G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security, vol.9, issue.1, pp.1-30, 2006.
DOI : 10.1145/1127345.1127346

M. M. Baig, J. Li, J. Liu, and H. Wang, Cloning for privacy protection in multiple independent data publications, Proceedings of the 20th ACM international conference on Information and knowledge management, CIKM '11, p.885, 2011.
DOI : 10.1145/2063576.2063705

E. Benoist and J. Sliwa, How to Collect Consent for an Anonymous Medical Database, 2014.

I. Blake, G. Seroussi, N. Smart, and J. W. Cassels, Advances in Elliptic Curve Cryptography, 2005.
DOI : 10.1017/CBO9780511546570

D. Boneh, G. Di-crescenzo, R. Ostrovsky, and G. Persiano, Public Key Encryption with Keyword Search, Lecture Notes in Computer Science, vol.3027, pp.506-522, 2004.
DOI : 10.1007/978-3-540-24676-3_30

C. Clifton and W. Jiang, CERIAS Tech Report 2005-134 Information Assurance and Security Privacy-Preserving Distributed k -Anonymity, 2005.

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The second-generation onion router, Proceedings of the 13th USENIX Security Symposium, 2004.

A. Dubovitskaya, V. Urovi, M. Vasirani, K. Aberer, A. Fuchs et al., Privacy preserving interoperability for personalized medicine, Swiss Medical Informatics, 2014.

B. Elger, J. Iavindrasana, L. Lo-lacono, H. Müller, N. Roduit et al., Strategies for health data exchange for secondary, cross-institutional clinical research Computer methods and programs in biomedicine, pp.230-251, 2010.

A. Gkoulalas-divanis and G. Loukides, Anonymization of Electronic Medical Records to Support Clinical Analysis, Briefs in Electrical and Computer Engineering, 2013.
DOI : 10.1007/978-1-4614-5668-1

A. Gkoulalas-divanis, G. Loukides, and J. Sun, Publishing data from electronic health records while preserving privacy: A survey of algorithms, Journal of Biomedical Informatics, vol.50, pp.4-19, 2014.
DOI : 10.1016/j.jbi.2014.06.002

V. Gotta, N. Widmer, M. Montemurro, S. Leyvraz, A. Haouala et al., Therapeutic Drug Monitoring of Imatinib, Clinical Pharmacokinetics, vol.12, issue.22, pp.187-201, 2012.
DOI : 10.2165/11596990-000000000-00000

J. Helfer, S. Valdez, R. A. Popa, E. Stark, N. Zeldovich et al., Building web applications on top of encrypted data using Mylar, Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation Pages, pp.157-172, 2014.

L. Ibraimi, M. Asim, and M. Petko, Secure management of personal health records by applying attribute-based encryption, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health, 2009.
DOI : 10.1109/PHEALTH.2009.5754828

M. Li, . Sh, K. Yu, W. Ren, and . Lou, Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. Security and Privacy in Communication Networks, pp.89-106, 2010.

M. Li, . Sh, Y. Yu, and . Zheng, Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption, IEEE Transactions on Parallel and Distributed Systems, vol.24, issue.1, pp.131-143, 2013.
DOI : 10.1109/TPDS.2012.97

Z. Li, E. Ch, K. Chang, F. Huang, and . Lai, A secure electronic medical record sharing mechanism in the cloud computing platform, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), pp.98-103, 2011.
DOI : 10.1109/ISCE.2011.5973792

L. and L. Iacono, Multi-centric universal pseudonymisation for secondary use of the EHR, Studies in health technology and informatics, vol.126, pp.239-286, 2007.

A. Lounis, A. Hadjidj, A. Bouabdallah, and Y. Challal, Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, pp.248-252, 2013.
DOI : 10.1109/BWCCA.2013.142

R. A. Popa and N. Zeldovich, Multi-key searchable encryption, Cryptology ePrint Archive, vol.508, 2013.

G. Poulis, G. Loukides, and A. Gkoulalas-divanis, Anonymizing Data with Relational and Transaction Attributes, Machine Learning and Knowledge Discovery in Databases Lecture Notes in Computer Science, pp.353-369, 2013.
DOI : 10.1007/978-3-642-40994-3_23

A. Solanas, A. Martinez-balleste, and J. Mateo-sanz, Distributed Architecture With Double-Phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, 2013.
DOI : 10.1109/TIFS.2013.2248728

D. X. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, Proceedings of the 2000 IEEE Symposium on Security and Privacy

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

V. Urovi, A. C. Olivieri, A. Brugués-de-la-torre, S. Bromuri, N. Fornara et al., Secure P2P Cross-Community Health Record Exchange in IHE Compatible Systems, International Journal on Artificial Intelligence Tools, vol.23, issue.01, p.2014
DOI : 10.1142/S0218213014400065

L. Xu and A. Cremers, A Decentralized Pseudonym Scheme for Cloud-based eHealth Systems, 2014.