Abstract | ||
---|---|---|
In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1016/j.ijmedinf.2016.02.002 | International Journal of Medical Informatics |
Keywords | Field | DocType |
EHR,Security,Privacy,Data sharing,Access control,Encryption | Data mining,Confidentiality,Computer security,Cryptography,Computer science,Data sharing,Encryption,Access control,Masking (Electronic Health Record),Cloud computing,The Internet | Journal |
Volume | ISSN | Citations |
89 | 1386-5056 | 8 |
PageRank | References | Authors |
0.51 | 19 | 2 |