REFERENCES
Bell, D. E., & La Padula, L. J. (1976). Secure Computer
Systems: Unified Exposition and Multics
Interpretation. Bedford, Mass.: MITRE Corp.
Cerner. (2020, January 4). Home. Retrieved from
https://www.cerner.com/
Connecticut General Assembly. (2015). Substitute for
Raised H.B. No. 6722. Retrieved from https://www.
cga.ct.gov/asp/cgabillstatus/cgabillstatus.asp?selBillTy
pe=Bill&which_year=2015&bill_num=6722
Cooper et al. (2008, May). Internet X.509 Public Key
Infrastructure Certificate. Retrieved from
https://tools.ietf.org/html/rfc5280
De Pietro, C., & Francetic, I. (2018). E-health in
Switzerland: The laborious adoption of the federal law
on electronic health records (EHR) and health
information exchange (HIE) networks. Health Policy,
122(2), 69-74. doi:10.1016/j.healthpol.2017.11.005
Elkhodr et al. (2011). Enhancing the security of mobile
health monitoring systems through trust negotiations.
Local Computer Networks (LCN), 2011 IEEE 36th
Converence on (pp. 754-757). Bonn: IEEE.
Epic Systems Corporation. (2020, January 4). Epic.
Retrieved from https://www.epic.com/
Farrell, S., & Housley, R. (2002, April). An Internet
Attribute Certificate Profile for Authorization.
Retrieved from The Internet Engineering Task Force
(IETF®): https://www.ietf.org/rfc/rfc3281.txt
Ferraiolo et al. (2001). Proposed NIST standard for role-
based access control. ACM Transactions on Informa-
tion and System Security (TISSEC), 4(3), 224–274.
HAPI FHIR. (2016). Server Interceptors. Retrieved
January 10 2020, from https://web.archive.org/web/
20190512185820/http://hapifhir.io/doc_rest_server_int
erceptor.html
HAPI FHIR. (2020). HAPI FHIR - The Open Source FHIR
API for Java. Retrieved January 10, 2020, from
https://hapifhir.io/
Health Level 7 International. (2013). Confidentiality.
Retrieved January 19, 2020, from http://www.
hl7.org/documentcenter/public/standards/vocabulary/v
ocabulary_tables/infrastructure/vocabulary/Confidenti
ality.html
Health Level Seven International. (2013). Unique ID, R1 -
3. HCS Guide Final 2013 0322 JMD.pdf. Retrieved
January 16, 2020, from https://www.hl7.org/document
center/public/wg/secure/3.%20HCS%20Guide%20Fin
al%202013%200322%20JMD.pdf
HL7 International. (2019, January 4). Health Level Seven
International. Retrieved from https://www.hl7.org/
HL7 International. (2019, November 1). Resourcelist -
FHIR v4.0.1. Retrieved January 19, 2020, from
https://www.hl7.org/fhir/resourcelist.html
HL7 International. (2020). Index - FHIR v4.0.1. Retrieved
January 10, 2020, from http://hl7.org/fhir/
Li, J., & Li, N. (2006, Oct.-Dec.). OACerts: Oblivious
Attribute Certificates. IEEE Transactions on
Dependable and Secure Computing, 3(4), 340-352.
Posnack, S., & Barker, W. (2018, October 1). Health IT
Buzz. Retrieved January 4, 2019, from https://www.
healthit.gov/buzz-blog/interoperability/heat-wave-the-
u-s-is-poised-to-catch-fhir-in-2019
Ryutov et al. (2005). Adaptive Trust Negotiation and
Access Control. SACMAT '05 Proceedings of the tenth
ACM symposium on Access control models and
technologies (pp. 139-146). New York City: ACM New
York, NY, USA ©2005.
Sanzi et al. (2017). Integrating Trust Profiles, Trust
Negotiation, and Attribute Based Access Control. 2017
5th IEEE International Conference on Mobile Cloud
Computing, Services, and Engineering (MobileCloud)
(pp. 177-184). San Francisco: IEEE. doi:10.1109/
MobileCloud.2017.30
Sanzi et al. (November 2016). Trust Profiling to Enable
Adaptive Trust Negotiation in Mobile Devices. In S.
Mukherja (Ed.), Mobile Application Development,
Usability, and Security (pp. 95-116). IGI Global.
Sanzi, E., & Demurjian, S. (May 2016). Identification and
Adaptive Trust Negotiation in Interconnected Systems.
In A. Malik, A. Anjum, & B. Raza (Eds.), Innovative
Solutions for Access Control Management (pp. 33-65).
IGI Global.
The Office of the National Coordinator for Health
Information Technology. (2018, September 19).
Meaningful Consent Overview | HealthIT.gov.
Retrieved January 24, 2020, from https://www.
healthit.gov/topic/meaningful-consent-overview
The Office of the National Coordinator for Health
Information Technology. (2019, April 17). Patient
Consent for Electronic Health Information Exchange |
HealthIT.gov. Retrieved January 24, 2020, from
https://www.healthit.gov/topic/patient-consent-
electronic-health-information-exchange
U.S. Department of Veterans Affairs - Office of Public and
Intergovernmental Affairs. (2019, July 29). VA
achieves critical milestone in its Electronic Health
Record Modernization Program. Retrieved January 4,
2020, from https://www.va.gov/opa/pressrel/press
release.cfm?id=5286
Vawdrey et al. (2003). Trust Negotiation for Authentication
and Authorization in Healthcare Information Systems.
Engineering in Medicine and Biology Society, 2003.
Proceedings of the 25th Annual International
Conference of the IEEE (pp. 1406-1409). IEEE.
Winsborough et al. (2000). Automated trust negotiation.
DARPA Information Survivability Conference and
Exposition, 2000. DISCEX '00. Proceedings. 1, pp. 88
- 102. Hilton Head, SC: IEEE. doi:10.1109/
DISCEX.2000.824965
Yasnoff, W. A. (2015). A Feasible and Sustainable
Approach to Health Information Infrastructure Via
Mobile Devices. Retrieved Oct. 23, 2015, from
http://mediasite.uchc.edu/mediasite41/Play/b409b6fea
70b4ec5b3fc34355340ac521d