{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:19:24Z","timestamp":1729631964805,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icmcs.2016.7905649","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T17:14:16Z","timestamp":1493054056000},"page":"366-371","source":"Crossref","is-referenced-by-count":7,"title":["Secure cloud-based medical image storage using secret share scheme"],"prefix":"10.1109","author":[{"given":"Mbarek","family":"Marwan","sequence":"first","affiliation":[]},{"given":"Ali","family":"Kartit","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Ouahmane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"357","article-title":"Security in cloud computing: opportunities and challenges","author":"mazhar","year":"2015","journal-title":"Information Sciences Elsevier"},{"key":"ref11","first-page":"113","author":"diogo","year":"2014","journal-title":"Security issues in cloud environments a survey &#x201D; International Journal of Information Security"},{"journal-title":"Open Web Application Security Project 2013 Top 10 List available","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2296437"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.is.2014.05.004","article-title":"Collaborative and secure sharing of healthcare data in multi-clouds","volume":"48","author":"benjamin","year":"2015","journal-title":"Information Systems Elsevier"},{"key":"ref15","first-page":"389","author":"abbas","year":"2015","journal-title":"e-Health cloud privacy concerns and mitigation strategies &#x201D; Chapter Medical Data Privacy Handbook"},{"key":"ref16","first-page":"3454","article-title":"Cloud based medical image exchange-security challenges","volume":"38","author":"ga","year":"0","journal-title":"Procedia Engineering Elsevier"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","article-title":"Secret image sharing","author":"thien","year":"2002","journal-title":"Computers & Graphics Elsevier"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1855118.1855137"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.crad.2012.03.010"},{"key":"ref3","first-page":"3713","article-title":"Cloud-based medical image issues","volume":"11","author":"marwan","year":"2016","journal-title":"International Journal of Applied Engineering Research"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IEOM.2015.7093757"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5539\/nct.v1n2p12"},{"key":"ref8","first-page":"241","article-title":"On-demand security architecture for cloud computing","volume":"20","author":"sankar","year":"2014","journal-title":"Middle-East J of Sci Res"},{"key":"ref7","first-page":"27","article-title":"A survey on security issues and solutions for storage and exchange of medical images in cloud","volume":"11","author":"anuja","year":"2015","journal-title":"International Journal of Emerging Trends in Electrical and Electronics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-010-9171-y"},{"key":"ref9","first-page":"62","volume":"6994","author":"petcu","year":"2011","journal-title":"Portability and interoperability between clouds challenges and case study"},{"key":"ref1","first-page":"1","article-title":"The NIST Definition of cloud computing","volume":"15","author":"melland","year":"2009","journal-title":"Technical Report 2009 National Institute of Standards and Technology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40148-0_20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807165"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966449"},{"key":"ref24","article-title":"Dependable storage in the intercloud","author":"cachin","year":"2010","journal-title":"Research Report RZ 3783"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"ref26","article-title":"Distributed storage scheme based on secret sharing schemes","author":"wang","year":"0","journal-title":"School of Electrical and Computer Engineering"},{"journal-title":"Availability and confidentiality in Storage Cloud","year":"2011","author":"martins andr\u00e9","key":"ref25"}],"event":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","start":{"date-parts":[[2016,9,29]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2016,10,1]]}},"container-title":["2016 5th International Conference on Multimedia Computing and Systems (ICMCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7896955\/7905513\/07905649.pdf?arnumber=7905649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T15:59:23Z","timestamp":1569081563000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7905649\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icmcs.2016.7905649","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}