H. Alemdar and C. Ersoy, Wireless sensor networks for healthcare: A survey, Computer Networks, vol.54, issue.15, pp.2688-2710, 2010.
DOI : 10.1016/j.comnet.2010.05.003

M. Li, W. Lou, and K. Ren, Data security and privacy in wireless body area networks, IEEE Wireless Communications, vol.17, issue.1, pp.51-58, 2010.
DOI : 10.1109/MWC.2010.5416350

R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, vol.25, issue.6, pp.599-616, 2009.
DOI : 10.1016/j.future.2008.12.001

R. Liu and I. J. , Opportunities and challenges of wireless sensor networks using cloud services, Proceedings of the workshop on Internet of Things and Service Platforms, IoTSP '11, pp.41-47, 2011.
DOI : 10.1145/2079353.2079357

V. Rajesh, J. M. Gnanasekar, R. S. Ponmagal, and P. Anbalagan, Integration of Wireless Sensor Network with Cloud, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp.321-323, 2010.
DOI : 10.1109/ITC.2010.88

C. O. Rolim, F. L. Koch, C. B. Westphall, J. Werner, A. Fracalossi et al., A Cloud Computing Solution for Patient's Data Collection in Health Care Institutions, 2010 Second International Conference on eHealth, Telemedicine, and Social Medicine, pp.95-99, 2010.
DOI : 10.1109/eTELEMED.2010.19

W. Kurschl and W. Beer, Combining cloud computing and wireless sensor networks, Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, iiWAS '09, pp.512-518, 2009.
DOI : 10.1145/1806338.1806435

K. Lee, D. Murray, D. Hughes, and W. Joosen, Extending sensor networks into the Cloud using Amazon Web Services, 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications, pp.1-7, 2010.
DOI : 10.1109/NESEA.2010.5678063

M. M. Hassan, B. Song, and E. Huh, A framework of sensor-cloud integration opportunities and challenges, Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC '09, pp.618-626, 2009.
DOI : 10.1145/1516241.1516350

A. M. Khattak, L. T. Vinh, D. V. Hung, P. T. Truc, L. X. Hung et al., Context-aware Human Activity Recognition and decision making, The 12th IEEE International Conference on e-Health Networking, Applications and Services, pp.112-118, 2010.
DOI : 10.1109/HEALTH.2010.5556585

M. Barua, X. Liang, R. Lu, and X. Shen, ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing, International Journal of Security and Networks, vol.6, issue.2/3, pp.67-76, 2011.
DOI : 10.1504/IJSN.2011.043666

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, Plutus: Scalable secure file sharing on untrusted storage, Proceedings of the 2nd USENIX Conference on File and Storage Technologies, pp.29-42, 2003.

E. Goh, H. Shacham, N. Modadugu, and D. Boneh, Sirius: Securing remote untrusted storage Network and distributed systems security, NDSS'03, pp.131-145, 2003.

J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, Patient controlled encryption, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.103-114, 2009.
DOI : 10.1145/1655008.1655024

S. D. Di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Over-encryption: management of access control evolution on outsourced data, Proceedings of the 33rd international conference on Very large data bases, ser. VLDB '07, pp.123-134, 2007.

W. Wang, Z. Li, R. Owens, and B. Bhargava, Secure and efficient access to outsourced data, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.55-66, 2009.
DOI : 10.1145/1655008.1655016

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.702.3540

L. Ibraimi, M. Asim, and M. Petkovic, Secure management of personal health records by applying attribute-based encryption, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health, pp.71-74, 2009.
DOI : 10.1109/PHEALTH.2009.5754828

O. Akan, P. Bellavista, J. Cao, F. Dressler, D. Ferrari et al., Securing personal health records in cloud computing: Patient-Centric and Fine- Grained data access control in multi-owner settings, Security and Privacy in Communication Networks, pp.89-106, 2010.

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Lecture Notes in Computer Science, vol.3494, pp.457-473, 2005.
DOI : 10.1007/11426639_27

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.261-270, 2010.
DOI : 10.1145/1755688.1755720

Y. Z. Li and S. Yu, Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption, IEEE Transactions on Parallel and Distributed Systems, vol.24, issue.1, pp.131-143, 2013.
DOI : 10.1109/TPDS.2012.97

A. D. Brucker, H. Petritsch, and S. G. Weber, Attribute-Based Encryption with Break-Glass, Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010.
DOI : 10.1109/CONGRESS.2009.11

URL : https://hal.archives-ouvertes.fr/hal-01056083

T. M. Krishna, K. Venkatasubramanian, and S. K. Gupta, Caac an adaptive and proactive access control approach for emergencies for smart infrastructures, ACM Transactions on Autonomous and Adaptive Systems Special Issue on Adaptive Security, 2012.