REFERENCES 
Bell,  D. E., &  La  Padula,  L.  J.  (1976).  Secure Computer 
Systems: Unified Exposition and Multics 
Interpretation. Bedford, Mass.: MITRE Corp. 
Cerner.  (2020,  January  4).  Home.  Retrieved  from 
https://www.cerner.com/ 
Connecticut  General  Assembly.  (2015).  Substitute for 
Raised H.B. No. 6722.  Retrieved  from  https://www. 
cga.ct.gov/asp/cgabillstatus/cgabillstatus.asp?selBillTy
pe=Bill&which_year=2015&bill_num=6722 
Cooper  et  al.  (2008,  May).  Internet X.509 Public Key 
Infrastructure Certificate.  Retrieved  from 
https://tools.ietf.org/html/rfc5280 
De  Pietro,  C.,  &  Francetic,  I.  (2018).  E-health  in 
Switzerland: The laborious adoption of the federal law 
on  electronic  health  records  (EHR)  and  health 
information exchange  (HIE) networks. Health Policy, 
122(2), 69-74. doi:10.1016/j.healthpol.2017.11.005 
Elkhodr  et  al.  (2011).  Enhancing  the  security  of  mobile 
health  monitoring  systems  through  trust  negotiations. 
Local Computer Networks (LCN), 2011 IEEE 36th 
Converence on (pp. 754-757). Bonn: IEEE. 
Epic  Systems  Corporation.  (2020,  January  4).  Epic. 
Retrieved from https://www.epic.com/ 
Farrell,  S.,  &  Housley,  R.  (2002,  April).  An Internet 
Attribute Certificate Profile for Authorization. 
Retrieved  from  The  Internet  Engineering  Task  Force 
(IETF®): https://www.ietf.org/rfc/rfc3281.txt 
Ferraiolo  et al.  (2001).  Proposed  NIST standard  for  role-
based  access  control.  ACM Transactions on Informa-
tion and System Security (TISSEC), 4(3), 224–274. 
HAPI  FHIR.  (2016).  Server Interceptors.  Retrieved 
January  10  2020,  from  https://web.archive.org/web/ 
20190512185820/http://hapifhir.io/doc_rest_server_int
erceptor.html 
HAPI FHIR. (2020). HAPI FHIR - The Open Source FHIR 
API for Java.  Retrieved  January  10,  2020,  from 
https://hapifhir.io/ 
Health  Level  7  International.  (2013).  Confidentiality. 
Retrieved  January  19,  2020,  from  http://www. 
hl7.org/documentcenter/public/standards/vocabulary/v
ocabulary_tables/infrastructure/vocabulary/Confidenti
ality.html 
Health Level Seven International. (2013). Unique ID, R1 - 
3. HCS Guide Final 2013 0322 JMD.pdf.  Retrieved 
January 16, 2020, from https://www.hl7.org/document 
center/public/wg/secure/3.%20HCS%20Guide%20Fin
al%202013%200322%20JMD.pdf 
HL7 International.  (2019, January 4).  Health Level Seven 
International. Retrieved from https://www.hl7.org/ 
HL7  International.  (2019,  November  1).  Resourcelist - 
FHIR v4.0.1.  Retrieved  January  19,  2020,  from 
https://www.hl7.org/fhir/resourcelist.html 
HL7 International. (2020). Index - FHIR v4.0.1. Retrieved 
January 10, 2020, from http://hl7.org/fhir/ 
Li,  J.,  &  Li,  N.  (2006,  Oct.-Dec.).  OACerts:  Oblivious 
Attribute  Certificates.  IEEE Transactions on 
Dependable and Secure Computing, 3(4), 340-352. 
Posnack,  S.,  &  Barker,  W.  (2018,  October  1).  Health IT 
Buzz.  Retrieved  January  4,  2019,  from  https://www. 
healthit.gov/buzz-blog/interoperability/heat-wave-the-
u-s-is-poised-to-catch-fhir-in-2019 
Ryutov  et  al.  (2005).  Adaptive  Trust  Negotiation  and 
Access Control. SACMAT '05 Proceedings of the tenth 
ACM symposium on Access control models and 
technologies (pp. 139-146). New York City: ACM New 
York, NY, USA ©2005. 
Sanzi  et  al.  (2017).  Integrating  Trust  Profiles,  Trust 
Negotiation, and Attribute Based Access Control. 2017 
5th IEEE International Conference on Mobile Cloud 
Computing, Services, and Engineering (MobileCloud) 
(pp.  177-184).  San  Francisco:  IEEE.  doi:10.1109/ 
MobileCloud.2017.30 
Sanzi  et  al.  (November  2016).  Trust  Profiling  to  Enable 
Adaptive  Trust  Negotiation  in  Mobile  Devices.  In  S. 
Mukherja  (Ed.),  Mobile Application Development, 
Usability, and Security (pp. 95-116). IGI Global. 
Sanzi, E., & Demurjian, S. (May 2016). Identification and 
Adaptive Trust Negotiation in Interconnected Systems. 
In A. Malik, A. Anjum, & B. Raza (Eds.), Innovative 
Solutions for Access Control Management (pp. 33-65). 
IGI Global. 
The  Office  of  the  National  Coordinator  for  Health 
Information  Technology.  (2018,  September  19). 
Meaningful Consent Overview | HealthIT.gov. 
Retrieved  January  24,  2020,  from  https://www. 
healthit.gov/topic/meaningful-consent-overview 
The  Office  of  the  National  Coordinator  for  Health 
Information  Technology.  (2019,  April  17).  Patient 
Consent for Electronic Health Information Exchange | 
HealthIT.gov.  Retrieved  January  24,  2020,  from 
https://www.healthit.gov/topic/patient-consent-
electronic-health-information-exchange 
U.S. Department of Veterans Affairs - Office of Public and 
Intergovernmental  Affairs.  (2019,  July  29).  VA 
achieves critical milestone in its Electronic Health 
Record Modernization Program. Retrieved January 4, 
2020,  from  https://www.va.gov/opa/pressrel/press 
release.cfm?id=5286 
Vawdrey et al. (2003). Trust Negotiation for Authentication 
and Authorization in Healthcare Information Systems. 
Engineering in Medicine and Biology Society, 2003. 
Proceedings of the 25th Annual International 
Conference of the IEEE (pp. 1406-1409). IEEE. 
Winsborough  et  al.  (2000).  Automated  trust  negotiation. 
DARPA Information Survivability Conference and 
Exposition, 2000. DISCEX '00. Proceedings. 1, pp. 88 
-  102.  Hilton  Head,  SC:  IEEE.  doi:10.1109/ 
DISCEX.2000.824965 
Yasnoff,  W.  A.  (2015).  A Feasible and Sustainable 
Approach to Health Information Infrastructure Via 
Mobile Devices.  Retrieved  Oct.  23,  2015,  from 
http://mediasite.uchc.edu/mediasite41/Play/b409b6fea
70b4ec5b3fc34355340ac521d