Browse > Article

u-헬스케어(Healthcare) 환경에 따른 의료 정보 보안 이슈  

Jeong, Jun-Ho (동국대학교 경주캠퍼스 전자상거래연구소)
Kim, Jeong-Suk (김포대학교 스마트IT학부 스마트콘텐츠과)
Publication Information
Korea Multimedia Society / v.19, no.3, 2015 , pp. 36-41 More about this Journal
Keywords
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 U. Varshney, "Pervasive Healthcare," IEEE Computer, Vol. 36, No. 12, pp.138-140, 2003.   DOI
2 송유진, 박광용, "의료데이터 공유 및 활용 서비스를 위한 보안/프라이버시 요구사항," 정보보호학회지, Vol. 20, No. 3, pp. 90-96, 2010.
3 이혜림, 조재연, 윤지원, "클라우드 환경에서의 사이버물리시스템관점에서 본 헬스 케어 보안 관련 이슈들," 한국정보보호학회지, Vol.24, No.6, pp.7-13, 2014.
4 K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, "DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems," IEEE Transactions on Infromation Forensics and Security, Vol 8, No. 11, 2013.
5 M. Sharma, Y. Bai, S. Chung, and L. Dai, "Using Risk in Access Control for Cloud-Assisted eHealth," IEEE International Conference on High Performance Computing and Communications, pp. 1047-1052, 2012.
6 K. Yang, X. Jia, "Expressive, Efficient and Revocable Data Access Control for Multi-Authority Cloud Storage," IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 7, pp. 1735-1744, 2014.   DOI
7 D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," Eurocrypt'04, 2004.
8 정준호, 홍영식, "클라우드 컴퓨팅 환경에서 검색 가능 암호화 시스템을 위한 전사적 공격에 효과적인 다중 색인 기법," 정보과학회논문지: 정보 통신 Vol.40, No.5, pp.286-293, 2013.
9 N. Cao, C. Wang, M. Li, K. Ren, W. Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data," IEEE transactions on parallel and distributed systems, Vol.25, No.1, 2014.
10 G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," In Proceedings of the 14th ACM conference on Computer and communications security, ACM, pp. 598-609. 2007.
11 Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Transactions on Parallel and Distrubuted Systems, Vol. 22, No. 5, 2011.
12 S. Tan, Z. Chen and J. Zhang, "Data Blocks' signature in Cloud Computing," International Symposium on Computational and Business Intelligence (ISCBI), pp.49-55, 2013.
13 S. Tan, L. Tan, X. Li, Y. Jia, "An Efficient Method for Checking the Integrity of Data in the Cloud," Journal of China, Vol. 11, No. 9, pp.68-81, 2014.