Unification in privacy policy evaluation - translating EPAL into Prolog, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.185-188, 2004. ,
DOI : 10.1109/POLICY.2004.1309165
PrETP: Privacy-preserving electronic toll pricing, USENIX Security Symposium, pp.63-78, 2010. ,
Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006. ,
DOI : 10.1109/SP.2006.32
Privacy and Utility in Business Processes, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.279-294, 2007. ,
DOI : 10.1109/CSF.2007.26
A Practical Generic Privacy Language, ICISS, pp.125-139, 2010. ,
DOI : 10.1007/978-3-642-17714-9_10
A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990. ,
DOI : 10.1145/77648.77649
Privacy-enhancing technologies -caught between a rock and the hard place, Privacy Law and Policy Reporter, vol.9, 2002. ,
Privacy and radical pragmatism: change the paradigm, 2008. ,
Privacy by design. The 7 foundational principles, 2009. ,
Epistemic Logic for the Applied Pi Calculus, FMOODS/FORTE, pp.182-197, 2009. ,
DOI : 10.1016/j.entcs.2006.08.026
On XACML's adequacy to specify and to enforce HIPAA, USENIX Workshop on Health Security and Privacy, 2012. ,
The probe framework for the personalized cloaking of private locations, Transactions on Data Privacy, vol.3, issue.2, pp.123-148, 2010. ,
Technologies Actuelles et Futures Pour la Protection de la Vie Priv??e sur Internet, annals of telecommunications - annales des t??l??communications, vol.1514, issue.1, pp.399-417, 2006. ,
DOI : 10.1007/BF03219914
Differential Privacy, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
A firm foundation for private data analysis, STM'10 Proceedings of the 6th international conference on Security and trust management, pp.86-95, 2010. ,
DOI : 10.1145/1866739.1866758
Privacy-Enhancing Technologies for the Internet III, Digital Privacy: Theory, Technologies, and Practices, pp.84-89, 2007. ,
DOI : 10.1201/9781420052183.ch1
Engineering privacy by design, Conference on Computers, Privacy and Data Protection, 2011. ,
Towards defining semantic foundations for purpose-based privacy policies, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.213-224, 2011. ,
DOI : 10.1145/1943513.1943541
Privacy-Friendly Electronic Traffic Pricing via Commits, Proceedings of the Workshop of Formal Aspects of Securiy and Trust, pp.132-137, 2009. ,
DOI : 10.1007/978-3-642-01465-9_10
Translating privacy practices into privacy promises - how to promise what you can keep, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.135-146, 2003. ,
DOI : 10.1109/POLICY.2003.1206967
Amending P3P for clearer privacy promises, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., pp.445-449, 2003. ,
DOI : 10.1109/DEXA.2003.1232062
Legal considerations on privacyenhancing location based services using PRIME technology, Computer Law and Security Report, vol.4, pp.139-146, 2008. ,
A survey of computational location privacy, Personal and Ubiquitous Computing, vol.10, issue.5, pp.391-399, 2008. ,
DOI : 10.1007/s00779-008-0212-5
Strictness analysis, Proceedings of the fourth international conference on Functional programming languages and computer architecture , FPCA '89, pp.260-272, 1989. ,
DOI : 10.1145/99370.99390
Privacy by Design ??? Principles of Privacy-Aware Ubiquitous Systems, Proceedings of the Ubicomp Conference, pp.273-291, 2001. ,
DOI : 10.1007/3-540-45427-6_23
A formal privacy management framework In FAST (Formal Aspects of Security and Trust), LNCS, vol.5491, pp.161-176, 2009. ,
Privacy by design: a matter of choice, Data Protection in a Profiled World, pp.323-334, 2010. ,
Formal methods a link between software code and legal rules, SEFM (Software Engineering and Formal Methods), pp.3-18, 2011. ,
Unified Architecture for Large-Scale Attested Metering, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), p.115, 2007. ,
DOI : 10.1109/HICSS.2007.586
Provably private data anonymization: Or, k-anonymity meets differential privacy, 1101. ,
A semantics based approach to privacy languages, Comput. Syst. Sci. Eng, vol.21, issue.5, 2006. ,
Fabric, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.321-334, 2009. ,
DOI : 10.1145/1629575.1629606
-diversity, ICDE, p.24, 2006. ,
DOI : 10.1145/1217299.1217302
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.85-97, 2006. ,
DOI : 10.1109/CSFW.2006.24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.173.471
Privacy integrated queries, Communications of the ACM, vol.53, issue.9, pp.89-97, 2010. ,
DOI : 10.1145/1810891.1810916
Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007. ,
DOI : 10.1109/FOCS.2007.66
Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.410-442, 2000. ,
DOI : 10.1145/363516.363526
A critical look at decentralized personal data architectures, 1202. ,
Vpriv: Protecting privacy in locationbased vehicular services, USENIX Security Symposium, pp.335-350, 2009. ,
About the E-Privacy Directive: Towards a Third Generation of Data Protection Legislation?, Data Protection in a Profile World, pp.3-29, 2010. ,
DOI : 10.1007/978-90-481-8865-9_1
Privacy on the web: facts, challenges, and solutions, IEEE Security and Privacy, pp.40-49, 2003. ,
Privacy-preserving smart metering, Proceedings of the 2011 ACM Workshop on Privacy in the Electronic Society, 2011. ,
DOI : 10.1145/2046556.2046564
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.8900
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
Formal verification of differential privacy for interactive systems, 1101. ,
Formal Methods for Privacy, In FM, pp.1-15, 2009. ,
DOI : 10.1007/978-3-642-05089-3_1
Information accountability, Communications of the ACM, vol.51, issue.6, pp.82-87, 2008. ,
DOI : 10.1145/1349026.1349043
A formal semantics for P3P, Proceedings of the 2004 workshop on Secure web service , SWS '04, pp.1-8, 2004. ,
DOI : 10.1145/1111348.1111349
Secure program partitioning, ACM Transactions on Computer Systems, vol.20, issue.3, pp.283-328, 2002. ,
DOI : 10.1145/566340.566343