{"id":"https://openalex.org/W2465360610","doi":"https://doi.org/10.1109/ismict.2016.7498900","title":"Secure access delegation of encrypted medical information","display_name":"Secure access delegation of encrypted medical information","publication_year":2016,"publication_date":"2016-03-01","ids":{"openalex":"https://openalex.org/W2465360610","doi":"https://doi.org/10.1109/ismict.2016.7498900","mag":"2465360610"},"language":"en","primary_location":{"id":"doi:10.1109/ismict.2016.7498900","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ismict.2016.7498900","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 10th International Symposium on Medical Information and Communication Technology (ISMICT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050873844","display_name":"Arnab Deb Gupta","orcid":null},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Arnab Deb Gupta","raw_affiliation_strings":["College of Computing Sciences, New Jersey Institute of Technology, Newark, NJ"],"affiliations":[{"raw_affiliation_string":"College of Computing Sciences, New Jersey Institute of Technology, Newark, NJ","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051232717","display_name":"Yuriy Polyakov","orcid":"https://orcid.org/0000-0002-5566-3763"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuriy Polyakov","raw_affiliation_strings":["College of Computing Sciences, New Jersey Institute of Technology, Newark, NJ"],"affiliations":[{"raw_affiliation_string":"College of Computing Sciences, New Jersey Institute of Technology, Newark, NJ","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034274465","display_name":"Kurt Rohloff","orcid":"https://orcid.org/0000-0003-0389-5092"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kurt Rohloff","raw_affiliation_strings":["College of Computing Sciences, New Jersey Institute of Technology, Newark, NJ"],"affiliations":[{"raw_affiliation_string":"College of Computing Sciences, New Jersey Institute of Technology, Newark, NJ","institution_ids":["https://openalex.org/I118118575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050873844"],"corresponding_institution_ids":["https://openalex.org/I118118575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03498296,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7351680397987366},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6458932757377625},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6397760510444641},{"id":"https://openalex.org/keywords/delegate","display_name":"Delegate","score":0.6037705540657043},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.5932896733283997},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.46703311800956726},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.45451945066452026},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.42872804403305054},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.22985109686851501},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0860966145992279}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7351680397987366},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6458932757377625},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6397760510444641},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.6037705540657043},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.5932896733283997},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.46703311800956726},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.45451945066452026},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.42872804403305054},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.22985109686851501},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0860966145992279},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ismict.2016.7498900","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ismict.2016.7498900","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 10th International Symposium on Medical Information and Communication Technology (ISMICT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1598269861","https://openalex.org/W1886646278","https://openalex.org/W1965499891","https://openalex.org/W2001584492","https://openalex.org/W2022704387","https://openalex.org/W2041069220","https://openalex.org/W2048994663","https://openalex.org/W2058785578","https://openalex.org/W2063135025","https://openalex.org/W2089341364","https://openalex.org/W2983018934","https://openalex.org/W4298022300"],"related_works":["https://openalex.org/W115332106","https://openalex.org/W1591695585","https://openalex.org/W3183911098","https://openalex.org/W4248360724","https://openalex.org/W4238454263","https://openalex.org/W2559470891","https://openalex.org/W4245844877","https://openalex.org/W4386088672","https://openalex.org/W3125255130","https://openalex.org/W1975904519"],"abstract_inverted_index":{"The":[0,81,208],"design":[1,181],"of":[2,200,215],"modern":[3],"medical":[4,23,87],"data":[5,17,24,53,66,88,98,101,116,148,152,192,201,218],"information":[6,137],"systems":[7,219],"is":[8],"driven":[9],"by":[10,195],"the":[11,123,197,213],"need":[12,82,124],"to":[13,18,25,42,96,125,129,141,154,175,203,220],"collect":[14],"and":[15,28,40,57,68,77,85,121,139,183,228],"present":[16,134],"authorized":[19],"users.":[20],"For":[21],"collected":[22],"be":[26,34,47,55,173],"effective":[27,93,111],"improve":[29],"patient":[30],"treatment":[31],"it":[32],"must":[33,114],"transported":[35],"from":[36],"a":[37,135,144,166],"device,":[38],"aggregated,":[39],"analyzed":[41,56],"produce":[43],"results":[44],"that":[45,171],"can":[46,172],"shared":[48],"with":[49,146],"care":[50,69,191,217],"providers.":[51],"Medical":[52],"may":[54],"used":[58],"years":[59],"after":[60],"collection":[61],"at":[62,118],"different":[63,74],"locations":[64],"because":[65],"sources":[67],"providers":[70],"often":[71],"operate":[72],"on":[73],"time":[75],"scales":[76],"are":[78],"geographically":[79],"distributed.":[80],"for":[83],"distributed":[84],"long-term":[86],"storage":[89],"thus":[90],"requires":[91],"an":[92],"security":[94,131,169,221],"model":[95,113,145,170],"delegate":[97],"access.":[99],"Current":[100],"access":[102,153],"delegation":[103,112],"models":[104],"do":[105],"not":[106],"provide":[107],"end-to-end":[108,147],"protection.":[109],"An":[110],"keep":[115],"encrypted":[117],"all":[119],"times":[120],"avoid":[122,130],"share":[126],"decryption":[127],"keys":[128],"vulnerabilities.":[132],"We":[133,179],"secure":[136,198],"architecture":[138,158,188,209],"prototype":[140],"implement":[142],"such":[143,223],"encryption":[149],"while":[150],"restricting":[151],"designated":[155],"recipients.":[156],"Our":[157,187],"integrates":[159],"recent":[160],"Proxy":[161],"Re-Encryption":[162],"(PRE)":[163],"advances":[164],"into":[165],"client-server":[167],"based":[168],"applied":[174],"open":[176],"Internet":[177],"communications.":[178],"discuss":[180],"tradeoffs":[182],"show":[184],"experimental":[185],"results.":[186],"lowers":[189],"health":[190,216],"management":[193],"costs":[194],"enabling":[196],"outsourcing":[199],"hosting":[202],"low-cost":[204],"cloud":[205],"computing":[206],"environments.":[207],"will":[210],"also":[211],"reduce":[212],"vulnerability":[214],"challenges":[222],"as":[224],"attacks":[225],"compromising":[226],"confidentiality":[227],"malicious":[229],"insiders.":[230]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
