A review of secure and privacy-preserving medical data sharing

H **, Y Luo, P Li, J Mathew - IEEE access, 2019 - ieeexplore.ieee.org
In the digital healthcare era, it is of the utmost importance to harness medical information
scattered across healthcare institutions to support in-depth data analysis and achieve …

Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Revocable attribute-based encryption with data integrity in clouds

C Ge, W Susilo, J Baek, Z Liu, J **a… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cloud computing enables enterprises and individuals to outsource and share their data.
This way, cloud computing eliminates the heavy workload of local information infrastructure …

Dp-forward: Fine-tuning and inference on language models with differential privacy in forward pass

M Du, X Yue, SSM Chow, T Wang, C Huang… - Proceedings of the 2023 …, 2023 - dl.acm.org
Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-
propagation, safeguarding training data from privacy leakage, particularly membership …

Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure

S Das, S Namasudra - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
The exponential growth of the Internet of Things (IoT) technologies requires high data
security. Here, data security is very critical as all IoT devices transfer data over the Internet …

Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption

M Li, S Yu, Y Zheng, K Ren… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Personal health record (PHR) is an emerging patient-centric model of health information
exchange, which is often outsourced to be stored at a third party, such as cloud providers …

Outsourcing the decryption of {ABE} ciphertexts

M Green, S Hohenberger, B Waters - 20th USENIX security symposium …, 2011 - usenix.org
Attribute-based encryption (ABE) is a new vision for public key encryption that allows users
to encrypt and decrypt messages based on user attributes. For example, a user can create a …

VABKS: Verifiable attribute-based keyword search over outsourced encrypted data

Q Zheng, S Xu, G Ateniese - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
It is common nowadays for data owners to outsource their data to the cloud. Since the cloud
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …

Decentralizing attribute-based encryption

A Lewko, B Waters - Annual international conference on the theory and …, 2011 - Springer
Abstract We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our
system, any party can become an authority and there is no requirement for any global …

Frequency-tuned salient region detection

R Achanta, S Hemami, F Estrada… - 2009 IEEE conference …, 2009 - ieeexplore.ieee.org
Detection of visually salient image regions is useful for applications like object
segmentation, adaptive compression, and object recognition. In this paper, we introduce a …