1. Pervasive computing http://www.webopedia.com/TERM/P/pervasive_computing.html (2012). Accessed 3 Sep 2012.
2. Goldschmidt PG. HIT and MIS: implications of health information technology and medical information systems. Commun ACM. 2005;48:68–74.
3. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. Proc IEEE Symp Secur Privacy. 2007;2007:321–34.
4. Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with nonmonotonic access structures. Proc ACM Conf Comput Commun Secur. 2007;2007:195–203.
5. Cheung L, Newport C. Provably secure ciphertext policy ABE. Proc ACM Conf Comput Commun Secur. 2007;2007:456–65.