atus.asp?which_year=2015&selBillType=Bill&bill_nu
m=HB6722.
Dellinger, A., 2015. This Instagram app may have stolen
over 500,000 usernames and passwords. [Online]
Available at: http://www.dailydot.com/technology.
/instaagent-instagram-app-malware-ios-android/
Developer Program, 2012. Benefits of APIs. [Online]
Available at: http://18f.github.io/API-All-the-
X/pages/benefits_of_apis.
Facebook, 2014. Facebook Graph API. [Online]
Available at:https://developers.facebook.com/docs/
graph-api.
Fadhel, A., Bianculli, D., Briand, L. & Hourte, B., 2016. A
Model-driven Approach to Representing and Checking
RBAC Contextual Policies. CODASPY 2016. ACM,
pp. 243–253.
Fernández-Alemán, J., Señor, I., Lozoya, P. & Toval, A.,
2013. Security and privacy in electronic health
records: A systematic literature review. Journal of
Biomedical Informatics, 46(3), pp. 541-562.
Ferraiolo, D. & Kuhn, R., 1992. Role-Based Access
Control. NIST-NSA National (USA) Computer Security
Conference, pp. 554-563.
Ferraiolo, D. et al., 2001. Proposed NIST standard for
role-based access control. ACM Transactions on
Information and System Security (TISSEC), Volume 4,
pp. 224-274.
FHIR, 2016. Welcome to FHIR. [Online]
Available at: https://www.hl7.org/fhir/index.html.
Flanders, D., Ramsey, M., & McGregor, A., 2012. The
advantage of APIs. [Online]
Available at: https://www.jisc.ac.uk/guides/the-
advantage-of-apis.
Hao, H., Singh, V. & Du, W., 2013. On the effectiveness
of API-level access control using bytecode rewriting
in Android. 8th ACM SIGSAC symposium on
Information, computer and communications security.
Hangzhou, China.
HAPI FHIR, 2014. HAPI. [Online] Available at:
http://hapifhir.io/
Instagram, 2010. Instagram. [Online] Available at:
https://www.instagram.com/
Jin, X., Wang, L., Luo, T. & Du, W., 2015. Fine-Grained
Access Control for HTML5-Based Mobile
Applications in Android. 16th Information Security
Conference (ISC), pp. 309-318.
JWT, 2015. Introduction to JSON Web Tokens. [Online]
Available at: https://jwt.io/introduction/
Larson, S., 2015. Instagram restricts API following
password breach, will review all apps going forward.
[Online] Available at: http://www.dailydot.com/
technology/instagram-api-restrictions/
Lella, A., Lipsman, A. & Martin, B., 2015. The 2015
Mobile App Report.
[Online] Available at:
https://www.comscore.com/Insights/Presentations-
and-Whitepapers/2015/The-2015-US-Mobile-App-
Report.
Microsoft Corporation, 2008. Mobile Application
Architecture Guide. [Online] Available at:
http://apparch.codeplex.com/releases/view/19798.
REST API Tutorial, 2012. Learn REST: A RESTful
Tutorial. [Online] Available at: http://
www.restapitutorial.com/
Rindfleisch, T., 1997. Privacy, Information Technology,
and Health Care. Communications of the ACM, 40(8),
pp. 93-100.
Rivera Sánchez, Y. K., Demurjian, S.A., & Baihan, M.,
2017. An Access Control Approach for FHIR. 5th
IEEE International Conference on Mobile Cloud
Computing, Services, and Engineering (IEEE Mobile
Cloud 2017).
Rohrer, F., Zhang, Y., Chitkushev, L. & Zlateva, T., 2013.
DR BACA: dynamic role based access control for
Android. 29th Annual Computer Security Applications
Conference. New Orleans, Louisiana, USA.
Rouse, M., 2006. HTTP (Hypertext Transfer Protocol).
[Online] Available at: http://searchwindevelopment.
techtarget.com/definition/HTTP.
Sandhu, R. & Samarati, P., 1994. Access Control:
Principles and Practice. Communications Magazine,
32(9), pp. 40-48.
Slim, 2015. Slim a micro framework for PHP. [Online]
Available at: https://www.slimframework.com/
Snapchat, 2011. Snapchat. [Online] Available at:
https://www.snapchat.com/
Snapchat, 2013. Finding Friends with Phone Numbers.
[Online] Available at: http://blog.snapchat.com/post/
71353347590/finding- friends-with-phone-numbers.
Wang, Y. et al., 2014. Compac: enforce component-level
access control in android. 4th ACM conference on
Data and application security and privacy. San
Antonio, Texas, USA.
West, A., 2015. 5 Roles of Role Based Access Control.
[Online] Available at: https://www.itouchvision.com/
5-roles-of-role-based-access-control-the-software-
security-guard/
Xu, Z. & Zhu, S., 2015. Semadroid: A privacy-aware
sensor management framework for smartphones. 5th
ACM Conference on Data and Application Security
and Privacy. ACM, pp. 61-72.
Zeman, E., 2015. Snapchat Lays Down The Law On
Third-Party Apps. [Online] Available at:
http://www.programmableweb.com/news/snapchat-
lays-down-law-third-party-apps/2015/04/07.