Articles with "hierarchical key" as a keyword



Photo by hudsoncrafted from unsplash

Securing Private Keys in Electronic Health Records Using Session-Based Hierarchical Key Encryption

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Applied Security Research"

DOI: 10.1080/19361610.2017.1354272

Abstract: ABSTRACT Patients want the assurance that the confidentiality of their records accessed through Electronic Health Records (EHR) are safe. With increasing implementation of EHR for health care, privacy concern remains a barrier that limits patients'… read more here.

Keywords: based hierarchical; hierarchical key; session based; health ... See more keywords
Photo by flyd2069 from unsplash

STYX: A Hierarchical Key Management System for Elastic Content Delivery Networks on Public Clouds

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2019.2918278

Abstract: Hosting content delivery networks (CDNs) on clouds has the potential to improve the performance as resources and caches can be placed closer to subscribers. However, avoiding data leakage over an untrusted public cloud is critical,… read more here.

Keywords: key management; management; management system; hierarchical key ... See more keywords