Y. Z. Li and S. Yu, Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption, IEEE Transactions on Parallel and Distributed Systems, vol.24, issue.1, pp.131-143, 2013.
DOI : 10.1109/TPDS.2012.97

J. A. Akinyele, M. W. Pagano, M. D. Green, C. U. Lehmann, Z. N. Peterson et al., Securing electronic medical records using attribute-based encryption on mobile devices, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, p.7586, 2011.
DOI : 10.1145/2046614.2046628

URL : http://hdl.handle.net/10945/45482

M. Barua, X. Liang, R. Lu, and X. Shen, ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing, International Journal of Security and Networks, vol.6, issue.2/3, pp.67-76, 2011.
DOI : 10.1504/IJSN.2011.043666

O. Akan, P. Bellavista, J. Cao, F. Dressler, D. Ferrari et al., Securing personal health records in cloud computing: Patient-Centric and Fine- Grained data access control in multi-owner settings, Security and Privacy in Communication Networks, pp.89-106, 2010.

L. Ibraimi, M. Asim, and M. Petkovic, Secure management of personal health records by applying attribute-based encryption, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health, pp.71-74, 2009.
DOI : 10.1109/PHEALTH.2009.5754828

J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, Patient controlled encryption, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.103-114, 2009.
DOI : 10.1145/1655008.1655024

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Lecture Notes in Computer Science, vol.3494, pp.457-473, 2005.
DOI : 10.1007/11426639_27

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744

A. D. Brucker, H. Petritsch, and S. G. Weber, Attribute-Based Encryption with Break-Glass, Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010.
DOI : 10.1109/CONGRESS.2009.11

URL : https://hal.archives-ouvertes.fr/hal-01056083

T. M. Krishna, K. Venkatasubramanian, and S. K. Gupta, Caac an adaptive and proactive access control approach for emergencies for smart infrastructures, ACM Transactions on Autonomous and Adaptive Systems Special Issue on Adaptive Security, 2012.