Towards the development of privacy-aware systems, Information and Software Technology, vol.51, issue.2, pp.337-350, 2009. ,
DOI : 10.1016/j.infsof.2008.04.004
Adherence to Medication, New England Journal of Medicine, vol.353, issue.5, pp.487-497, 2005. ,
DOI : 10.1056/NEJMra050100
Measurement of Adherence in Pharmacy Administrative Databases: A Proposal for Standard Definitions and Preferred Measures, Annals of Pharmacotherapy, vol.38, issue.3, pp.1280-1288, 2006. ,
DOI : 10.1345/aph.1H018
The assessment of refill compliance using pharmacy records: Methods, validity, and applications, Journal of Clinical Epidemiology, vol.50, issue.1, pp.105-116, 1997. ,
DOI : 10.1016/S0895-4356(96)00268-5
Recommendations for Evaluating Compliance and Persistence With Hypertension Therapy Using Retrospective Data, Hypertension, vol.47, issue.6, pp.1039-1048, 2006. ,
DOI : 10.1161/01.HYP.0000222373.59104.3d
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.561.2027
Calculating medication compliance, adherence and persistence in administrative pharmacy claims databases, Pharmaceutical Programming, vol.4, issue.3, pp.13-19, 2008. ,
DOI : 200007040-00004
Methods for evaluation of medication adherence and persistence using automated databases, Pharmacoepidemiology and Drug Safety, vol.9, issue.8, pp.565-574, 2006. ,
DOI : 10.1002/pds.1230
A Semantic Web Technology Based Approach to Identify Hypertensive Patients for Follow-Up/Recall, 2008 21st IEEE International Symposium on Computer-Based Medical Systems, pp.318-323, 2008. ,
DOI : 10.1109/CBMS.2008.12
HeartCycle: Compliance and effectiveness in HF and CAD closed-loop management, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp.299-302, 2009. ,
DOI : 10.1109/IEMBS.2009.5333151
System architecture of a wireless body area sensor network for ubiquitous health monitoring, J. Mob. Multimed, vol.1, issue.4, pp.307-326, 2005. ,
Wireless sensor networks for healthcare: A survey, Computer Networks, vol.54, issue.15, pp.2688-2710, 2010. ,
DOI : 10.1016/j.comnet.2010.05.003
Acceptance of Telemonitoring to Enhance Medication Compliance in Patients with Chronic Heart Failure, Telemedicine and e-Health, vol.14, issue.5, pp.426-433, 2008. ,
DOI : 10.1089/tmj.2007.0076
A pervasive and preventive healthcare solution for medication noncompliance and daily monitoring, 2009 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies, pp.1-6, 2009. ,
DOI : 10.1109/ISABEL.2009.5373681
Event-Driven Data Integration for Personal Health Monitoring, Journal of Emerging Technologies in Web Intelligence, vol.1, issue.2, pp.110-118, 2009. ,
DOI : 10.4304/jetwi.1.2.110-118
URL : https://doaj.org/article/d28c7b7be1204a67b4c934e37793a75f
Use of text mining to predict patient compliance, SAS Global Forum, 2008. ,
Measuring Privacy Compliance with Process Specifications, 2011 Third International Workshop on Security Measurements and Metrics, pp.41-50, 2011. ,
DOI : 10.1109/Metrisec.2011.10
URL : http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=720552
Purpose Control: Did You Process the Data for the Intended Purpose?, Proceedings of the 8th VLDB Workshop on Secure Data Management, pp.145-168, 2011. ,
DOI : 10.1109/TKDE.2004.47
Hedaquin: A Reputation-based Health Data Quality Indicator, Electronic Notes in Theoretical Computer Science, vol.197, issue.2, pp.159-167, 2008. ,
DOI : 10.1016/j.entcs.2007.12.025
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
Online reputation systems for the health sector, Electronic Journal of Health Informatics, vol.3, issue.1, p.8, 2008. ,
Trust in virtual healthcare communities: design and implementation of trust-enabling functionalities, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, p.70182, 2004. ,
DOI : 10.1109/HICSS.2004.1265436
A Medical Data Reliability Assessment Model, Journal of theoretical and applied electronic commerce research, vol.4, issue.2, pp.64-78, 2009. ,
DOI : 10.4067/S0718-18762009000200006
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.189.4931
The Challenge of Assuring Data Trustworthiness, Proceedings of the 14th International Conference on Database Systems for Advanced Applications, pp.22-33, 2009. ,
DOI : 10.1200/JCO.2005.01.912
Trust evaluation in health information on the World Wide Web, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp.1525-1528, 2008. ,
DOI : 10.1109/IEMBS.2008.4649459
Access Control: Policies, Models, and Mechanisms, Foundations of Security Analysis and Design. LNCS 2171, pp.137-196, 2000. ,
DOI : 10.1007/3-540-45608-2_3
A role-based delegation framework for healthcare information systems, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.125-134, 2002. ,
DOI : 10.1145/507711.507731
Cassandra: flexible trust management, applied to electronic health records, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., pp.139-154, 2004. ,
DOI : 10.1109/CSFW.2004.1310738
Access control in healthcare information systems, 2008. ,
More Content -Less Control: Access Control in the Web 2.0, Proceedings of Web 2.0 Security and Privacy Workshop (W2SP'07), 2007. ,
Role templates for content-based access control, Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.153-159, 1997. ,
DOI : 10.1145/266741.266773
TBA : A Hybrid of Logic and Extensional Access Control Systems, Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, 2011. ,
DOI : 10.1007/978-3-642-29420-4_13
A flexible content and context-based access control model for multimedia medical image database systems, Proceedings of the 2001 workshop on Multimedia and security new challenges, MM&Sec '01, pp.52-55, 2001. ,
DOI : 10.1145/1232454.1232473
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project, Security and Privacy ? Silver Linings in the Cloud. IFIP Advances in Information and Communication Technology 330, pp.277-288, 2010. ,
DOI : 10.1016/S1363-4127(04)00014-7
URL : https://hal.archives-ouvertes.fr/hal-01054509
A Privacy Manager for Cloud Computing, Proceedings of the 1st International Conference on Cloud Computing, pp.90-106, 2009. ,
DOI : 10.1007/978-3-642-10665-1_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.369.71