P. Guarda and N. Zannone, Towards the development of privacy-aware systems, Information and Software Technology, vol.51, issue.2, pp.337-350, 2009.
DOI : 10.1016/j.infsof.2008.04.004

L. Osterberg and T. Blaschke, Adherence to Medication, New England Journal of Medicine, vol.353, issue.5, pp.487-497, 2005.
DOI : 10.1056/NEJMra050100

L. Hess, M. Raebel, D. Conner, and D. Malone, Measurement of Adherence in Pharmacy Administrative Databases: A Proposal for Standard Definitions and Preferred Measures, Annals of Pharmacotherapy, vol.38, issue.3, pp.1280-1288, 2006.
DOI : 10.1345/aph.1H018

J. Steiner and A. Prochazka, The assessment of refill compliance using pharmacy records: Methods, validity, and applications, Journal of Clinical Epidemiology, vol.50, issue.1, pp.105-116, 1997.
DOI : 10.1016/S0895-4356(96)00268-5

M. Halpern, Z. Khan, J. Schmier, M. Burnier, J. Caro et al., Recommendations for Evaluating Compliance and Persistence With Hypertension Therapy Using Retrospective Data, Hypertension, vol.47, issue.6, pp.1039-1048, 2006.
DOI : 10.1161/01.HYP.0000222373.59104.3d

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.561.2027

S. Leslie, F. Gwadry-sridhar, P. Thiebaud, and B. Patel, Calculating medication compliance, adherence and persistence in administrative pharmacy claims databases, Pharmaceutical Programming, vol.4, issue.3, pp.13-19, 2008.
DOI : 200007040-00004

S. Andrade, K. Kahler, F. Frech, and K. Chan, Methods for evaluation of medication adherence and persistence using automated databases, Pharmacoepidemiology and Drug Safety, vol.9, issue.8, pp.565-574, 2006.
DOI : 10.1002/pds.1230

T. Mabotuwana and J. Warren, A Semantic Web Technology Based Approach to Identify Hypertensive Patients for Follow-Up/Recall, 2008 21st IEEE International Symposium on Computer-Based Medical Systems, pp.318-323, 2008.
DOI : 10.1109/CBMS.2008.12

H. Reiter and N. Maglaveras, HeartCycle: Compliance and effectiveness in HF and CAD closed-loop management, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp.299-302, 2009.
DOI : 10.1109/IEMBS.2009.5333151

C. Otto, A. Milenkovi?, C. Sanders, and E. Jovanov, System architecture of a wireless body area sensor network for ubiquitous health monitoring, J. Mob. Multimed, vol.1, issue.4, pp.307-326, 2005.

H. Alemdar and C. Ersoy, Wireless sensor networks for healthcare: A survey, Computer Networks, vol.54, issue.15, pp.2688-2710, 2010.
DOI : 10.1016/j.comnet.2010.05.003

S. Schmidt, S. Sheikzadeh, B. Beil, M. Patten, and J. Stettin, Acceptance of Telemonitoring to Enhance Medication Compliance in Patients with Chronic Heart Failure, Telemedicine and e-Health, vol.14, issue.5, pp.426-433, 2008.
DOI : 10.1089/tmj.2007.0076

Z. Pang, Q. Chen, and L. Zheng, A pervasive and preventive healthcare solution for medication noncompliance and daily monitoring, 2009 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies, pp.1-6, 2009.
DOI : 10.1109/ISABEL.2009.5373681

A. Mouttham, L. Peyton, B. Eze, and A. Saddik, Event-Driven Data Integration for Personal Health Monitoring, Journal of Emerging Technologies in Web Intelligence, vol.1, issue.2, pp.110-118, 2009.
DOI : 10.4304/jetwi.1.2.110-118

URL : https://doaj.org/article/d28c7b7be1204a67b4c934e37793a75f

C. Petrou, Use of text mining to predict patient compliance, SAS Global Forum, 2008.

S. Banescu and N. Zannone, Measuring Privacy Compliance with Process Specifications, 2011 Third International Workshop on Security Measurements and Metrics, pp.41-50, 2011.
DOI : 10.1109/Metrisec.2011.10

URL : http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=720552

M. Petkovi?, D. Prandi, and N. Zannone, Purpose Control: Did You Process the Data for the Intended Purpose?, Proceedings of the 8th VLDB Workshop on Secure Data Management, pp.145-168, 2011.
DOI : 10.1109/TKDE.2004.47

T. Van-deursen, P. Koster, and M. Petkovi?, Hedaquin: A Reputation-based Health Data Quality Indicator, Electronic Notes in Theoretical Computer Science, vol.197, issue.2, pp.159-167, 2008.
DOI : 10.1016/j.entcs.2007.12.025

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

A. Jøsang, Online reputation systems for the health sector, Electronic Journal of Health Informatics, vol.3, issue.1, p.8, 2008.

W. Ebner, J. M. Leimeister, and H. Krcmar, Trust in virtual healthcare communities: design and implementation of trust-enabling functionalities, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, p.70182, 2004.
DOI : 10.1109/HICSS.2004.1265436

B. Alhaqbani, A. Jøsang, and C. Fidge, A Medical Data Reliability Assessment Model, Journal of theoretical and applied electronic commerce research, vol.4, issue.2, pp.64-78, 2009.
DOI : 10.4067/S0718-18762009000200006

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.189.4931

E. Bertino, C. Dai, and M. Kantarcioglu, The Challenge of Assuring Data Trustworthiness, Proceedings of the 14th International Conference on Database Systems for Advanced Applications, pp.22-33, 2009.
DOI : 10.1200/JCO.2005.01.912

S. T. Moturu, H. Liu, and W. G. Johnson, Trust evaluation in health information on the World Wide Web, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp.1525-1528, 2008.
DOI : 10.1109/IEMBS.2008.4649459

P. Samarati and S. De-capitani-di-vimercati, Access Control: Policies, Models, and Mechanisms, Foundations of Security Analysis and Design. LNCS 2171, pp.137-196, 2000.
DOI : 10.1007/3-540-45608-2_3

L. Zhang, G. J. Ahn, and B. T. Chu, A role-based delegation framework for healthcare information systems, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.125-134, 2002.
DOI : 10.1145/507711.507731

M. Y. Becker and P. Sewell, Cassandra: flexible trust management, applied to electronic health records, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., pp.139-154, 2004.
DOI : 10.1109/CSFW.2004.1310738

L. Røstad, Access control in healthcare information systems, 2008.

M. Hart, R. Johnson, and A. Stent, More Content -Less Control: Access Control in the Web 2.0, Proceedings of Web 2.0 Security and Privacy Workshop (W2SP'07), 2007.

L. Giuri and P. Iglio, Role templates for content-based access control, Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.153-159, 1997.
DOI : 10.1145/266741.266773

T. L. Hinrichs, W. C. Garrison, A. J. Lee, S. Saunders, and J. C. Mitchell, TBA : A Hybrid of Logic and Extensional Access Control Systems, Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, 2011.
DOI : 10.1007/978-3-642-29420-4_13

S. K. Tzelepi, D. K. Koukopoulos, and G. Pangalos, A flexible content and context-based access control model for multimedia medical image database systems, Proceedings of the 2001 workshop on Multimedia and security new challenges, MM&Sec '01, pp.52-55, 2001.
DOI : 10.1145/1232454.1232473

C. Kahl, K. Bttcher, M. Tschersich, S. Heim, and K. Rannenberg, How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project, Security and Privacy ? Silver Linings in the Cloud. IFIP Advances in Information and Communication Technology 330, pp.277-288, 2010.
DOI : 10.1016/S1363-4127(04)00014-7

URL : https://hal.archives-ouvertes.fr/hal-01054509

S. Pearson, Y. Shen, and M. Mowbray, A Privacy Manager for Cloud Computing, Proceedings of the 1st International Conference on Cloud Computing, pp.90-106, 2009.
DOI : 10.1007/978-3-642-10665-1_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.369.71