{"id":"https://openalex.org/W2414540700","doi":"https://doi.org/10.1080/10798587.2015.1132586","title":"Secure Access Control of E-Health System with Attribute-Based Encryption","display_name":"Secure Access Control of E-Health System with Attribute-Based Encryption","publication_year":2016,"publication_date":"2016-02-17","ids":{"openalex":"https://openalex.org/W2414540700","doi":"https://doi.org/10.1080/10798587.2015.1132586","mag":"2414540700"},"language":"en","primary_location":{"id":"doi:10.1080/10798587.2015.1132586","is_oa":false,"landing_page_url":"https://doi.org/10.1080/10798587.2015.1132586","pdf_url":null,"source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055842190","display_name":"Hongyang Yan","orcid":"https://orcid.org/0000-0002-1493-9671"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongyang Yan","raw_affiliation_strings":["School of Mathematics and Information Science Guangzhou University  Guangzhou China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Information Science Guangzhou University  Guangzhou China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117779816","display_name":"Jin Li","orcid":"https://orcid.org/0000-0001-8422-1115"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]},{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Li","raw_affiliation_strings":["Dept. of Computer Science, Guangzhou University, Guangzhou, China; Nanjing University of Information Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Guangzhou University, Guangzhou, China; Nanjing University of Information Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125","https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106943653","display_name":"Xuan Li","orcid":"https://orcid.org/0000-0002-4013-8480"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Li","raw_affiliation_strings":["School of Software, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101818721","display_name":"Gansen Zhao","orcid":"https://orcid.org/0009-0007-1526-5326"},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gansen Zhao","raw_affiliation_strings":["School of Computer Science South China Normal University Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science South China Normal University Guangzhou, China","institution_ids":["https://openalex.org/I187400657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100669490","display_name":"Sun\u2010Young Lee","orcid":"https://orcid.org/0000-0002-4686-9436"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sun-Young Lee","raw_affiliation_strings":["Department of Information Security Engineering, Soonchunhyang University, Asan, Chungcheongnamdo, 336-745, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Soonchunhyang University, Asan, Chungcheongnamdo, 336-745, South Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Shen","raw_affiliation_strings":["[School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China,]"],"affiliations":[{"raw_affiliation_string":"[School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China,]","institution_ids":["https://openalex.org/I200845125"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5055842190"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":3.8563,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.94201768,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"22","issue":"3","first_page":"345","last_page":"352"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9253827929496765},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7406401038169861},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6687689423561096},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6487904191017151},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5249569416046143},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4112863540649414},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1400335729122162},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.0980527400970459}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9253827929496765},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7406401038169861},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6687689423561096},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6487904191017151},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5249569416046143},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4112863540649414},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1400335729122162},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.0980527400970459}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/10798587.2015.1132586","is_oa":false,"landing_page_url":"https://doi.org/10.1080/10798587.2015.1132586","pdf_url":null,"source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W229705207","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1545347659","https://openalex.org/W1558439324","https://openalex.org/W1763482972","https://openalex.org/W1974267799","https://openalex.org/W1976645347","https://openalex.org/W1981084830","https://openalex.org/W2042220809","https://openalex.org/W2076046175","https://openalex.org/W2087065364","https://openalex.org/W2101238246","https://openalex.org/W2101709669","https://openalex.org/W2106116277","https://openalex.org/W2108072891","https://openalex.org/W2137767448","https://openalex.org/W2138001464","https://openalex.org/W2152924492","https://openalex.org/W2160608575","https://openalex.org/W2406945720","https://openalex.org/W2585082236","https://openalex.org/W4200185493","https://openalex.org/W4200321196","https://openalex.org/W4244102997","https://openalex.org/W4249968242","https://openalex.org/W4255445824","https://openalex.org/W4298851481","https://openalex.org/W4300691313","https://openalex.org/W4301777383","https://openalex.org/W4315647710"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4289281780","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W4300978562","https://openalex.org/W3158270748"],"abstract_inverted_index":{"AbstractCloud":[0],"computing":[1],"is":[2,34,44,63,68,96,121],"a":[3,69,83,88,125],"new":[4,70,84],"paradigm,":[5],"which":[6,95],"provides":[7],"low-cost":[8],"and":[9,59],"effective":[10],"outsourced":[11,132],"data":[12,21,62,110,158],"storage":[13,129],"service.":[14],"People":[15],"are":[16],"used":[17],"to":[18,55,86,93,123],"storing":[19],"personal":[20],"in":[22,111,146],"cloud":[23],"server.":[24],"E-Health":[25],"system":[26,130],"(EHS)":[27],"privacy":[28,115],"should":[29,50],"be":[30,51],"protected,":[31],"because":[32],"it":[33],"national":[35],"security":[36],"for":[37,131],"citizen":[38],"privacy.":[39],"Personal":[40],"Health":[41],"Record":[42],"(PHR)":[43],"the":[45,108,114,144,147,157],"core":[46],"of":[47,113],"EHS":[48],"that":[49,153],"protected.":[52],"Thus,":[53],"how":[54],"efficiently":[56],"store,":[57],"access":[58,91,127],"share":[60],"these":[61],"critical.":[64],"Attribute-based":[65],"encryption":[66,73],"(ABE)":[67],"public":[71],"key":[72],"based":[74,97],"on":[75,98],"users\u2019":[76],"attributes.":[77],"In":[78,102],"this":[79],"paper,":[80],"we":[81],"present":[82],"method":[85],"realize":[87],"secure":[89],"fine-grained":[90,126],"control":[92,128],"PHRs,":[94],"emerging":[99],"ABE":[100,119],"primitives.":[101],"more":[103],"details,":[104],"PHR":[105,109],"owners":[106],"divide":[107],"terms":[112],"levels.":[116],"A":[117],"key-policy":[118],"(KP-ABE)":[120],"utilized":[122],"provide":[124,138],"sensitive":[133],"data.":[134],"It":[135],"can":[136],"also":[137],"efficient":[139],"user":[140],"revocation":[141],"by":[142],"using":[143],"timestamp":[145],"private":[148],"key.":[149],"Security":[150],"analysis":[151],"shows":[152],"our":[154],"construction":[155],"achieves":[156],"confiden...":[159]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":5}],"updated_date":"2026-02-25T08:12:03.925757","created_date":"2025-10-10T00:00:00"}
