The CO.R.E. Project. An Integrated Security Approach to Self-Monitoring and Medical Record Keeping

[1]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[2]  Kamran Sartipi,et al.  HL7 FHIR: An Agile and RESTful approach to healthcare information exchange , 2013, Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems.

[3]  Ramaswamy Chandramouli,et al.  Cryptographic Key Management Issues and Challenges in Cloud Services , 2014, Secure Cloud Computing.

[4]  Liam Peyton,et al.  Systematic Literature Review on the Anonymization of High Dimensional Streaming Datasets for Health Data Sharing , 2015, EUSPN/ICTH.

[5]  Frank Stajano,et al.  The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.

[6]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[7]  Mansoor Ebrahim,et al.  Symmetric Algorithm Survey: A Comparative Analysis , 2013, ArXiv.

[8]  Jeffrey F. Naughton,et al.  Anonymization of Set-Valued Data via Top-Down, Local Generalization , 2009, Proc. VLDB Endow..

[9]  R. Righi,et al.  Personal Health Records: A Systematic Literature Review , 2017, Journal of medical Internet research.

[10]  Korra Sathya Babu,et al.  Evaluation of generalization based K-anonymization algorithms , 2017, 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS).

[11]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.