Advances in Cryptology. Springer Berlin Heidelberg,
93-118.
CARRE Project, accessed 1 Nov. 2015. Personalized
patient empowerment and shared decision support for
cardiorenal disease and comorbidities. Funded by
European Commission (No. 611140),
https://www.carre-project.eu
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.
H., Metayer, D. L., Tirtea, R., & Schiffner, S., 2015.
Privacy and Data Protection by Design-from policy to
engineering. European Network and Information
Security Agency (ENISA).
Dingledine, R., Mathewson, N., Syverson, P., 2004. Tor:
the second-generation onion router. In Proc. of the
13th USENIX security symposium, 303-320.
Drosatos, G., Efraimidis, P. S., 2014. User-centric
privacy-preserving statistical analysis of ubiquitous
health monitoring data. Computer Science and
Information Systems, 11(2), 525-548.
Drosatos, G., Efraimidis, P. S., Arampatzis, A.,
Stamatelatos, G., Athanasiadis, I. N., 2015. Pythia: A
Privacyenhanced Personalized Contextual Suggestion
System for Tourism. In COMPSAC ‘15, Proc. of the
39th Annual IEEE Computer Software and
Applications Conference. IEEE, 822-827.
European Commission, 2012. Proposal for a Regulation of
the European Parliament and of the Council on the
Protection of Individuals with Regard to the
Processing of Personal Data and on the Free
Movement of Such Data (General Data Protection
Regulation), http://ec.europa.eu/justice/data-
protection/document/review2012/com_2012_11_en.pd
f.
European Commission, 2014. Green Paper on Mobile
Health (“mHealth”) (SWD (2014) 135 Final).
https://ec.europa.eu/digital-agenda/en/news/summary-
report-public-consultation-green-paper-mobile-health.
European Parliament, 24 Oct. 1995. Directive 95/46/EC.
In Official Journal L 281, 0031-0050.
Fung, B., Wang, K., Chen, R., Yu, P. S., 2010. Privacy-
preserving data publishing: A survey of recent
developments. ACM Computing Surveys (CSUR),
42(4), 14.
Hansen, M., 2012. Top 10 mistakes in system design from
a privacy perspective and privacy protection goals. In
Privacy and Identity Management for Life. Springer
Berlin Heidelberg, 14-31.
Hoepman, J. H., 2015. Privately (and Unlinkably)
Exchanging Messages Using a Public Bulletin Board.
In Proc. of the 14th ACM Workshop on Privacy in the
Electronic Society. ACM, 85-94.
Johansen, M. A., & Henriksen, E., 2014. The evolution of
personal health records and their role for self-
management: A literature review. Stud Health Technol
Inform, 205:458-462.
Kamara, S., Lauter, K., 2010. Cryptographic cloud
storage. In Financial Cryptography and Data Security.
Springer Berlin Heidelberg, 136-149.
Kierkegaard, P., 2012. Medical data breaches: Notification
delayed is notification denied. Computer Law &
Security Review, 28(2), 163-183.
Layouni, M., Verslype, K., Sandıkkaya, M. T., De Decker,
B., Vangheluwe, H., 2009. Privacy-preserving
telemonitoring for ehealth. In Data and Applications
Security XXIII. Springer Berlin Heidelberg, 95-110.
Lindell, Y., Pinkas, B., 2009. Secure multiparty
computation for privacy-preserving data mining.
Journal of Privacy and Confidentiality, 1(1), 59-98.
HealthVault, accessed 1 Nov. 2015. A web-based platform
to store and maintain health and fitness information.
Microsoft Corporation, https://www.healthvault.com
Mosa, A. S. M., Yoo, I., Sheets, L., 2012. A systematic
review of healthcare applications for smartphones.
BMC Med Inform Decis Making, 12(1), 1-31.
MyHealthAvatar Project, accessed 1 Nov. 2015. A
demonstration of 4D digital avatar infrastructure for
access of complete patient information. Funded by
European Commission (No. 600929),
http://www.myhealthavatar.eu
Narayanan, A., Shmatikov, V., 2010. Myths and fallacies
of personally identifiable information.
Communications of the ACM, 53(6), 24-26.
Pantelopoulos, A., Bourbakis, N. G., 2010. A survey on
wearable sensor-based systems for health monitoring
and prognosis. IEEE Transactions on Systems, Man,
and Cybernetics, Part C: Applications and Reviews,
40(1), 1-12.
Pass, G., Chowdhury, A., Torgeson, C., 2006. A picture of
search. In InfoScale ’06, Proc. of the 1st international
conference on Scalable information systems. ACM
Press.
Romero-Tris, C., Viejo, A., Castellà-Roca, J., 2015. Multi-
party methods for privacy-preserving web search:
Survey and contributions. In Advanced Research in
Data Privacy. Springer International Publishing, 367-
387.
Samoocha, D., Bruinvels, D. J., Elbers, N. A., Anema, J.
R., van der Beek, A. J., 2010. Effectiveness of web-
based interventions on patient empowerment: a
systematic review and meta-analysis. J Med Internet
Res, 12(2).
Smart, N., Rijmen, V., Gierlichs, B., Paterson, K. G.,
Stam, M., Warinschi, B., Watson, G., 2014a.
Algorithms, key size and parameters report. European
Network and Information Security Agency (ENISA).
Smart, N., Rijmen, V., Stam, M., Warinschi, B., Watson,
G., 2014b. Study on cryptographic protocols.
European Network and Information Security Agency
(ENISA), Report TP-06-14-085-EN-N, 11.
Swan, M., 2012. Sensor Mania! The Internet of things,
wearable computing, objective metrics, and the
quantified self 2.0. J Sens Actuator Netw, 1, 217-253.
Teng, X. F., Zhang, Y. T., Poon, C. C., Bonato, P., 2008.
Wearable medical systems for p-health. IEEE Reviews
in Biomedical Engineering, 1, 62-74.