Hippocratic Databases, Proceedings of VLDB'02, pp.143-154, 2002. ,
DOI : 10.1016/B978-155860869-6/50021-4
Access Control Requirements for Processing Electronic Health Records Business, Proceedings of the Process Management Workshops, pp.371-382, 2007. ,
Safe Anonymization with Smart Tokens. Retrieved from http ,
The National Alliance for Health Information Technology, on Defining Key Health Information Technology Term, 2008. ,
GhostDB, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.677-688, 2007. ,
DOI : 10.1145/1247480.1247555
URL : https://hal.archives-ouvertes.fr/inria-00321721
PicoDBMS: Validation and Experience, Proceedings of the International Conference on Very Large Data Bases (VLDB), pp.709-710, 2001. ,
Confidentialit?? des Bases de Donn??es : Apports de la Cryptographie et de Composants Mat??riels S??curis??s, annals of telecommunications - annales des t??l??communications, vol.29, issue.2, pp.61-64, 2006. ,
DOI : 10.1007/BF03219909
Future Trends in Secure Chip Data Management, IEEE Data Engineering Bulletin, vol.30, issue.3, pp.49-57, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00316019
Cassandra: Flexible Trust Management, Applied to Electronic Health Records. Computer Security Foundations Workshop, pp.139-154, 2004. ,
DOI : 10.1109/csfw.2004.1310738
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.3800
Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970. ,
DOI : 10.1145/362686.362692
VistA???U.S. Department of Veterans Affairs national-scale HIS, International Journal of Medical Informatics, vol.69, issue.2-3, pp.135-156, 2003. ,
DOI : 10.1016/S1386-5056(02)00131-4
Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, pp.603-619, 2008. ,
DOI : 10.1007/s00778-006-0023-0
RDBMS's for Java Cards? What a Senseless Idea! ISOL Corp, 1999. ,
A relational model of data for large shared data banks, Communications of the ACM, vol.13, issue.6, pp.377-387, 1970. ,
DOI : 10.1145/362384.362685
Status and perspective of personal health informatics in Denmark Section for Health Informatics, Institute of Public Health Le dossier médical personnel (Information Rep, 2006. ,
German doctors say no to centrally stored patient records, 2008. ,
Smart USB Token Role-Based Access Control, 2003. ,
Massive data loss at HCA. Retrieved, 2006. ,
GA hospital health data breach due to outsourcing errorstory/ga-hospital-health- data-breach-due-outsourcing-error, 2008. ,
Privacy-preserving data publishing, ACM Computing Surveys, vol.42, issue.4 ,
DOI : 10.1145/1749603.1749605
2006 CSI/FBI Computer Crime and Security Survey, 2006. ,
Using First-Order Logic to Reason about Policies, ACM Transactions on Information and System Security, vol.11, issue.4, pp.1-41, 2008. ,
DOI : 10.1145/1380564.1380569
URL : http://arxiv.org/abs/cs/0601034
ELGA: The Electronic Health Record in Austria. Paper presented at the International Conference of Society for Medical Innovation and Technology, 2008. ,
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data, Privacy Enhancing Technologies, pp.69-84, 2002. ,
DOI : 10.1007/3-540-36467-6_6
Personal Privacy in Ubiquitous Computing, 2005. ,
Mondrian multidimensional kanonymity, Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE), 2006. ,
Ongoing concern over Pentagon network attack. IT News Digest, p.2098, 2008. ,
Privacy Is Linking Permission to Purpose, Proceedings of the Security Protocols Workshop, pp.179-191, 2004. ,
DOI : 10.1007/3-540-36467-6_10
?asterCard Open Data Storage Version 2.0. Technical Specifications, 2002. ,
Hiding the presence of individuals from shared databases, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.665-676, 2007. ,
DOI : 10.1145/1247480.1247554
Privacy-aware role based access, Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pp.41-50, 2007. ,
DOI : 10.1109/msp.2009.102
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.566
MedCom -the Danish Healthcare Data Network, 2006. ,
PicoDBMS: Scaling down database techniques for the smartcard, Very Large Data Bases Journal (VLDBJ), vol.10, issue.2-3, pp.120-132, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-00442710
System and Method of Managing Indexation of Flash Memory, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00340331
Personalized access control for a personally controlled health record, Proceedings of the 2nd ACM workshop on Computer security architectures, CSAW '08, pp.9-16, 2008. ,
DOI : 10.1145/1456508.1456511
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001. ,
DOI : 10.1109/69.971193
Access Control: Policies, Models, and Mechanisms, Proceedings of the Foundations of Security Analysis and Design on Foundations of Security Analysis and Design 2000 Conference, pp.137-196, 2000. ,
DOI : 10.1007/3-540-45608-2_3
Generalizing data to provide anonymity when disclosing information (abstract), Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems , PODS '98, p.188, 1998. ,
DOI : 10.1145/275487.275508
The Taiwan Health Care Smart Card Project, Smart Card Applications in the U.S. Healthcare Industry (White Paper No. HC-06001), 2005. ,
Datafly: a system for providing anonymity in medical data, Proceedings of the IFIP TC11 WG11.3 11th International Conference on Database Security XI: Status and Prospects, pp.356-381, 1998. ,
DOI : 10.1007/978-0-387-35285-5_22
Consultant Breached FBI's Computers, 2006. ,
Smart Card Research Perspectives. LNCS Construction and Analysis of Safe, 2004. ,
DOI : 10.1007/978-3-540-30569-9_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.3174
Anonymizing sequential releases, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, 2006. ,
DOI : 10.1145/1150402.1150449
Medical Center Patient Records Posted On Internet m-invariance: Towards privacy preserving re-publication of dynamic datasets, Proceedings of the ACM SIGMOD Conference, 2007. ,
A Purpose-Based Access Control Model, Proceedings of the Symposium in Information Assurance and Security, pp.143-148, 2007. ,
Checking for k-anonymity violation by views, Proceedings of the 31st Very Large Data Bases (VLDB) Conference, pp.910-921, 2005. ,
A sequential indexing scheme for flash-based embedded systems, Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology, EDBT '09, 2009. ,
DOI : 10.1145/1516360.1516429
URL : https://hal.archives-ouvertes.fr/hal-00624077
Formal model and policy specification of usage control, ACM Transactions on Information and System Security, vol.8, issue.4, pp.351-387, 2005. ,
DOI : 10.1145/1108906.1108908