R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, Proceedings of VLDB'02, pp.143-154, 2002.
DOI : 10.1016/B978-155860869-6/50021-4

B. Alhaqbani and C. J. Fidge, Access Control Requirements for Processing Electronic Health Records Business, Proceedings of the Process Management Workshops, pp.371-382, 2007.

T. Allard, B. Nguyen, and P. Pucheral, Safe Anonymization with Smart Tokens. Retrieved from http

. Alliance, The National Alliance for Health Information Technology, on Defining Key Health Information Technology Term, 2008.

N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, and D. Shasha, GhostDB, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.677-688, 2007.
DOI : 10.1145/1247480.1247555

URL : https://hal.archives-ouvertes.fr/inria-00321721

N. Anciaux, C. Bobineau, L. Bouganim, P. Pucheral, and P. Valduriez, PicoDBMS: Validation and Experience, Proceedings of the International Conference on Very Large Data Bases (VLDB), pp.709-710, 2001.

N. Anciaux, L. Bouganim, and P. Pucheral, Confidentialit?? des Bases de Donn??es : Apports de la Cryptographie et de Composants Mat??riels S??curis??s, annals of telecommunications - annales des t??l??communications, vol.29, issue.2, pp.61-64, 2006.
DOI : 10.1007/BF03219909

N. Anciaux, L. Bouganim, and P. Pucheral, Future Trends in Secure Chip Data Management, IEEE Data Engineering Bulletin, vol.30, issue.3, pp.49-57, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00316019

M. Y. Becker and P. Sewell, Cassandra: Flexible Trust Management, Applied to Electronic Health Records. Computer Security Foundations Workshop, pp.139-154, 2004.
DOI : 10.1109/csfw.2004.1310738

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.3800

B. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970.
DOI : 10.1145/362686.362692

S. H. Brown, M. J. Lincoln, P. J. Groen, and R. M. Kolodner, VistA???U.S. Department of Veterans Affairs national-scale HIS, International Journal of Medical Informatics, vol.69, issue.2-3, pp.135-156, 2003.
DOI : 10.1016/S1386-5056(02)00131-4

J. Byun and N. Li, Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, pp.603-619, 2008.
DOI : 10.1007/s00778-006-0023-0

L. C. Carrasco, RDBMS's for Java Cards? What a Senseless Idea! ISOL Corp, 1999.

E. F. Codd, A relational model of data for large shared data banks, Communications of the ACM, vol.13, issue.6, pp.377-387, 1970.
DOI : 10.1145/362384.362685

M. R. Dahl and J. , Status and perspective of personal health informatics in Denmark Section for Health Informatics, Institute of Public Health Le dossier médical personnel (Information Rep, 2006.

. Ehealth-insider, German doctors say no to centrally stored patient records, 2008.

D. F. Eurosmart, R. D. Kuhn, and R. Chandramouli, Smart USB Token Role-Based Access Control, 2003.

. Fiercehealthit-news, Massive data loss at HCA. Retrieved, 2006.

. Fiercehealthit-news, GA hospital health data breach due to outsourcing errorstory/ga-hospital-health- data-breach-due-outsourcing-error, 2008.

B. C. Fung, K. Wang, R. Chen, and P. S. Yu, Privacy-preserving data publishing, ACM Computing Surveys, vol.42, issue.4
DOI : 10.1145/1749603.1749605

L. A. Gordon, M. P. Loeb, W. Lucyshin, and R. Richardson, 2006 CSI/FBI Computer Crime and Security Survey, 2006.

J. Y. Halpern and V. Weissman, Using First-Order Logic to Reason about Policies, ACM Transactions on Information and System Security, vol.11, issue.4, pp.1-41, 2008.
DOI : 10.1145/1380564.1380569

URL : http://arxiv.org/abs/cs/0601034

C. Husek, ELGA: The Electronic Health Record in Austria. Paper presented at the International Conference of Society for Medical Innovation and Technology, 2008.

G. Karjoth, M. Schunter, and M. Waidner, Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data, Privacy Enhancing Technologies, pp.69-84, 2002.
DOI : 10.1007/3-540-36467-6_6

M. Langheinrich and . Zurich, Personal Privacy in Ubiquitous Computing, 2005.

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Mondrian multidimensional kanonymity, Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE), 2006.

T. Liebert, Ongoing concern over Pentagon network attack. IT News Digest, p.2098, 2008.

F. Massacci and N. Zannone, Privacy Is Linking Permission to Purpose, Proceedings of the Security Protocols Workshop, pp.179-191, 2004.
DOI : 10.1007/3-540-36467-6_10

M. International, ?asterCard Open Data Storage Version 2.0. Technical Specifications, 2002.

M. E. Nergiz, M. Atzori, and C. W. Clifton, Hiding the presence of individuals from shared databases, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.665-676, 2007.
DOI : 10.1145/1247480.1247554

Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, Privacy-aware role based access, Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pp.41-50, 2007.
DOI : 10.1109/msp.2009.102

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.566

C. D. Pedersen, MedCom -the Danish Healthcare Data Network, 2006.

P. Pucheral, L. Bouganim, P. Valduriez, and C. Bobineau, PicoDBMS: Scaling down database techniques for the smartcard, Very Large Data Bases Journal (VLDBJ), vol.10, issue.2-3, pp.120-132, 2001.
URL : https://hal.archives-ouvertes.fr/hal-00442710

P. Pucheral and S. Yin, System and Method of Managing Indexation of Flash Memory, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00340331

L. Røstad and O. Nytrø, Personalized access control for a personally controlled health record, Proceedings of the 2nd ACM workshop on Computer security architectures, CSAW '08, pp.9-16, 2008.
DOI : 10.1145/1456508.1456511

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001.
DOI : 10.1109/69.971193

P. Samarati and S. D. Di-vimercati, Access Control: Policies, Models, and Mechanisms, Proceedings of the Foundations of Security Analysis and Design on Foundations of Security Analysis and Design 2000 Conference, pp.137-196, 2000.
DOI : 10.1007/3-540-45608-2_3

P. Samarati and L. Sweeney, Generalizing data to provide anonymity when disclosing information (abstract), Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems , PODS '98, p.188, 1998.
DOI : 10.1145/275487.275508

. Smart-card-alliance, The Taiwan Health Care Smart Card Project, Smart Card Applications in the U.S. Healthcare Industry (White Paper No. HC-06001), 2005.

L. Sweeney, Datafly: a system for providing anonymity in medical data, Proceedings of the IFIP TC11 WG11.3 11th International Conference on Database Security XI: Status and Prospects, pp.356-381, 1998.
DOI : 10.1007/978-0-387-35285-5_22

T. Washington-post, Consultant Breached FBI's Computers, 2006.

J. Vandewalle, Smart Card Research Perspectives. LNCS Construction and Analysis of Safe, 2004.
DOI : 10.1007/978-3-540-30569-9_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.3174

K. Wang and B. C. Fung, Anonymizing sequential releases, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, 2006.
DOI : 10.1145/1150402.1150449

W. Xiao, X. Tao, and Y. , Medical Center Patient Records Posted On Internet m-invariance: Towards privacy preserving re-publication of dynamic datasets, Proceedings of the ACM SIGMOD Conference, 2007.

N. Yang, H. Barringer, and N. Zhang, A Purpose-Based Access Control Model, Proceedings of the Symposium in Information Assurance and Security, pp.143-148, 2007.

C. Yao, X. S. Wang, and S. Jajodia, Checking for k-anonymity violation by views, Proceedings of the 31st Very Large Data Bases (VLDB) Conference, pp.910-921, 2005.

S. Yin, P. Pucheral, and X. Meng, A sequential indexing scheme for flash-based embedded systems, Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology, EDBT '09, 2009.
DOI : 10.1145/1516360.1516429

URL : https://hal.archives-ouvertes.fr/hal-00624077

X. Zhang, F. Parisi-presicce, R. Sandhu, and J. Park, Formal model and policy specification of usage control, ACM Transactions on Information and System Security, vol.8, issue.4, pp.351-387, 2005.
DOI : 10.1145/1108906.1108908