References
- Gerardo Canfora, Elisa Costante, Igino Pennino, and Corrado Aaron Visaggio, "A three-layered model to implement data privacy policies", Computer Standards & Interfaces, Elsevier Science Publisher, pp.398-409, 2008.
- Berkeley biological open source project, http://www.berkeleybop.org/ (Accessed: 2 Sep, 2010)
- Ontology of Clinical Research (OCRe), http://bioportal.bioontology.org/ (Accessed: 10 Sep, 2010).
- Paolo Guarda and Nicola Zannone, "Towards the development of privacy-aware systems", Information and Software Technology, Butterworth-Heinemann, pp.337-350. 2009.
- JiWon Byun, Elisa Bertino, and Ninghui Li, "Purpose based access control of complex data for privacy protection", Symposium on Access Control Models and Technologies, ACM, pp.102-110, 2005.
- Stefan Sackmann, Jens Struker, and Rafael Accorsi, "Personalization in privacy-aware highly dynamic systems", Communications of the ACM, pp.32-38, 2006.
- E.Bertino, J.-W.Byun and N.Li, "Privacy-preserving database systems", in: FOSAD, vol.3655, pp.178-206, 2005.
- A. Tumer, A. Dogac and H. Toroslu, "A Semantic based privacy framework for web services", in Proc. of ESSW'03, 2003.
- Peter Bodorik, Dawn Jutla and Mike Xuehai Wang, "Consistent privacy preferences (CPP): model, semantics, and properties", Symposium on Applied Computing, ACM New York, pp.2368-2375, 2008.
- D.M. Eyers, J. Bacon and K. Moody, "OASIS role-based access control for electronic health records," Software, IEE Proceedings, vol. 153, issue. 1, pp.16-23, 2006. https://doi.org/10.1049/ip-sen:20045038
- Thomas C. Rindfleisch, "Privacy, Information Technology, and Health Care", Commun. ACM, vol. 40, no. 8, pp. 92-100, 1997. https://doi.org/10.1145/257874.257896
- Divakaran Liginlal, Inkook Sim and Lara Khansa, "How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management", Computers & Security, vol.28, pp.215-228. https://doi.org/10.1016/j.cose.2008.11.003
- Westin A.F., Privacy and Freedom, Atheneum, Newyork, 1967.
- Calvin S.Powers, Paul Ashley and Matthias Schunter, "Privacy Promises, Access Control, and Privacy Management," IEEE Computer Society, pp13, 2002.
- Maxwell J.Mehlman, J.D., "Emerging Issues: The Privacy of Medical Records,"
- Electronic medical record http://en.wikipedia.org/wiki/Electronic_medical_record#Privacy (Accessed: 3 Sep,2009).
- Sandhu, R., Coyne, E.J., Feinstein H.L. and Youman, C.E. (August 1996), Role-Based Access Control Models, IEEE Computer, vol. 29, no. 2, pp. 38-47. https://doi.org/10.1109/2.485845
- James M. Humber and Robert F. Almeder, "Privacy and health care(Biomedical Ethics Reviews)", Humana Press, 2001.
- Janet Colwell, EHR era ushers in stricter privacy, security, from the April ACP Internist, copyright at 2010 by the American College of PhysiciansApril, (Accessed: 23 May, 2010).
- Q. He., "Privacy enforcement with an extended role-based access control model. NCSU Computer Science Technical Report" TR-2003-09, Feb 2003.
- Ji-Won Byun, Ninghui Li, "Purpose Based Access Control for Privacy Protection in Relational Database," Springer Berlin/Heidelberg, vol. 17, no. 4, pp.603-619, Jul 2008,.
- Fabio Massacci, John P Mylopoulos and Nicola Zannone, "Hierarchical hippocratic databases with mnimal disclosure for virtual organizations," Springer-Verlag New York, Inc. Secaucus, NJ, USA, pp.370-387.
- Georgios V. Lioudakis, Eleftherios A. Koutsoloukas, Nikolaos L. Dellas, Nikolaos Tselikas, Sofia Kapellaki, George N. Prezerakos, Dimitra I. Kaklamani, and Iakovos S. Venieris, "A middleware architecture for privacy protection," Computer Networks:The International Journal of Computer and Telecommunications Networking, Elsevier North-Holland, Inc, pp.4679-4696, 2007
- M.Hilty, D.A.Basin, A.Pretschner, On obligations, in Proc. of ESORICS'05, vol. 3679, pp.98-117, 2005.
- David F. Ferraiolo, Ravi S. Sandhu, Serban Gavrila, D. Richard Kuhn, and Ramaswamy Chandramouli. "Proposed NIST standard for role-based access control," ACM Transactions on Information and Systems Security, vol. 4, no. 3, pp. 224-274. https://doi.org/10.1145/501978.501980
- L.Sweeney, "k-anonymity: a model for protecting privacy, International Journal on Uncertainty," Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp.557-570, 2002. https://doi.org/10.1142/S0218488502001648
- D.Ferraiolo and R.Kuhn, "Role-Based Access Controls," in Proc. 15th NIAR-NCSC Nat'l Computer Security Conf., Nat'l Inst.Standards and Technology, pp.554-563, 1992.
- Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A., "TROPOS: An agent-oriented software development methodology." JAAMAS, vol. 8, no.3, pp.203-236, 2004
- Mor Peleg, Dizza Beimel, Dov Dori and Yaron Denekamp, "Situation-Based Access Control: Privacy management via modeling of patient data access scenarios", Journal of Biomedical Informatics, vol. 41, pp. 1028-1040, 2008. https://doi.org/10.1016/j.jbi.2008.03.014
- Elisa Bertino, "RBAC models-concepts and trends", Computers\& Security, vol. 22, Issue. 6, pp.511-514, Sep 2003,. https://doi.org/10.1016/S0167-4048(03)00609-6
- R. Sandhu, "Role Hierarchies and Constraints for Lattice-based Access Controls", in E. Bertino, H. Kurth, G. Martella, and E. Montolivo Eds., Computer Security- Esorics'96, LNCS N.1146, pp.65-79.
- Stephen S. Yau, Yin Yin, "a privacy preserving repository for data integration across data sharing services," IEEE Transactions on Services Computing, vol. 1, Issue 3, pp.130-140, Jul 2008. https://doi.org/10.1109/TSC.2008.14
- Yuan Tian, Biao Song, Eui-Nam Huh, "Relationship based privacy management for ubiquitous society," ICCSA, vol. 1, pp.853-867, 2009:.
- Yuan Tian, Biao Song, Eui-Nam Huh, "A novel graph-based privacy policy management system, management and service science," International Conference, pp.1-4, 2009.
- Josep Domingo-Ferrer, Yucel Saygin, "ecent progress in database privacy", Date\& Knowledge Engineering vol. 68, 1157-1159, 2009. https://doi.org/10.1016/j.datak.2009.06.002
- Yuan Tian, Biao Song, Eui-Nam Huh, "A Purpose-based Privacy-aware System using Privacy Data Graph"
- Ontologycomparision, (Accessed: 2 Sep, 2010)
- Andreas Pfitzmann and Marit Koehntopp. Anonymity, unobservability, and pseudonymity -a proposal for terminology. In Hannes Federrath, editor, Proceedings Workshop on Design, Issues in Anonymity and Unobservability, volume LNCS 2009. Springer Verlag, 2001.
- Marc Langheinrich, Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems, Lecture Notes In Computer Science; Vol. 2201, Proceedings of the 3rd international conference on Ubiquitous Computing, Atlanta, Georgia, USA, pp.273-291.
- Fair Information Practices, http://whatis.techtarget.com/definition/0,sid9_gci213501,00.html (Accessed: 3 Dec,2009).
- US Secretary's Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, Chapter IV: Recommended Safeguards for Administrative Personal Data Systems (1973).
- A Review of the Fair Information Principles: The Foundation of Privacy Public Policy, l (Accessed: 3 Dec,2009).
- Lorenzo D. Martino, Qun Ni, Dan Lin and Elisa Bertino. "Multi-domain and Privacy-aware Role Based Access Control in eHealth." In the International Conference on Pervasive Computing Technologies for Healthcare, Jan 2008.
- Reid, Jason F. and Cheong, Ian and Henricksen, Matthew P. and Smith, Jason "A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information System"s. in 8th Australasian Conference on Information Security and Privacy, Jul Wollongong..
- COPPA Safe Harbors discussed, Cybertelecom Federal Internet Law \& Policy - an Educational Project. Krohn & Moss Consumer Law Center, (Accessed: 22 Dec,2009).
- EHR, (Accessed: 3 Mar, 2011)
- Lorrie Faith Cranor, Praveen Guduru, Manjula Arjula, User Interfaces for Privacy Agents, ACM Transactions on Computer-Human Interaction, Vol.13, No.2, June 2006, pp. 135-178. https://doi.org/10.1145/1165734.1165735
- Scott Lederer, Jennifer Mankoff, Anind K. Dey, Who wants to know what when? privacy preference determinants in ubiquitous computing, Conference on Human Factors in Computing Systems, Ft. Lauderdale, Florida, USA, 2003, pp. 724 - 725.
- Robert W. Proctor, Kim-Phuong L. Vu, and M. Athar Ali, Usability of User Agents for Privacy-Preference Specification, Human Inerface, Part 2, HCII2007, LNCS 4558, Springer Berlin/Heidelberg, 2007, pp. 766-776.
- Qun Ni, Elisa Bertino and Jorge Lobo. Privacy-aware RBAC - Leveraging RBAC for Privacy, IEEE Security \& Privacy Magazine, Volume 7, Number 4, pp. 35-43, July/August 2009. https://doi.org/10.1109/MSP.2009.102
- Semantic Web Applications in Neuromedicine,