C. Ogbuji, K. Gomadam and C. Petrie, “Web Technology and Architecture for Personal Health Records,” IEEE Internet Computing, Vol. 15, No. 4, 2011, pp. 10-13.
 Google, “About Google Health.”
 Microsoft Health Vault. http://www.healthvault.com/
 P. C. Tang, J. S. Ash, D. W. Bates, J. M. Overhage and D. Z. Sands, “Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption,” Journal of the American Medical Informatics Association, Vol. 13 No. 2, 2006, pp. 121-126.
 H. Lohr, A. R. Sadeghi and M. Winandy, “Securing the e-Health Cloud,” Proceedings of the 1st ACM International Health Informatics Symposium IHI'10, Arlington, 11-12 November, 2010, pp. 220-229.
 F. Daniel, F. Casati, P. Silveira, M. Verga and M. Nalin, “Beyond Health Tracking: A Personal Health and Lifestyle Platform,” IEEE Internet Computing, Vol. 15, No. 4, 2011, pp. 14-22. doi:10.1109/MIC.2011.53
 L. M. Vaquero, L. Rodero-Merino, J. Caceres and M. Lindner, “A Break in the Clouds: Towards a Cloud Definition,” Newsletter, ACM SIGCOMM Computer Communication Review Archive, Vol. 39, No. 1, 2009, pp. 50-55.
 R. Brinkman, B. Schoenmakers, J. Doumen and W. Jonker, “Experiments with Queries over Encrypted Data Using Secret Sharing,” Proceedings of 2nd VLDB Workshop on Secure Data Management (SDM'05), Trondheim, 2-3 September 2005, pp. 33-46. doi:10.1007/11552338_3
 D. Daglish and N. Archer, “Electronic Personal Health Record Systems: A Brief Review of Privacy, Security, and Architectural Issues,” 2009 IEEE Proceedings of 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, Saint John, 25-27 August 2009, pp. 110-120. doi:10.1109/CONGRESS.2009.14
 J. Lahteenmaki, J. Leppanen and H. Kaijanranta, “Interoperability of Personal Health Records,” Proceedings of Engineering in Medicine and Biology Society, Annual International Conference of the IEEE, Minneapolis, 3-6 September 2009, pp. 1726-1729.
 R. Fox, J. Cooley and M. Hauswirth, “Creating a Virtual Personal Health Record Using Mashups,” IEEE Internet Computing, Vol. 15, No. 4, 2011, pp. 23-30.
 N. Botts, B. Thoms, A. Noamani and T. A. Horan, “Cloud Computing Architectures for the Underserved: Public Health Cyberinfrastructures through a Network of Health ATMs,” IEEE Proceedings of 43rd Hawaii International Conference on System Sciences, Honolulu, 5-8 January 2010, pp. 1-10. doi:10.1109/HICSS.2010.107
 Microsoft Health Vault, “Welcome, Google Health Users.” http://www.microsoft.com/en-us/healthvault/google-health.aspx?WT.mc_id=M11071406&WT.ad=text::GHConvertPR::MSPress::HvGH::1406
 N. Lewis, “Google Health Dies, but PHR Market Still Growing,” Information Week, 2011.
 MicroSoft, “Connected Health Framework Architecture and Design Blueprint,” 2009.
 openEHR, 2007. http://www.openehr.org/home.html
 Japan Association for Medical Informatics, “Health Informatics: Health Information Systems,” Shinohara Shuppan Shinsha, 2009. (In Japanese)
 OASIS Open and BT, “Case Study: UK National Health Service NPfIT Uses ebXML Messaging,” 2004.
 Minister of Economy, Trade and Industry of Japan, “Summary report on PHR in Japan (in Japanese)”, 2008.
 D. Krechel and M. Hartbauer, “The LENUS Master Patient Index: Combining Hospital Content Management with a Healthcare Service Bus,” Proceedings of 21st IEEE International Symposium on Computer-Based Medical Systems. CBMS '08, Jyvaskyla, 17-19 June 2008, pp. 170-172. doi:10.1109/CBMS.2008.107
 T. D. Wang, K. Wongsuphasawat and C. Plaisant, “Visual Information Seeking in Multiple Electronic Health Records: Design Recommendations and a Process Model,” Proceedings of the 1st ACM International Health Informatics Symposium IHI '10, Arlington, 11-12 November 2010, pp. 46-55. doi:10.1145/1882992.1883001
 L. Martino and S. Ahuja, “Privacy Policies of Personal Health Records: An Evaluation of Their Effectiveness in Protecting Patient Information,” Proceedings of the 1st ACM International Health Informatics Symposium IHI '10, Arlington, 11-12 November 2010, pp. 191-200.
 Z. R. Li, E. C. Chang, K. H. Huang and F. Lai, “A Secure Electronic Medical Record Sharing Mechanism in the Cloud Computing Platform,” Proceedings of 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), Singapore, 14-17 June 2011, pp. 98-103.
 R. Harpaz, K. Haerian, H. S. Chase and C. Friedman, “Mining Electronic Health Records for Adverse Drug Effects Using Regression Based Methods,” Proceedings of the 1st ACM International Health Informatics Symposium IHI '10, Arlington, 11-12 November 2010, pp. 100-107.
 G. Luo, C. Tang and S. B. Thomas, “Intelligent Personal Health Record: Experience and Open Issues,” Proceedings of the 1st ACM International Health Informatics Symposium IHI '10, Arlington, 11-12 November 2010, pp. 326-335. doi:10.1145/1882992.1883039
 C. Ma, H. Frankel and T. Beale, “openEHR, Archetype Query Language Description,” 2009.
 J. A. Maldonado, D. Moner, D. Tomás, C. Angulo, M. Robles and J. T. Fernández, “Framework for Clinical Data Standardization Based on Archetypes,” Studies in Health Technology and Informatics, Vol. 129, 2007, pp. 454-458.
 C. Rinner, T. Wrba and G. Duftschmid, “Publishing Relational Medical Data as prEN 13606 Archetype Compliant EHR Extracts Using XML Technologies,” 2007.
 D. Moner, J. A. Maldonado, D. Bosca, J. T. Fernandez, C. Angulo, P. Crespo, P. J. Vivancos and M. Robles, “Archetype-Based Semantic Integration and Standardization of Clinical Data,” Proceedings of the 28th IEEE EMBS Annual International Conference, New York, 30 August -3 September 2006.
 W. Rishel, “The Cloud Based Personal Health Record,” Industry Research ID No. G00158181, Gartner, 13 June 2008, pp. 1-9.
 W. S. Li, J. Yan, Y. Yan and J. Zhang, “Xbase: Cloud-Enabled Information Appliance for Healthcare,” Proceedings of the 13th International Conference on Extending Database Technology (EDBT '10), Lausanne, 22-26 March 2010, pp. 675-680. doi:10.1145/1739041.1739125
 Dossia Indivo, “INDIVOTM: The Personally Controlled Health Record,” http://indivohealth.org
 US Department of Health & Human Services, “Understanding Health Information Privacy.”
 D. Agrawal, A. El Abbadi and S. Wang, “Secure Data Management in the Cloud,” Proceedings of 7th International Workshop on Databases in Networked Information Systems (DNIS 2011), Aizu-Wakamatsu, 12-14 December 2011, pp. 1-15. doi:10.1007/978-3-642-25731-5_1
 J. Biskup and P. A. Bonatti, “Controlled Query Evaluation for Known Policies by Combining Lying and Refusal,” Annals of Mathematics and Artificial Intelligence, Vol. 40, No. 1-2, 2004, pp. 37-62.