[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Garcia et al., 2022 - Google Patents

Blockchain-aided and privacy-preserving data governance in multi-stakeholder applications

Garcia et al., 2022

View PDF
Document ID
3540479416813900619
Author
Garcia R
Ramachandran G
Jurdak R
Ueyama J
Publication year
Publication venue
IEEE Transactions on Network and Service Management

External Links

Snippet

Real-world applications in healthcare and supply chain domains produce, exchange, and share data in a multi-stakeholder environment. Data owners want to control their data and privacy in such settings. On the other hand, data consumers demand methods to understand …
Continue reading at eprints.qut.edu.au (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Sookhak et al. Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues
Jin et al. A review of secure and privacy-preserving medical data sharing
Sharma et al. Blockchain-based interoperable healthcare using zero-knowledge proofs and proxy re-encryption
Zhang et al. FHIRChain: applying blockchain to securely and scalably share clinical data
Gohar et al. A patient-centric healthcare framework reference architecture for better semantic interoperability based on blockchain, cloud, and IoT
Zhang et al. Security and privacy for healthcare blockchains
TW201132097A (en) Trustworthy extensible markup language for trustworthy computing and data services
Altowaijri An architecture to improve the security of cloud computing in the healthcare sector
Garcia et al. Blockchain-aided and privacy-preserving data governance in multi-stakeholder applications
Anitha Kumari et al. Securing Internet of Medical Things (IoMT) using private blockchain network
Boumezbeur et al. Privacy-preserving and access control for sharing electronic health record using blockchain technology
Ghorbel et al. Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain
John et al. Provably secure data sharing approach for personal health records in cloud storage using session password, data access key, and circular interpolation
Kaur et al. Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS
Usmani et al. A systematic review of privacy-preserving blockchain in e-medicine
Zaghloul et al. $ d $ d-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications
George et al. MediTrans—Patient‐centric interoperability through blockchain
Garcia et al. A Blockchain-based Data Governance with Privacy and Provenance: a case study for e-Prescription
Satybaldy et al. Decentralized identity management for E-health applications: State-of-the-art and guidance for future work
Gao et al. Blockchain-based multi-hop permission delegation scheme with controllable delegation depth for electronic health record sharing
Itnal et al. A secured healthcare medical system using blockchain technology
Exceline et al. Flexible access control mechanism for cloud stored EHR using consortium blockchain
Thilagavathy et al. A novel framework paradigm for EMR management cloud system authentication using blockchain security network
Riadi et al. Developing data integrity in an electronic health record system using blockchain and interplanetary file system (case study: COVID-19 data)
Wang et al. A User‐Centered Medical Data Sharing Scheme for Privacy‐Preserving Machine Learning