[1] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
“Attribute-based encryption for fine-grained access
control of encrypted data,” in CCS '06, 2006, pp. 89–98
[2] H. Lo¨ hr, A.-R. Sadeghi, and M. Winandy, “Securing
the E-Health Cloud,” Proc. First ACM Int’l Health
Informatics Symp. (IHI ’10), pp. 220-229, 2010.
[3] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized Private
Keyword Search over Encrypted Personal Health
Records in Cloud Computing,” Proc. 31st Int’l Conf.
Distributed Computing Systems (ICDCS ’11), June 2011
[4] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter,
“Patient controlled encryption: ensuring privacy of
electronic medical records,” in CCSW '09: Proceedings
of the 2009 ACM workshop on Cloud computing
security, 2009, pp. 103–114.
[5] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving
secure, scalable, and fine-grained data access control in
cloud computing,” in IEEE INFOCOM'10, 2010.
[6] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based
Data Sharing with Attribute Revocation,” Proc. Fifth
ACM Symp. Information, Computer and Comm. Security
(ASIACCS ’10), 2010.
[7] K.D. Mandl, P. Szolovits, and I.S. Kohane, “Public
Standards and Patients’ Control: How to Keep Electronic
Medical Records Accessible but Private,” BMJ, vol. 322,
no. 7281, pp. 283-287, Feb. 2001.
[8] J. Hur And D.K. Noh, “Attribute-Based Access Control
With Efficient Revocation In Data Outsourcing
Systems,” Ieee Trans. Parallel And Distributed Systems,
Vol. 22, No. 7, Pp. 1214-1221, July 2011.
[9] X. Liang, R. Lu, X. Lin, and X. S. Shen, “Patient selfcontrollable
access policy on phi in ehealthcare
systems,” in AHIC 2010, 2010.
[10] J. Bethencourt, A. Sahai, and B. Waters,“Ciphertextpolicy
attribute-based encryption,” in IEEE S& P ’07,
2007, pp. 321–334.
[11] M. Li, W. Lou, and K. Ren, “Data security and privacy
in wireless body area networks,” IEEE Wireless
Communications Magazine, Feb. 2010.
[12] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W.
Jonker, “Ciphertext-policy attribute-based threshold
decryption with flexible delegation and revocation of
user attributes,” 2009. [Online]. Available:
http://purl.org/utwente/65471
[13] S. D. C. di Vimercati, S. Foresti, S. Jajodia, S.
Paraboschi, and P. Samarati, “Overencryption:
management of access control evolution on outsourced
data,” in VLDB '07, 2007, pp. 123–13
[14] A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based
encryption with efficient revocation,” in CCS '08, 2008,
pp. 417–426.
[15] “At Risk of Exposure - in the Push for Electronic
Medical Records, Concern Is Growing About How Well
Privacy Can Be Safeguarded,”
http://articles.latimes.com/2006/jun/26/health/ heprivacy26,
2006.