1. Hippocratic Databases. In;R.Agrawal;Proceedings of VLDB,2002
2. Alhaqbani, B., & Fidge, C. J. (2007). Access Control Requirements for Processing Electronic Health Records Business. In Proceedings of the Process Management Workshops (pp. 371-382).
3. Allard, T., Nguyen, B., & Pucheral, P. (in press). Safe Anonymization with Smart Tokens. Retrieved from http://www-smis.inria.fr/Epublications.html
4. Alliance. (2008, April 28). The National Alliance for Health Information Technology, on Defining Key Health Information Technology Term. Retrieved February 17, 2009, from http://www.hhs.gov/healthit/documents/m20080603/10_2_hit_terms.pdf
5. Anciaux, N., Benzine, M., Bouganim, L., Pucheral, P., & Shasha, D. (2007). GhostDB: Querying visible and hidden data without leaks. In Proceedings of the ACM SIGMOD Conference (pp. 677-688).