. Google, National committee on vital and health statistics. privacy and confidentiality in the nationwide health information network, 2006.

M. J. Ball and J. Lillis, E-health: transforming the physician/patient relationship, International Journal of Medical Informatics, vol.61, issue.1, pp.1-10, 2001.
DOI : 10.1016/S1386-5056(00)00130-1

M. Y. Becker and P. Sewell, Cassandra: flexible trust management, applied to electronic health records, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., pp.139-154, 2004.
DOI : 10.1109/CSFW.2004.1310738

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.3800

A. Boukerche and Y. Ren, A secure mobile healthcare system using trust-based multicast scheme. Selected Areas in Communications, IEEE Journal on, vol.27, issue.4, pp.387-399, 2009.

D. Gefen, I. Benbasat, and P. Pavlou, A Research Agenda for Trust in Online Environments, Journal of Management Information Systems, vol.24, issue.4, pp.275-286, 2008.
DOI : 10.2753/MIS0742-1222240411

R. Haux, Health information systems ??? past, present, future, International Journal of Medical Informatics, vol.75, issue.3-4, pp.268-281, 2006.
DOI : 10.1016/j.ijmedinf.2005.08.002

R. Haux, A. Winter, E. Ammenwerth, and B. Brigl, Strategic information management in hospitals: an introduction to hospital information systems, 2013.
DOI : 10.1007/978-1-4757-4298-5

M. H. Hsu, T. L. Ju, C. H. Yen, and C. M. Chang, Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations, International Journal of Human-Computer Studies, vol.65, issue.2, pp.153-169, 2007.
DOI : 10.1016/j.ijhcs.2006.09.003

R. A. Jydstrup and M. J. Gross, Cost of information handling in hospitals, Health services research, vol.1, issue.3, p.235, 1966.

P. Klasnja and W. Pratt, Healthcare in the pocket: Mapping the space of mobile-phone health interventions, Journal of Biomedical Informatics, vol.45, issue.1, pp.184-198, 2012.
DOI : 10.1016/j.jbi.2011.08.017

D. Kotz, S. Avancha, and A. Baxi, A privacy framework for mobile health and homecare systems Security and privacy in medical and home-care systems, Proceedings of the first ACM workshop on, pp.1-12, 2009.

P. Lukowicz, T. Kirstein, and G. Troster, Wearable systems for health care applications, Methods of Information in Medicine-Methodik der Information in der Medizin, pp.232-238, 2004.

K. D. Mandl, D. Markwell, R. Macdonald, P. Szolovits, and I. S. Kohane, Public standards and patients' control: how to keep electronic medical records accessible but private Commentary: Open approaches to electronic patient records Commentary: A patient's viewpoint, BMJ, vol.322, issue.7281, pp.283-287, 2001.
DOI : 10.1136/bmj.322.7281.283

URL : http://www.bmj.com/cgi/content/short/322/7281/283

S. Marsh, Y. Wang, S. Noël, L. Robart, and J. Stewart, Device Comfort for mobile health information accessibility, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.377-380, 2013.
DOI : 10.1109/PST.2013.6596095

S. P. Marsh, S. K. Dhurandher, S. Misra, and I. Woungang, Formalising Trust as a computational concept Security in mobile adhoc networks using soft encryption and trust-based multi-path routing, Computer Communications, vol.31, issue.4, pp.760-769, 2008.

G. J. Nowak and J. Phelps, Understanding privacy concerns.An assessment of consumers' information-related knowledge and beliefs, Journal of Direct Marketing, vol.4, issue.4, pp.28-39, 1992.
DOI : 10.1002/dir.4000060407

J. Phelps, G. Nowak, and E. Ferrell, Privacy Concerns and Consumer Willingness to Provide Personal Information, Journal of Public Policy & Marketing, vol.19, issue.1, pp.27-41, 2000.
DOI : 10.1509/jppm.19.1.27.16941

P. M. Podsakoff, S. B. Mackenzie, J. Y. Lee, and N. P. Podsakoff, Common method biases in behavioral research: A critical review of the literature and recommended remedies., Journal of Applied Psychology, vol.88, issue.5, 2003.
DOI : 10.1037/0021-9010.88.5.879

R. Shahriyar, M. F. Bari, G. Kundu, S. I. Ahamed, and M. M. Akbar, Intelligent Mobile Health Monitoring System (IMHMS), International Journal of Control and Automation, vol.12, issue.2-3, pp.13-28, 2009.
DOI : 10.1007/s11036-007-0018-0

K. Siau and Z. Shen, Mobile healthcare informatics, Medical Informatics and the Internet in Medicine, vol.4, issue.2, pp.89-99, 2006.
DOI : 10.1080/14639230500095651

E. F. Stone and D. L. Stone, Privacy in organizations: Theoretical issues, research findings, and protection mechanisms, Research in personnel and human resources management, pp.349-411, 1990.

A. Sunyaev, T. Dehling, P. L. Taylor, and K. D. Mandl, Availability and quality of mobile health app privacy policies, Journal of the American Medical Informatics Association, vol.22, issue.e1, pp.28-33, 2015.
DOI : 10.1136/amiajnl-2013-002605

D. K. Vawdrey, E. S. Hall, C. D. Knutson, and J. K. Archibald, A self-adapting healthcare information infrastructure using mobile computing devices, Proceedings. 18th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, pp.91-97, 2003.
DOI : 10.1109/HEALTH.2003.1218725

D. Weerasinghe, M. Rajarajan, and V. Rakocevic, Device Data Protection in Mobile Healthcare Applications, Electronic Healthcare, pp.82-89, 2009.
DOI : 10.1007/978-3-642-00413-1_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.473.5832

M. H. Yarmand, K. Sartipi, and D. G. Down, Behavior-Based Access Control for Distributed Healthcare Environment, 2008 21st IEEE International Symposium on Computer-Based Medical Systems, pp.126-131, 2008.
DOI : 10.1109/CBMS.2008.14

A. Yousefi, N. Mastouri, and K. Sartipi, Scenario-oriented information extraction from electronic health records, 2009 22nd IEEE International Symposium on Computer-Based Medical Systems, pp.1-5, 2009.
DOI : 10.1109/CBMS.2009.5255451

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.183.3657

L. Zhang, G. J. Ahn, and B. T. Chu, A role-based delegation framework for healthcare information systems, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.125-134, 2002.
DOI : 10.1145/507711.507731

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.677.1582