[1]
|
D. Crawford, “Biomedical Research Gets Head Into Cloud Computing,” 2011.
http://medicalcenter.osu.edu/mediaroom/releases/Pages/Biomedcal-Research-Gets-Head-Into-Cloud-Computing.aspx
|
[2]
|
A. Mathews, “United Health to Launch Cloud-Based Data Platform,” Wall Street Journal, 2012.
http://online.wsj.com/article/SB10001424052970204062704577221551500296744.html
|
[3]
|
I. Carrión, J. Alemán and A. Toval, “Personal Health Records: New Means to Safely Handle our Health Data,” IEEE computer Society Digital Library, IEEE Computer Society, 2012.
http://doi.ieeecomputersociety.org/10.1109/MC.2012.74
|
[4]
|
C. McCarthy, “Paging Dr. Google: Personal Health Records and Patient Privacy,” William & Mary Law Review, Vol. 51, No. 6, 2010, pp. 2243-2268.
http://scholarship.law.wm.edu/wmlr/vol51/iss6/6
|
[5]
|
C. Klein, “Cloudy Confidentiality: Clinical and Legal Implications of Cloud Computing in Health Care,” The Journal of the American Academy of Psychiatry and the Law, Vol. 39, No. 4, 2011, pp.571-578.
|
[6]
|
L. Osterhaus, “Cloud Computing and Health Information,” The University of Iowa School of Library and Information Science Journal, Vol. 19, 2010, pp. 1-9.
|
[7]
|
HITECH Act Enforcement Interim Final Rule. US Department of Health and Human Services, 2009.
http://www.hhs.gov/ocr/privacy/hipaa/administrative/enforcementrule/hitechenforcementifr.html
|
[8]
|
M. Delgado, “The Evolution of Health Care IT: Are Current US Privacy Policies Ready for the Clouds,” IEEE World Congress on Services, Washington DC, 4-9 July 2011, pp. 371-378.
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6012698&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6012698
|
[9]
|
R. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang and B. Lee, “Trust Cloud: A Framework for Accountability and Trust in Cloud Computing,” 2011.
http://www.hpl.hp.com/techreports/2011/HPL-2011-38.pdf
|
[10]
|
T. Martin, “Hey! You! Get off of My Cloud: Defining and Protecting the Metes and Bounds of Privacy, Security, and Property in Cloud Computing,” 2011.
http://works.bepress.com/timothy_martin/3
|
[11]
|
A. Palanzi, “Patient Privacy in the Cloud: Why Congress Should Model HIPAA Enforcement Mechanisms after the FCA to Meet a New Wave of Privacy Threats from the Implementation of Cloud-Computing Technologies,” 2012.
http://works.bepress.com/andrew_palanzi/1/
|
[12]
|
R. Grossman and K. White, “A Vision for Biomedical Cloud,” Journal of Internal Medicine, Vol. 271, No. 2, 2012, pp. 122-130.
doi:10.1111/j.1365-2796.2011.02491.x
|
[13]
|
J. Philbin, F. Prior and P. Nagy, “Will the Next Generation of PACS Be Sitting on a Cloud,” Journal of Digital Imaging, Vol. 24, No. 2, 2011, pp. 179-183.
doi:10.1007/s10278-010-9331-4
|
[14]
|
E. Schweitzer, “Reconciliation of the Cloud Computing Model with US,” Journal of American Medical Informatics Association, Vol. 19, No. 2, 2012, pp. 161-165.
doi:10.1136/amiajnl-2011-000162
|
[15]
|
S. Pearson, “Toward Accountability in the Cloud,” IEEE Internet Computing, 2011, pp. 64-69.
http://www.hpl.hp.com/techreports/2011/HPL-2011-138.html
doi:10.1109/MIC.2011.98
|
[16]
|
J. Soma, M. Nichols, M. Gates and A. Gutierrez, “Chasing the Clouds without Getting Drenched: A Call for Fair Practices in Cloud Computing Services,” 2011.
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2039439
|
[17]
|
R. Ko, B. Lee and S. Pearson, “Towards Achieving Accountability, Auditability and Trust in Cloud Computing,” Advances in Computing and Communications, Communications in Computer and Information Science, Vol. 193, 2011, pp. 432-444.
doi:10.1007/978-3-642-22726-4_45
|
[18]
|
Fujitsu Research Institute, “Personal Data in the Cloud: A Global Survey of Consumer Attitudes,” 2010.
http://www.fujitsu.com/downloads/SOL/fai/reports/fujitsu_personal-data-in-the-cloud.pdf
|
[19]
|
C. Witt, “HIPAA versus the Cloud,” 2011.
http://healthcare-executive-insight.advanceweb.com/Features/Articles/HIPAA-Versus-the-Cloud.aspx
|
[20]
|
C. Lyon and K. Retzer, “Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud,” 2011.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909494
|
[21]
|
A. Weissberger, “ACLU of Northern California, Cloud Computing: Storm Warning for Privacy,” 2009.
http://viodi.com/2009/02/13/aclu-northern-ca-cloud-computing-storm-warning-for-privacy/
|
[22]
|
J. Harshbarger, “Cloud Computing Providers and Data Security Law: Building Trust with United States Companies,” Journal of Technology Law and Policy, Vol. 16, No. 2, 2011, pp. 229-254.
|
[23]
|
Federal Trade Commission, Fair Information Practice Principles, 2012.
http://www.ftc.gov/reports/privacy3/fairinfo.shtm
|
[24]
|
J. Turow, J. King, C. Hoofnagle, A. Bleakley and M. Hennessy, “Americans Reject Tailored Advertising and Three Activities that Enable It,” 2009.
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1478214
|
[25]
|
N. Ozer, “Privacy and Free Speech: It’s good for Business,” 2009.
http://dotrights.org/business/primer/.
|
[26]
|
S. Pearson and A. Charlesworth, “Accountability as a Way Forward in Privacy Protection in the Cloud,” Cloud Computing, Lecture Notes in Computer Science, Vol. 5931, 2009, pp. 131-144,
|
[27]
|
A. Narayanan and V. Shmatikov, “Robust De-Anonymization of Large Sparse Datasets,” 2008.
http://dl.acm.org/citation.cfm?id=1398064
|
[28]
|
P. Wayner, “You Know about Backups. Now, Do It Online,” New York Times, 2008.
http://www.nytimes.com/2008/10/23/technology/personaltech/23basics1.html
|