2013
DOI: 10.1007/978-94-007-6738-6_26
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Privacy Preservation Framework over u-Healthcare System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…The privacy preservation in health care systems has been enforced using the user identity [9]. The method uses cryptographic techniques which are performed according to the user identity.…”
Section: Majamal Mohamed Yaseen Zubeir Ar Mohamed Shanavasmentioning
confidence: 99%
“…The privacy preservation in health care systems has been enforced using the user identity [9]. The method uses cryptographic techniques which are performed according to the user identity.…”
Section: Majamal Mohamed Yaseen Zubeir Ar Mohamed Shanavasmentioning
confidence: 99%
“…Existing data collection systems can largely be classified into two groups, centralized and distributed systems. In the centralized data collection systems [12][13][14][15][16][17], patients upload their health data onto a centralized data collection server where data are accessed by a healthcare provider. These systems typically rely on the use of a single entity (a single server or a single architectural component) to perform the tasks required to facilitate data collections.…”
Section: Related Workmentioning
confidence: 99%
“…These concerns include breach of data confidentiality and authenticity and unauthorized exposure of patients' real IDs, thus compromising their privacy. Existing data collection systems [7][8][9][10][11][12][13][14][15][16][17] do protect data confidentiality and preserve patients' ID privacy. However, there are limitations in these systems and proposals in terms of supporting scalability and protection against inference of patients' real IDs via observing their communication patterns and against privacy threats imposed by authorized insiders.…”
Section: Introductionmentioning
confidence: 99%
“…However, a disadvantage is that there are limited places to use such a network. On the other hand, there is no spatial limitation on wireless network [28]. However, malicious users are able to steal wireless signals; hence, there are security threats.…”
Section: Sensing Techniquementioning
confidence: 99%