":"Omaima","family":"Bamasak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533108"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2011.5766176"},{"key":"23","first-page":"242","article-title":"Cryptography and encryption in cloud computing","volume":"2","author":"kaur","year":"2012","journal-title":"VSRD International Journal of CS &IT"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"15","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1511\/2012.98.362","article-title":"Alice and bob in cipherspace","volume":"100","author":"hayes","year":"0","journal-title":"American Scientist"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"13","first-page":"169","author":"gentry","year":"2009","journal-title":"Fully Homomorphic Encryption Using Ideal Lattices"},{"key":"14","article-title":"Homomorphic encryption applied to the cloud computing security","volume":"1","author":"tebaa","year":"2012","journal-title":"Proceedings of the World Congress on Engineering (WCE"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"12","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"21","first-page":"282","article-title":"Public key encryption with searchable keywords based on jacobi symbols","author":"crescenzo","year":"2007","journal-title":"Proceedings of the 8th International Conference on Progress in Cryptology (INDOCRYPT'07)"},{"key":"3","year":"0","journal-title":"The Health Insurance Portability and Accountability Act"},{"key":"20","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Eurocrypt 2004 LNCS 3027"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1118890.1118891"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMsa0802005"},{"key":"10","first-page":"169","article-title":"On data banks and privacy homomorphisms","author":"rivest","year":"1978","journal-title":"Foundations of Sec Comp"},{"key":"7","article-title":"Modern encryption techniques for cloud computing","author":"el-etriby","year":"2012","journal-title":"ICCIT"},{"key":"6","year":"2011","journal-title":"Cloud Security Alliance Secaas Defined Categories of Service"},{"key":"5","author":"mell","year":"2009","journal-title":"Security Guidance for Critical Areas of Focus in Cloud Computing"},{"key":"4","author":"mell","year":"2009","journal-title":"The NIST Definition of Cloud Computing"},{"key":"9","article-title":"Data security in cloud computing with elliptic curve cryptography","volume":"2","author":"gampala","year":"0","journal-title":"USCERT"},{"key":"8","first-page":"737","article-title":"Hybrid encryption for cloud database security","volume":"2","author":"kaur","year":"2012","journal-title":"UESAT"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","location":"London, United Kingdom","start":{"date-parts":[[2013,12,9]]},"end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750223.pdf?arnumber=6750223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T00:08:02Z","timestamp":1565309282000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750223\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750223","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}