2020
DOI: 10.1007/978-3-030-44038-1_104
|View full text |Cite
|
Sign up to set email alerts
|

A Context-Aware Security Model for a Combination of Attribute-Based Access Control and Attribute-Based Encryption in the Healthcare Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 17 publications
0
4
0
1
Order By: Relevance
“…Simple context conditions can be combined in order to form complex context conditions, using the standard AND, OR, NOT operators. A complete list of the contextual attributes, represented in a context model, is described in the work of Psarra et al [34].…”
Section: Criticality Assessment Using Fuzzy Context Handlersmentioning
confidence: 99%
See 1 more Smart Citation
“…Simple context conditions can be combined in order to form complex context conditions, using the standard AND, OR, NOT operators. A complete list of the contextual attributes, represented in a context model, is described in the work of Psarra et al [34].…”
Section: Criticality Assessment Using Fuzzy Context Handlersmentioning
confidence: 99%
“…The criticality assessment of a patient's condition is made using a rule-based approach. Note, that since many of the contextual variables appearing in [34] are evaluated by experts using linguistic terms, such as 'if blood pressure is high', our approach adopts the following fuzzy inferencing process:…”
Section: Criticality Assessment Using Fuzzy Context Handlersmentioning
confidence: 99%
“…A fuzzy context handler uses fuzzy rules that associate contextual attributes with fuzzy values and generates as output an assessment of the criticality of the incident. The related contextual attributes, which are represented in a context model, are presented in detail in [61]. Here, we extend the fuzzy context handlers by The predictive mechanism, implemented with LSTM, receives as input the recent health metrics and outputs the predictions of health metrics for the next two hours.…”
Section: Fuzzy Context Handlersmentioning
confidence: 99%
“…To address the shortcomings of traditional electronic medical systems' inefficiency and scalability, certain schemes 15,16 use access control technologies to administer EHR stored in the cloud. These strategies can ensure the security of remotely stored data in cloud computing, demonstrating that giving data owners access control over their data is more vital than allowing the cloud to control data.…”
Section: Related Workmentioning
confidence: 99%