{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:32Z","timestamp":1750306532857,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T00:00:00Z","timestamp":1412812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,9]]},"DOI":"10.1145\/2675744.2675753","type":"proceedings-article","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T14:12:26Z","timestamp":1422454346000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy preserving content disclosure for enabling sharing of electronic health records in cloud computing"],"prefix":"10.1145","author":[{"given":"Anju","family":"Mohandas","sequence":"first","affiliation":[{"name":"College of Engineering Trivandrum"}]},{"given":"Sabitha","family":"S","sequence":"additional","affiliation":[{"name":"College of Engineering Trivandrum"}]}],"member":"320","published-online":{"date-parts":[[2014,10,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Peter Mell and Timothy Grance \"The NIST Definition of Cloud \" in Recommendations of the National Institute of Standards and Technology NIST Special Publication 800--145.  Peter Mell and Timothy Grance \"The NIST Definition of Cloud \" in Recommendations of the National Institute of Standards and Technology NIST Special Publication 800--145."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2009.04.005"},{"volume-title":"IEEE International Conference on Computer Communications, INFOCOM'10","author":"Yu S.","key":"e_1_3_2_1_5_1","unstructured":"S. Yu and C. Wang and K. Ren and W. Lou , \" Achieving secure, scalable, and fine-grained data access control in cloud computing,\" in Proc . IEEE International Conference on Computer Communications, INFOCOM'10 . S. Yu and C. Wang and K. Ren and W. Lou, \"Achieving secure, scalable, and fine-grained data access control in cloud computing,\" in Proc. IEEE International Conference on Computer Communications, INFOCOM'10."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866845"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.09.034"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866414"},{"key":"e_1_3_2_1_10_1","unstructured":"A.\n      Shamir \"Identity Based Cryptosystems and Signature Schemes \" in In Advances in Cryptology \u00e2\u0102\u015e CRYPTO volume \n  196\n   of \n  LNCS pages \n  37\n  --\n  53\n  . \n  Springer 1984\n  .   A. Shamir \"Identity Based Cryptosystems and Signature Schemes \" in In Advances in Cryptology \u00e2\u0102\u015e CRYPTO volume 196 of LNCS pages 37--53. Springer 1984."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655024"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"e_1_3_2_1_13_1","first-page":"20","author":"M\u00c3ijller S.","year":"2009","unstructured":"S. M\u00c3ijller and S. Katzenbeisser and C. Ecker , \"Distributed attribute-Based Encryption,\" in Proceedings of Annual International Conference on Information Security and Cryptology (ICISC) , 2009 , pp. 20 -- 36 . S. M\u00c3ijller and S. Katzenbeisser and C. Ecker, \"Distributed attribute-Based Encryption,\" in Proceedings of Annual International Conference on Information Security and Cryptology (ICISC), 2009, pp. 20--36.","journal-title":"\"Distributed attribute-Based Encryption,\" in Proceedings of Annual International Conference on Information Security and Cryptology (ICISC)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755720"},{"key":"e_1_3_2_1_15_1","volume-title":"Advances in Information Security","author":"Ciriani V.","year":"2007","unstructured":"V. Ciriani and S. De Capitani di Vimercati and S. Foresti and P. Samarati, \"k-Anonymity,\" Springer US , Advances in Information Security , 2007 . V. Ciriani and S. De Capitani di Vimercati and S. Foresti and P. Samarati, \"k-Anonymity,\" Springer US, Advances in Information Security, 2007."}],"event":{"name":"Compute '14: ACM India Compute Conference","sponsor":["Google India Google India","Persistent Systems"],"location":"Nagpur India","acronym":"Compute '14"},"container-title":["Proceedings of the 7th ACM India Computing Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2675744.2675753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2675744.2675753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:16Z","timestamp":1750227136000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2675744.2675753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,9]]},"references-count":15,"alternative-id":["10.1145\/2675744.2675753","10.1145\/2675744"],"URL":"https:\/\/doi.org\/10.1145\/2675744.2675753","relation":{},"subject":[],"published":{"date-parts":[[2014,10,9]]},"assertion":[{"value":"2014-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}