Committee on Quality of Health Care in America IoM, Crossing the quality chasm
. National Academy Press, Washington, DC, 2001.Google Scholar
Kaelber, D. C., Jha, A. K., Johnston, D., Middleton, B., and Bates, D. W., A research agenda for personal health records. J. Am. Med. Inform. Assoc.
15(6):729–736, 2008.CrossRefGoogle Scholar
Pagliari, C., Detmer, D., and Singleton, P., Potential of electronic personal health records. Br. Med. J.
335(7615):330–333, 2007.CrossRefGoogle Scholar
National Research Council, Networking health: prescriptions for the internet
. National Academy Press, Washington, DC, 2000.Google Scholar
AHIMA, AMIA, The value of personal health records: a joint position statement for consumers of healthcare. J. Am. Med. Inform. Assoc.
78(4):22–24, 2007.Google Scholar
Tang, P. C., Ash, J. S., Bates, D. W., Overhage, J. M., and Sands, D. Z., Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J. Am. Med. Inform. Assoc.
13(2):121–126, 2006.CrossRefGoogle Scholar
Li, M., Yu, S., Ren, K., and Lou, W., “Securing Personal Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings,” Security and Privacy in Communication Networks, pp. 89-106, 2010.
Shortliffe, E. H., The evolution of electronic medical records. Acad. Med.
74:414–419, 1999.CrossRefGoogle Scholar
Cimino, J. J., Socratous, S. A., and Clayton, P. D., Internet as clinical information system: application development using the world wide Web. J. Am. Med. Informat. Assoc.
2:273–284, 1995.CrossRefGoogle Scholar
Schneider, J. H., Online personal medical records: Are they reliable for acute/critical care? Soc. Crit. Care Med.
29:196–201, 2001.CrossRefGoogle Scholar
Department of Health and Human Services, Security and electronic signature standards. Fed. Regist.
63(155):43241–43243, 1998.Google Scholar
Google health, Available: http://www.google.com/intl/en-US/health/about/index.html
Microsoft health Vault, Available:http://www. healthvault.com/Personal/index.html
US Public Law, “"Health Insurance Portability and Accountability Act of 1996,” 104th Congress, Public Law 104–191, 1996.
Yanga, C. M., Lina, H. C., Changb, P., and Jianc, W. S., Taiwan’s Perspective on electronic medical Records’ security and privacy protection: lessons learned from HIPAA. Comput. Meth. Programs. Biomed.
82:277–282, 2006.CrossRefGoogle Scholar
Qualys On Demand Vulnerability Management, “CASE STUDY: Geisinger Health System—Bringing HIPAA Compliance to an Electronic Medical Record System,” http://www.qualys.com/docs/geisinger.pdf
“Meeting HITECH’s Challenge to the Health Care Industry,” An Oracle White Paper, May 2010.
Atluri, V., and Huang, W., “An Authorization Model for Workflows,” Proceedings of the Fourth European Symposium on Research in Computer Security, pp. 25-27, 1996.
Barkley, J. F., Ferraiolo, D. F., and Kuhn, D. R., “A role based access control model and reference implementation within a corporate intranet”. ACM Trans. Inform. Syst.Secur. (TISSEC)
2:34–64, 1999.CrossRefGoogle Scholar
Botha, R., “CoSAWoE – A Model for Context-sensitive Access Control in Workflow Environments,” South Africa computer journal, 2001.
Coyne, E., Fenstein, H., Sandhu, R., and Youman, C., Role-based access control models. IEEE Computer
29(2):38–47, 1996.CrossRefGoogle Scholar
Denning, D. E., “Cryptographic Checksums for Multilevel Database Security,” Proceedings of the 1984 IEEE Symposium on Security and Privacy, pp. 52–61, 1984.
Bardram, J. E., Pervasive healthcare as a scientific discipline. Methods. Inform. Med.
47:129–142, 2008.Google Scholar
US Department of Health and Human Services, “Personal Health Records and Personal Health Record Systems,” National Committee on Vital and Health Statistics, pp. 15, 2006.
Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lindner, M., A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Comm.
39(1):50–55, 2008.CrossRefGoogle Scholar
Mell, P. and Grance, T., “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology. 2009.
Brunette, G. and Mogull, R., “Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” Cloud Security Alliance, 2009.
Gens, F., “"New IDC IT Cloud Services Survey: Top Benefits and Challenges,” IDC eXchange, 2009
Minister of Justice, “Personal Information Protection and Electronic Documents Act (PIPEDA),” 2011.
Benaloh,J., Chase,M., Horvitz,E., and Lauter, K., “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” In Proceedings of the ACM workshop on Cloud computing security, pp. 103-114, 2009.
Stalling,W., “Network and Network Security – Principles and Practice,” Prentice Hall International Edition, pp. 1-14, 1995.
Stallings, W., “Cryptography and Network Security, Principles and Practice,” Prentice Hall, 2003
AIM (Advance Informatics in Medicine), “Secure Environment for Information Systems in Medicine,” SEISMED (A2033)/SP14/HILD/05.07. 95.
Shamir, A., “Identity-based Cryptosystems and Signature Schemes,” Advances in Cryptology-Proceedings of CRYPTO’84, Springer-Verlag LNCS 196, pp.47-53, 1985.
National Bureau of Standards, FIPS pub. 46, “Data Encryption Standard,” US Department of Commerce, January 1977.
Lai, X., and Massey, J., “"A proposal for a New block encryption standard”, Proceedings of Eurocrypt’91, Springer-Verlag. LNCS
473:389–404, 1991.MathSciNetGoogle Scholar
Miller, V., “Use of Elliptic Curves in Cryptography”, Advances in Cryptology-Crypto’85. LNCS
218:417–426, 1985.MathSciNetGoogle Scholar
Rivest, R., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public-Key cryptosystems. Commun. ACM
21(2):120–126, 1978.MathSciNetMATHCrossRefGoogle Scholar
ElGamal, T., “A Public-Key Cryptosystem and a Signature Scheme based on Discrete Logarithms”, Advances in Cryptology-Crypto’85, Springer-Verlag. LNCS
196:10–18, 1985.MathSciNetGoogle Scholar
Koblitz, N., Elliptic curve cryptosystems. Math. Comput.
48:203–209, 1985.MathSciNetGoogle Scholar