Kohn, L., Corrigan, J., and Donaldson, M., Committee on Quality of Health Care in America IoM. Crossing the quality chasm. National Academy Press, Washington, DC, 2001.
Google Scholar
Markle Foundation, Connecting for health: a public private collaborative. New York, The personal health working group final report, 2003.
Pagliari, C., Detmer, D., and Singleton, P., Potential of electronic personal health records. Br. Med. J. 335(7615):330–333, 2007.
Article
Google Scholar
Computer Science and Telecommunications Board, National Research Council, Networking health: prescriptions for the internet. National Academy Press, Washington, DC, 2000.
Google Scholar
The American Health Information Management Association and The American Medical Informatics Association, The value of personal health records: a joint position statement for consumers of health care. J. AHIMA 78(4):22–24, 2007.
Google Scholar
Tang, P. C., Ash, J. S., Bates, D. W., Overhage, J. M., and Sands, D. Z., Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J. Am. Med. Inform. Assoc. 13(2):121–126, 2006.
CAS
Article
PubMed
PubMed Central
Google Scholar
AHIMA e-HIM Personal Health Record Work Group, Defining the personal health record. J. Am. Health Inf. Manag. Assoc. 76(6):24–25, 2005.
Google Scholar
Pratt, W., Unruh, K., Civan, A., and Skeels, M. M., Personal health information management. Commun. ACM 49(1):51–55, 2006.
Article
Google Scholar
Li, M., Yu, S, Ren, K., Lou, W., Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings, 6th Iternational ICST Conference, Vol. 50, pp. 89–106, 2010.
Sittig, D. F., Personal health records on the internet: a snapshot of the pioneers at the end of the 20th Century. Int. J. Med. Inform. 65(1):1–6, 2002.
Article
PubMed
Google Scholar
Waegemann, C. P., Closer to reality: personal health records represent a step in the right direction for interoperability of healthcare IT systems and accessibility of patient data. Health Manag. Technol. 26(5):16–18, 2005.
PubMed
Google Scholar
Tang, P. C., and Newcomb, C., Informing patients: a guide for providing patient health information. J. Am. Med. Inform. Assoc. 5(6):563–570, 1998.
CAS
Article
PubMed
PubMed Central
Google Scholar
Markle Foundation, The personal health working group final report. Connecting for health: a public-private collaborative. Markle Foundation, 2003.
Google Health, https://www.ROORle.com/health
Microsoft Health Vault, http://www.healthvault.com
Kaelber, D. C., Jha, A. K., Johnston, D., Middleton, B., and Bates, D. W., A research agenda for personal health records. J. Am. Med. Inform. Assoc. 15(6):729–736, 2008.
Article
PubMed
PubMed Central
Google Scholar
Sunyaev, A., Chornyi, D., Mauro, C., and Kremar, H., Evaluation framework for personal health records: Microsoft HealthVault v.s. Google Health. IEEE Conference on System Sciences, System Sciences (HICSS), pp. 1–10, 2010.
Kim, M. I., and Johnson, K. B., Personal health records: evaluation of functionality and utility. J. Am. Med. Inform. Assoc. 9:171–180, 2002.
Article
PubMed
PubMed Central
Google Scholar
Working Group on Policies for Electronic Information Sharing between Doctors and Patients, Connecting Americans to their healthcare: final report. Markle Foundation, 2004.
Cohen, J. T., HIPAA, The HITECH Act, and How Google May Still Be Able to Distribute, and Profit From, Your Personal Health Info. Health Reform Watch, 2009.
Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lindner, M., A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1):50–55, 2009.
Article
Google Scholar
Mell, P., and Grance, T., The NIST definition of cloud computing. National Institute of Standards and Technology, 2011.
Zissis, D., and Lekkas, D., Securing e-Government and e-Voting with an open cloud computing architecture. Gov. Inf. Q. 28(2):239–251, 2011.
Article
Google Scholar
Yoo, C. S., Cloud computing: architectural and policy implications. Rev. Ind. Organ. 38(4):405–421, 2011.
Article
Google Scholar
Vaquero, L. M., Rodero-Merino, L., and Morán, D., Locking the sky: a survey on IaaS cloud Security. Computing 91(1):93–118, 2011.
Article
Google Scholar
Kandukuri, B. R., Paturi V. R., Rakshit A., “Cloud Security Issues,” 2009 I.E. International Conference on Services Computing, pp. 517–520, 2009.
Parakh, A., and Kak, S., Online data storage using implicit security. Inf. Sci. 179(19):3323–3331, 2009.
Article
Google Scholar
Crescenzo, G. D., Malkin, T., Ostrovsky, R., Single database private information retrieval implies oblivious transfer. Advances in Cryptology – EUROCRYPT 2000, Bruges, Belgium. Vol. 1807, pp. 122–138, 2000.
Gara, J. A., and MacKenzie, P. D., Concurrent oblivious transfer. Proceedings of 41st Symposium on Foundations of Computer Science, Redondo Beach, California, USA, pp. 314–324, 2000.
Kilian, J., Founding cryptography on oblivious transfer. Proceedings of 20th ACM Symposium on Theory of Computing, Chicago, USA, pp. 20–31, 1988.
Rabin, M. O., How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Lab, Harvard University, 1981.
Even, S., Goldreich, O., and Lempel, A., A randomized protocol for signing contracts. Commun. ACM 28(6):637–647, 1985.
Article
Google Scholar
Brassard, G., and Cre’peau, C., Oblivious transfer and privacy amplification. EUROCRYPT’97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, pp. 334–347, 1997.
Huang, H. F., Chang, C. C., and Yeh, J. S., Enhancement of non-interactive oblivious transfer scheme. Proceedings of Fourth International Conference on Information and Management Sciences, pp. 196–199, 2005.
Mu, Y., Zhang, J., Varadharajan, V., and Lin, Y. X., Robust non-interactive oblivious transfer. IEEE Commun. Lett. 7(4):153–155, 2003.
Article
Google Scholar
Lee, N. Y., and Wang, C. C., Verifiable oblivious transfer protocol. IEICE Trans. Inf. Syst. E88-D(12):2890–2892, 2005.
Article
Google Scholar
Chang, C. C., and Lee, J. S., Robust t-out-of-n oblivious transfer mechanism based on CRT. J. Netw. Comput. Appl. 32(1):226–235, 2008.
Article
Google Scholar
Zhang, J., and Wang, Y, Two provably secure k-out-of-n oblivious transfer schemes. Appl. Math. Comput. 169, 2005.
Chu, C.-K., and Tzeng, W.-G., Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries, PKC 2005 LNCS, pp. 172–183, 2005.