R. J. Anderson, A security policy model for clinical information systems, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.30-43, 1996.
DOI : 10.1109/SECPRI.1996.502667

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.48.6134

M. Muhammad-rizwan-asghar, G. Ion, B. Russello, and . Crispo, ESPOON: Enforcing encrypted security policies in outsourced environments, The Sixth International Conference on Availability, Reliability and Security, 2011.

M. Y. Becker and P. Sewell, Cassandra: distributed access control policies with tunable expressiveness, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.159-168, 2004.
DOI : 10.1109/POLICY.2004.1309162

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.6693

E. Coiera and R. Clarke, e-Consent: The Design and Implementation of Consumer Consent Mechanisms in an Electronic Environment, Journal of the American Medical Informatics Association, vol.11, issue.2, pp.129-140, 2004.
DOI : 10.1197/jamia.M1480

E. Communities, Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, nov 1995

J. Jin, G. Ahn, H. Hu, M. J. Covington, and X. Zhang, Patientcentric authorization framework for sharing electronic health records, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.125-134, 2009.

M. Kudo, Pbac: Provision-based access control model, International Journal of Information Security, vol.1, issue.2, pp.116-130, 1007.
DOI : 10.1007/s102070100010

C. M. Keefe, P. Greenfield, and A. Goodchild, A decentralised approach to electronic consent and health information access control, Journal of Research and Practice in Information Technology, vol.37, issue.2, 2005.

C. Ruan and V. Varadharajan, An Authorization Model for E-consent Requirement in a Health Care Application, Applied Cryptography and Network Security, pp.191-205, 2003.
DOI : 10.1007/978-3-540-45203-4_15

G. Russello, C. Dong, and N. Dulay, Consent-Based Workflows for Healthcare Management, 2008 IEEE Workshop on Policies for Distributed Systems and Networks, pp.153-161, 2008.
DOI : 10.1109/POLICY.2008.22

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867

G. Verhenneman, Consent, an instrument for patient empowerment?, Proceedings of the 49th FITCE Congress, 2010.

K. Wuyts, R. Scandariato, G. Verhenneman, and W. Joosen, Integrating patient consent in e-health access control, IJSSE, vol.2, issue.2, pp.1-24, 2011.

R. Yavatkar, D. Pendarakis, and R. Guerin, A Framework for Policy-based Admission Control, RFC, vol.2753, 2000.
DOI : 10.17487/rfc2753

X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu, A usage-based authorization framework for collaborative computing systems, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.180-189, 2006.
DOI : 10.1145/1133058.1133084