{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:28:59Z","timestamp":1776083339926,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Key R & D Program of Guangdong Province","award":["2020B0101090001"],"award-info":[{"award-number":["2020B0101090001"]}]},{"name":"National Natural Science Foundation of China","award":["U19A2066"],"award-info":[{"award-number":["U19A2066"]}]},{"name":"the Innovation Action Plan of Shanghai Science and Technology","award":["20511102200 and 20222420800"],"award-info":[{"award-number":["20511102200 and 20222420800"]}]},{"name":"National Key R & D Program of China","award":["2019YFB2101703"],"award-info":[{"award-number":["2019YFB2101703"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,17]]},"DOI":"10.1145\/3528416.3530228","type":"proceedings-article","created":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T02:16:59Z","timestamp":1651717019000},"page":"58-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Patient-centered cross-enterprise document sharing and dynamic consent framework using consortium blockchain and ciphertext-policy attribute-based encryption"],"prefix":"10.1145","author":[{"given":"Liang","family":"Zhang","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Haibin","family":"Kan","sequence":"additional","affiliation":[{"name":"The Yiwu Research Institute of Fudan University, Zhejiang, China"}]},{"given":"Honglan","family":"Huang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"255","article-title":"IHE XDS","author":"Benson T.","year":"2020","unstructured":"T. Benson, G. Grieve. \"IHE XDS,\" In: Principles of Health Interoperability, 2020, pp. 255--272.","journal-title":"Principles of Health Interoperability"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3389\/fmed.2019.00034"},{"key":"e_1_3_2_1_3_1","volume-title":"Incorporated","author":"Voigt P.","year":"2017","unstructured":"P. Voigt and A. V. D. Bussche. \"The EU General Data Protection Regulation (GDPR): A Practical Guide,\" Springer Publishing Company, Incorporated, 1st edition, 2017.","edition":"1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.coisb.2017.07.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17093046"},{"key":"e_1_3_2_1_6_1","unstructured":"HL7 FHIR 2019. [Online]. Available: https:\/\/www.hl7.org\/fhir\/. [Accessed: 11-Aug-2019]."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2974257"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-020-01631-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2309858"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_19"},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Network and System Security","author":"Zhang L.","year":"2021","unstructured":"L. Zhang, H. Kan, Y. Xu, J. Ran. \"Revocable Data Sharing Methodology Based on SGX and Blockchain,\" In International Conference on Network and System Security, 2021, 61--78."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3055541"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-020-01564-z"},{"issue":"4","key":"e_1_3_2_1_14_1","first-page":"4467","article-title":"A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network","volume":"56","author":"Wang S.","year":"2020","unstructured":"S. Wang, H. Wang, J. Li, H. Wang, J. Chaudhry, M. Alazab and H. Song. \"A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network,\" IEEE Transactions on Industry Applications, 2020, 56(4), 4467--4477.","journal-title":"IEEE Transactions on Industry Applications"},{"key":"e_1_3_2_1_15_1","first-page":"321","volume-title":"IEEE Symposium on Security and Privacy","author":"Bethencourt J.","year":"2007","unstructured":"J. Bethencourt, A. Sahai, B. Waters. \"Ciphertext-policy attribute-based encryption,\" In: IEEE Symposium on Security and Privacy, 2007, pp. 321--334."},{"key":"e_1_3_2_1_16_1","volume-title":"Asecure decentralised generalised transaction ledger","author":"Wood G.","year":"2014","unstructured":"G. Wood. \"Ethereum: Asecure decentralised generalised transaction ledger,\" 2014, Byzantium Version, https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102503"},{"key":"e_1_3_2_1_18_1","first-page":"2","volume-title":"versioned","author":"Benet J.","year":"2014","unstructured":"J. Benet. \"Ipfs-content addressed, versioned, p2p file system,\" arXiv preprint arXiv:1407.3561, 2014."},{"key":"e_1_3_2_1_19_1","volume-title":"Ciphertext-policy attribute-based encryption,\" http:\/\/acsc.cs.utexas.edu\/cpabe\/","author":"Bethencourt J.","year":"2011","unstructured":"J. Bethencourt, A. Sahai, B. Waters, \"Advanced crypto software collection: Ciphertext-policy attribute-based encryption,\" http:\/\/acsc.cs.utexas.edu\/cpabe\/, 2011, Accessed at: 2021-11-05."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.197"},{"key":"e_1_3_2_1_21_1","first-page":"1087","article-title":"SHAREChain: Healthcare data sharing framework using Blockchain-registry and FHIR","author":"Lee A. R.","year":"2019","unstructured":"A. R. Lee, M. G. Kim, I. K. Kim. \"SHAREChain: Healthcare data sharing framework using Blockchain-registry and FHIR,\" In: IEEE International Conference on Bioinformatics and Biomedicine, 2019, pp. 1087--1090","journal-title":"IEEE International Conference on Bioinformatics and Biomedicine"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2196\/16748"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2196\/26230"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01761-1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/2055207620924949"},{"key":"e_1_3_2_1_27_1","first-page":"1047","volume-title":"Coded Dynamic Consent framework using blockchain for healthcare information exchange,\" in IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","author":"Lee A. R.","year":"2020","unstructured":"A. R. Lee, M. Kim, K. Won, I. Kim and E. Lee, \"Coded Dynamic Consent framework using blockchain for healthcare information exchange,\" in IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2020, pp. 1047--1050."},{"key":"e_1_3_2_1_28_1","volume-title":"A patient-centric health information exchange framework using blockchain technology,\" IEEE journal of biomedical and health informatics","author":"Zhuang Y.","year":"2020","unstructured":"Y. Zhuang, L. R. Sheets, Y. W. Chen, Z. Y. Shae, J. J. Tsai and C. R. Shyu, (2020). \"A patient-centric health information exchange framework using blockchain technology,\" IEEE journal of biomedical and health informatics, 2020, 24(8):2169--2176."},{"key":"e_1_3_2_1_29_1","first-page":"30","article-title":"Hyperledger fabric: a distributed operating system for permissioned blockchains","author":"Ferris C.","year":"2018","unstructured":"C. Ferris, G. Laventman, Y. Manevich, et al. \"Hyperledger fabric: a distributed operating system for permissioned blockchains,\" In Proceedings of the Thirteenth EuroSys Conference, 2018, 30.","journal-title":"Proceedings of the Thirteenth EuroSys Conference"},{"key":"e_1_3_2_1_30_1","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. K. Franklin. \"Identity-based encryption from the Weil pairing,\" In CRYPTO, 2001, pp. 213--229.","journal-title":"CRYPTO"}],"event":{"name":"CF '22: 19th ACM International Conference on Computing Frontiers","location":"Turin Italy","acronym":"CF '22","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["Proceedings of the 19th ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528416.3530228","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3528416.3530228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:42Z","timestamp":1750186962000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528416.3530228"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":30,"alternative-id":["10.1145\/3528416.3530228","10.1145\/3528416"],"URL":"https:\/\/doi.org\/10.1145\/3528416.3530228","relation":{},"subject":[],"published":{"date-parts":[[2022,5,17]]},"assertion":[{"value":"2022-05-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}