Page 210 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 210
2019 ITU Kaleidoscope Academic Conference
[11] Dimitrov D V. Medical internet of things and big data [25] Bartoletti M, Lande S, Podda A S. A
in healthcare[J]. Healthcare informatics research, 2016, Proof-of-Stake protocol for consensus on Bitcoin
22(3): 156-163. subchains[C]//International Conference on Financial
Cryptography and Data Security. Springer, Cham,
[12] Lo’ai A T, Mehmood R, Benkhlifa E, et al. Mobile cloud 2017: 568-584.
computing model and big data analysis for healthcare
applications[J]. IEEE Access, 2016, 4: 6171-6180. [26] Schwartz D, Youngs N, Britto A. The ripple protocol
consensus algorithm[J]. Ripple Labs Inc White Paper,
[13] Chen M, Qian Y, Chen J, et al. Privacy protection 2014, 5.
and intrusion avoidance for cloudlet-based medical data
sharing[J]. IEEE transactions on Cloud computing, [27] Castro M, Liskov B. Practical Byzantine fault
2016. tolerance[C]//OSDI. 1999, 99: 173-186.
[14] Reti S R, Feldman H J, Ross S E, et al. [28] ThePiachu’s Bitcoin Blog. Thoughts on Delegated Proof
Improving personal health records for patient-centered of Stake and Bitshares[OL].2014. http://tpbit.blogspot.
care[J]. Journal of the American Medical Informatics com/2014/08/thoughts-on-delegated-proof-of-stake.
Association, 2010, 17(2): 192-195. html
[15] Papoutsi C, Reed J E, Marston C, et al. Patient and [29] Crain T, Gramoli V, Larrea M, et al. DBFT: Efficient
public views about the security and privacy of Electronic Leaderless Byzantine Consensus and its Application
Health Records (EHRs) in the UK: results from a to Blockchains[C]//2018 IEEE 17th International
mixed methods study[J]. BMC medical informatics and Symposium on Network Computing and Applications
decision making, 2015, 15(1): 86. (NCA). IEEE, 2018: 1-8.
[16] Haas S, Wohlgemuth S, Echizen I, et al. Aspects of [30] NEO - An Open Network For Smart
privacy for electronic health records[J]. International Economy[OL].2014. https://neo.org/
journal of medical informatics, 2011, 80(2): e26-e31.
[31] Xia Q, Zhang F J, Zuo C. Review for consensus
[17] Yarmand M H, Sartipi K, Down D G. Behavior-based mechanism of cryptocurrency system[J]. Computer
access control for distributed healthcare systems[J]. Systems & Applications, 2017.
Journal of Computer Security, 2013, 21(1): 1-39.
[32] Viriyasitavat W, Hoonsopon D. Blockchain
[18] Ivan D. Moving toward a blockchain-based method for characteristics and consensus in modern business
the secure storage of patient records[C]//ONC/NIST processes[J]. Journal of Industrial Information
Use of Blockchain for Healthcare and Research Integration, 2019, 13: 32-39.
Workshop. Gaithersburg, Maryland, United States:
ONC/NIST. 2016. [33] Tasca P, Tessone C J. Taxonomy of blockchain
technologies. Principles of identification and
[19] Iansiti M, Lakhani K R. The truth about blockchain[J]. classification[J]. arXiv preprint arXiv:1708.04872,
Harvard Business Review, 2017, 95(1): 118-127. 2017.
[20] Crosby M, Pattanayak P, Verma S, et al. Blockchain [34] Gonzalez A. Unified application, user interface and
technology: Beyond bitcoin[J]. Applied Innovation, data linking: U.S. Patent Application 10/796,422[P].
2016, 2(6-10): 71. 2005-9-8.
[21] Casino F, Dasaklis T K, Patsakis C. A systematic [35] Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based
literature review of blockchain-based applications: access control models[J]. Computer, 1996, 29(2):
current status, classification and open issues[J]. 38-47.
Telematics and Informatics, 2018.
[36] Anderson C. Docker [software engineering][J]. IEEE
[22] Vacca J R. Public key infrastructure: building Software, 2015, 32(3): 102-c3.
trusted applications and Web services[M]. Auerbach
Publications, 2004.
[23] Kaur R, Kaur A. Digital signature[C]//2012
International Conference on Computing Sciences.
IEEE, 2012: 295-301.
[24] Gervais A, Karame G O, Wüst K, et al.
On the security and performance of proof of
work blockchains[C]//Proceedings of the 2016 ACM
SIGSAC conference on computer and communications
security. ACM, 2016: 3-16.
– 190 –