2018
DOI: 10.1080/17517575.2018.1522452
|View full text |Cite
|
Sign up to set email alerts
|

Applying time-constraint access control of personal health record in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Five methods are used to protect data in such environments: (1) users must encrypt the information before storing it; (2) users must transmit information through secure channels; (3) the user ID must be verified before accessing data; (4) the information is divided into small portions for handling and storage, retrieved when necessary; (5) digital signatures are added to verify that a suitable person has created the file to which a user has access. On the other hand, users of these environments will implement self-encryption to protect data and reduce over-reliance on providers [ 210 ].…”
Section: Analysis Of Conceptsmentioning
confidence: 99%
“…Five methods are used to protect data in such environments: (1) users must encrypt the information before storing it; (2) users must transmit information through secure channels; (3) the user ID must be verified before accessing data; (4) the information is divided into small portions for handling and storage, retrieved when necessary; (5) digital signatures are added to verify that a suitable person has created the file to which a user has access. On the other hand, users of these environments will implement self-encryption to protect data and reduce over-reliance on providers [ 210 ].…”
Section: Analysis Of Conceptsmentioning
confidence: 99%
“…The use of information and communication technology is getting popularity in all disciplines and professions including education, banking and healthcare More recently the adoption of telemedicine health services has shown significant impact in improving health delivery services (Chiang et al 2020;Kaium et al 2020;Xu et al 2017). The adoption of telemedicine health services are cost-effective, efficient, time-saving and free from errors (Atanasovski et al 2018;Y.…”
Section: Introductionmentioning
confidence: 99%
“…Rivera et al [47] proposed a system of formally verifying e-health records regarding how users can access and control their information and how the system manages their access. Chiang et al [48] proposed a system that digitalized patients' records to facilitate the doctor's checking of the patient's complete medical history. The proposed system ensured security by authorizing only medical personnel to collect information after getting a decryption key for an authorized time slot.…”
Section: Related Workmentioning
confidence: 99%