[1] 張家築(2010),《電子病歷有助於提升醫療品質與病人安全嗎?》,臺灣內科醫學會九十九年會員大會學術演講論文。
[2] IoM(2001), Committee on Quality of Health Care in America, Crossing the Quality Chasm, Washington, DC:National Academy Press.
[3] Ming Li, Shucheng Yu, Kui Ren, and Wenjing Lou(2010) Securing personal health records in cloud computing: Patient-Centric and Fine-Grained data access control in multi-owner settings, Security and Privacy in Communication Networks, 89-106.
[4] Mell and Grance(2009), Effectively and Securely Using the Cloud Computing Paradigm, NIST.
[5] TS Chen, CH Liu, TL Chen, CS Chen, JS Bau(2012), Secure Dynamic access control scheme of PHR in cloud computing, Journal of medical, Springer.
[6] Linda T. Kohn, Janet M. Corrigan, and Molla S. Donaldson(1999),.To Err Is Human: Building a Safer Health System, Institute of Medicine, The National Academies Press.
[7] Bloom(2001), Crossing the Quality Chasm:A New Health System for the 21st Century, Institute of Medicine, The National Academies Press.
[8] C. Safran and H. Goldberg(2000), Electronic Patient Records and the Impact of the Internet, International Journal of Medical Informatics, 60,77-83.
[9] 王南燕(1994),《電腦化病歷》,資療資訊雜誌,第3期,頁29-33。
[10] 范碧玉(2008),《病歷資訊管理學》(初版),台北:合記圖書出版社。
[11] L.L. Dimitropoulos(2007), Privacy and Security Solutions for Interoperable Health Information Exchange: Interim Assessment of Variation Executive Summary , RTI International, 1-2.
[12] P. Ray and J. Wimalasiri(2006), The Need for Technical Solutions for Maintaining the Privacy of HER, Engineering in Medicine and Biology Society, Vol. 1, 4686-4689.
[13] M. Y. Becker and P. Sewell(2004), Cassandra: Flexible Trust Management, Applied to Electronic Health Records, Proceedings of the 17th IEEE workshop on Computer Security Foundations, 139.
[14] J. Jin, G. J. Ahn, H. Hu, M. J. Covington and X. Zhang(2009) Patient-centric Authorization Framework for Sharing Electronic Health Records, Proceedings of the 14th ACM symposium on Access control models and technologies SACMAT 09, 125-134.
[15] Waegemann, C. Peter.(2002) Status Report:Electronic Health Records. Medical Record Institute, unpublished.
[16] 行政院衛生福利部(2005),《行政院衛生署九十四年度醫療院所病歷電子化現況調查》。
[17] 行政院衛生福利部(2004),《網路健康服務推動計畫九十四年度計畫》。
[18] James S. Kahn, Veenu Aulakh and Adam Bosworth(2009), What It Takes: Characteristics Of The Ideal Personal Health Record.
[19] Ilias Iakovidis(1998), Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare record in Europe.
[20] P. C. Tang, J. S. Ash, D. W. Bates, J. M. Overhage, and D. Z. Sands(2006), Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption, Journal of the American Medical Informatics Association, Vol. 13, No. 2, 121 – 126.
[21] WB Lober, B Zierler, A Herbaugh, SE Shinstrom, A Stolyar, EH Kim, and Y Kim(2006), Barriers to the use of a Personal Health Record by an Elderly Population.
[22] W. Stalling(1995), Network and Network Security – Principles and Practice, Prentice Hall International Edition, pp. 1-14.
[23] 黃明祥、林詠章(2014),《資訊與網路安全概論:看見比特幣》(第五版)。
[24] Delfs, Hans & Knebl, Helmut(2007). Symmetric-key encryption: Introduction to cryptography: principles and applications, Springer.
[25] William Stallings(2010), Operating Systems: Internals and Design Principles, 530.
[26] Mullen. Gary & Mummert. Carl(2007), Finite fields and application,. American Mathematical Society, 112.
[27] Julius Orion Smith III. Lagrange Interpolation, Center for Computer Research in Music and Acoustics (CCRMA), Stanford University.
[28] J. V. Deshpande(1968), On Continuity of a Partial Order, Proceedings of the American Mathematical Society, Vol. 19, No. 2, 383-386.
[29] 紀守程(2014),《公開金鑰加密法在個人醫療紀錄系統中的應用》,嘉義大學應用數學系研究所碩士論文,未出版。