{"id":"https://openalex.org/W2744773193","doi":"https://doi.org/10.1093/comjnl/bxx071","title":"Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds","display_name":"Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds","publication_year":2017,"publication_date":"2017-07-26","ids":{"openalex":"https://openalex.org/W2744773193","doi":"https://doi.org/10.1093/comjnl/bxx071","mag":"2744773193"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxx071","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxx071","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101802649","display_name":"Weiran Liu","orcid":"https://orcid.org/0000-0002-1466-7418"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiran Liu","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","School of Electronic and Information Engineering, Beihang University, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Electronic and Information Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100441065","display_name":"Xiao Liu","orcid":"https://orcid.org/0000-0002-3726-6334"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Liu","raw_affiliation_strings":["School of Electronic and Information Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100425107","display_name":"Jianwei Liu","orcid":"https://orcid.org/0000-0003-2965-3518"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwei Liu","raw_affiliation_strings":["School of Electronic and Information Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022955566","display_name":"Qianhong Wu","orcid":"https://orcid.org/0000-0002-6407-4194"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qianhong Wu","raw_affiliation_strings":["School of Electronic and Information Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022955566"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.6170834,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"60","issue":"12","first_page":"1871","last_page":"1888"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.8618332743644714},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8313601613044739},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.7179604768753052},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6754136681556702},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6670070290565491},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5259561538696289},{"id":"https://openalex.org/keywords/obstacle","display_name":"Obstacle","score":0.4889356195926666},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46983620524406433},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4695950746536255},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.46523112058639526},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.464368999004364},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.4416925311088562},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4394567310810089},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4365479350090027},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.41717618703842163},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20754781365394592},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.13511276245117188}],"concepts":[{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.8618332743644714},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8313601613044739},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.7179604768753052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6754136681556702},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6670070290565491},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5259561538696289},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.4889356195926666},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46983620524406433},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4695950746536255},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.46523112058639526},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.464368999004364},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.4416925311088562},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4394567310810089},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4365479350090027},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.41717618703842163},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20754781365394592},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.13511276245117188},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxx071","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxx071","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1556212265","https://openalex.org/W1984462474","https://openalex.org/W1989168465","https://openalex.org/W1991318406","https://openalex.org/W1993341076","https://openalex.org/W2044417600","https://openalex.org/W2055121238","https://openalex.org/W2071940270","https://openalex.org/W2074640468","https://openalex.org/W2093798919","https://openalex.org/W2101018255","https://openalex.org/W2114486350","https://openalex.org/W2118875948","https://openalex.org/W2121063844","https://openalex.org/W2123389487","https://openalex.org/W2125924073","https://openalex.org/W2129181369","https://openalex.org/W2331349420","https://openalex.org/W2346660823","https://openalex.org/W2419558894","https://openalex.org/W2896599519"],"related_works":["https://openalex.org/W2373984226","https://openalex.org/W2349137515","https://openalex.org/W2130613250","https://openalex.org/W2361337511","https://openalex.org/W2358774039","https://openalex.org/W1513229083","https://openalex.org/W2353815999","https://openalex.org/W4390864104","https://openalex.org/W2364540050","https://openalex.org/W1683803069"],"abstract_inverted_index":{"Electronic":[0],"Health":[1],"Record":[2],"(EHR)":[3],"systems":[4,25,47],"bring":[5],"an":[6,94,133],"abundance":[7],"of":[8,23,32,60,187,192],"convenience":[9],"for":[10,20,45],"telediagnosis,":[11],"medical":[12,68,79,88,144],"data":[13],"sharing":[14],"and":[15,65,77,141,181,194],"management.":[16],"A":[17,70,90,113,154],"main":[18,58],"obstacle":[19],"wide":[21],"adoption":[22],"EHR":[24,46,95,122],"is":[26,72,81,116,123],"due":[27],"to":[28,48,118,137],"the":[29,87,100,121,127,159,168,185],"privacy":[30],"concerns":[31],"patients.":[33],"In":[34,52],"this":[35,105],"work,":[36],"we":[37],"propose":[38],"a":[39,78,109,134,150],"role-based":[40],"access":[41,101,111,129,158,169],"control":[42],"(RBAC)":[43],"scheme":[44],"secure":[49],"private":[50],"EHRs.":[51],"our":[53,147,188],"RBAC,":[54],"there":[55],"are":[56,174],"two":[57],"types":[59],"roles,":[61],"namely":[62],"independent":[63],"patients":[64],"hierarchically":[66],"organized":[67],"staffs.":[69],"patient":[71],"identified":[73],"by":[74,83],"his/her":[75,84,164],"identity,":[76],"staff":[80],"recognized":[82],"role":[85,166],"in":[86,190],"institute.":[89],"user":[91,156],"can":[92],"comprehend":[93],"only":[96],"if":[97,163],"he/she":[98],"satisfies":[99,167],"policy":[102],"associated":[103],"with":[104,126],"EHR,":[106],"which":[107,131],"implies":[108],"fine-grained":[110],"control.":[112],"public":[114],"auditor":[115],"employed":[117],"verify":[119],"whether":[120],"correctly":[124],"encapsulated":[125],"specified":[128],"policy,":[130],"provides":[132],"priori":[135],"approach":[136],"find":[138],"fraudulent":[139],"EHRs":[140,161],"reduce":[142],"potential":[143],"disputes.":[145],"Moreover,":[146],"RBAC":[148,189],"enforces":[149],"forward":[151],"revocation":[152],"mechanism.":[153],"revoked":[155],"cannot":[157],"future":[160],"even":[162],"previous":[165],"policy.":[170],"These":[171],"security":[172],"properties":[173],"formally":[175],"proven":[176],"under":[177],"well-established":[178],"assumptions.":[179],"Theoretical":[180],"experimental":[182],"analyses":[183],"show":[184],"efficiency":[186],"terms":[191],"communication":[193],"computation.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
