REFERENCES
Bai, Y., Dai, L., and Li, J. (2014). Issues and Challenges in
Securing eHealth Systems. International Journal of
E-Health and Medical Communications, 5(1):1–19.
Bhandari, V. (2012). Enabling Programmable Self with
HealthVault. O’Reilly Media, Inc., Beijing, Cambridge,
Farnham, K
¨
oln, Sebastopol, Tokyo.
Bitsaki, M., Koutras, C., Koutras, G., Leymann, F., Steimle,
F., Wagner, S., and Wieland, M. (2016). ChronicOn-
line: Implementing a mHealth solution for monitoring
and early alerting in chronic obstructive pulmonary
disease. Health Informatics Journal, 23(3):197–207.
Bluetooth SIG, Inc. (2017). GATT Specifications.
https://www.bluetooth.com/specifications/gatt.
Chan, M., Est
`
eVe, D., Fourniols, J.-Y., Escriba, C., and
Campo, E. (2012). Smart Wearable Systems: Current
Status and Future Challenges. Artificial Intelligence in
Medicine, 56(3):137–156.
Cherdantseva, Y. and Hilton, J. (2013). A Reference Model
of Information Assurance & Security. In Proceedings
of the 2013 International Conference on Availability,
Reliability and Security, ARES ’13, pages 546–555.
de Toledo, P., Jimenez, S., del Pozo, F., Roca, J., Alonso, A.,
and Hernandez, C. (2006). Telemedicine Experience
for Chronic Care in COPD. IEEE Transactions on
Information Technology in Biomedicine, 10(3):567–
573.
Dhillon, G. and Backhouse, J. (2000). Technical Opinion:
Information System Security Management in the New
Millennium. Communications of the ACM, 43(7):125–
128.
Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J.,
McDaniel, P., and Sheth, A. N. (2010). TaintDroid:
An Information-Flow Tracking System for Realtime
Privacy Monitoring on Smartphones. In Proceedings
of the 9
th
USENIX Conference on Operating Systems
Design and Implementation, OSDI ’10, pages 393–
407.
Fielding, R. T. (2000). Architectural Styles and the Design
of Network-based Software Architectures. PhD thesis,
University of California, Irvine.
Gardner, R. W., Garera, S., Pagano, M. W., Green, M., and
Rubin, A. D. (2009). Securing Medical Records on
Smart Phones. In Proceedings of the First ACM Works-
hop on Security and Privacy in Medical and Home-
care Systems, SPIMACS ’09, pages 31–40.
Hester, J., Peters, T., Yun, T., Peterson, R., Skinner, J., Golla,
B., Storer, K., Hearndon, S., Freeman, K., Lord, S.,
Halter, R., Kotz, D., and Sorber, J. (2016). Amulet:
An Energy-Efficient, Multi-Application Wearable Plat-
form. In Proceedings of the 14
th
ACM Conference on
Embedded Network Sensor Systems, SenSys ’16, pages
216–229.
Jafari, M., Safavi-Naini, R., and Sheppard, N. P. (2011). A
Rights Management Approach to Protection of Privacy
in a Cloud of Electronic Health Records. In Procee-
dings of the 11
th
Annual ACM Workshop on Digital
Rights Management, DRM ’11, pages 23–30.
Kn
¨
oll, M. and Moar, M. (2011). On the Importance of Locati-
ons in Therapeutic Serious Games: Review on current
health games and how they make use of the urban
landscape. In Proceedings of the 2011 5
th
Internatio-
nal Conference on Pervasive Computing Technologies
for Healthcare and Workshops, PervasiveHealth ’11,
pages 538–545.
Kouris, I. and Koutsouris, D. (2014). Identifying Risky
Environments for COPD Patients Using Smartphones
and Internet of Things Objects. International Journal
of Computational Intelligence Studies, 3(1):1–17.
Kumar, S., Nilsen, W., Pavel, M., and Srivastava, M. (2013).
Mobile Health: Revolutionizing Healthcare Through
Transdisciplinary Research. Computer, 46(1):28–35.
Marcelino, L. and Silva, C. (2018). Location Privacy Con-
cerns in Mobile Applications, pages 241–249. Springer,
Cham.
Mare, S., Sorber, J., Shin, M., Cornelius, C., and Kotz, D.
(2014). Hide-n-Sense: Preserving Privacy Efficiently
in Wireless mHealth. Mobile Networks and Applicati-
ons, 19(3):331–344.
Mattila, E., Korhonen, I., Salminen, J. H., Ahtinen, A., Ko-
skinen, E., S
¨
arel
¨
a, A., P
¨
arkk
¨
a, J., and Lappalainen, R.
(2010). Empowering Citizens for Well-being and Chro-
nic Disease Management with Wellness Diary. IEEE
Transactions on Information Technology in Biomedi-
cine, 14(2):456–463.
Milo
ˇ
sevi
´
c, M., Shrove, M. T., and Jovanov, E. (2011). Ap-
plications of Smartphones for Ubiquitous Health Mo-
nitoring and Wellbeing Management. Journal of Infor-
mation Technology and Applications, 1(1):7–15.
Mishra, S. M. (2015). Wearable Android: Android Wear and
Google FIT App Development. Wiley Online Library,
Hoboken, New Jersey.
Moehrke, J. (2017a). Audit Trail and Node Au-
thentication. Technical report, IHE International.
https://wiki.ihe.net.
Moehrke, J. (2017b). Mobile access to Health Docu-
ments (MHD). Technical report, IHE International.
https://wiki.ihe.net.
Murad, A., Schooley, B., and Abed, Y. (2013). A Secure
mHealth Application for EMS: Design and Implemen-
tation. In Proceedings of the 4
th
Conference on Wire-
less Health, WH ’13, pages 15:1–15:2.
Murnane, E. L., Huffaker, D., and Kossinets, G. (2015). Mo-
bile Health Apps: Adoption, Adherence, and Abandon-
ment. In Adjunct Proceedings of the 2015 ACM Inter-
national Joint Conference on Pervasive and Ubiquitous
Computing and Proceedings of the 2015 ACM Interna-
tional Symposium on Wearable Computers, UbiCom-
p/ISWC ’15 Adjunct, pages 261–264.
O’Donoghue, J. and Herbert, J. (2012). Data Management
Within mHealth Environments: Patient Sensors, Mo-
bile Devices, and Databases. Journal of Data and
Information Quality, 4(1):5:1–5:20.
Schweitzer, J. and Synowiec, C. (2012). The Economics of
eHealth and mHealth. Journal of Health Communica-
tion, 17(Supplement 1):73–81.
Siewiorek, D. (2012). Generation Smartphone. IEEE
Spectrum, 49(9):54–58.
The Privacy Management Platform - An Enabler for Device Interoperability and Information Security in mHealth Applications
37