M. Backes, M. Dürmuth, and G. Karjoth, Unification in privacy policy evaluation - translating EPAL into Prolog, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.185-188, 2004.
DOI : 10.1109/POLICY.2004.1309165

J. Balasch, A. Rial, C. Troncoso, B. Preneel, I. Verbauwhede et al., PrETP: Privacy-preserving electronic toll pricing, USENIX Security Symposium, pp.63-78, 2010.

A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006.
DOI : 10.1109/SP.2006.32

A. Barth, J. C. Mitchell, A. Datta, and S. Sundaram, Privacy and Utility in Business Processes, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.279-294, 2007.
DOI : 10.1109/CSF.2007.26

M. Y. Becker, A. Malkis, and L. Bussard, A Practical Generic Privacy Language, ICISS, pp.125-139, 2010.
DOI : 10.1007/978-3-642-17714-9_10

M. Burrows, M. Abadi, and R. M. Needham, A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990.
DOI : 10.1145/77648.77649

L. Bygrave, Privacy-enhancing technologies -caught between a rock and the hard place, Privacy Law and Policy Reporter, vol.9, 2002.

A. Cavoukian, Privacy and radical pragmatism: change the paradigm, 2008.

A. Cavoukian, Privacy by design. The 7 foundational principles, 2009.

R. Chadha, S. Delaune, and S. Kremer, Epistemic Logic for the Applied Pi Calculus, FMOODS/FORTE, pp.182-197, 2009.
DOI : 10.1016/j.entcs.2006.08.026

O. Chowdhury, H. Chen, J. Niu, N. Li, and E. Bertino, On XACML's adequacy to specify and to enforce HIPAA, USENIX Workshop on Health Security and Privacy, 2012.

M. L. Damiani, E. Bertino, and C. Silvestri, The probe framework for the personalized cloaking of private locations, Transactions on Data Privacy, vol.3, issue.2, pp.123-148, 2010.

Y. Deswarte and C. A. Melchor, Technologies Actuelles et Futures Pour la Protection de la Vie Priv??e sur Internet, annals of telecommunications - annales des t??l??communications, vol.1514, issue.1, pp.399-417, 2006.
DOI : 10.1007/BF03219914

C. Dwork, Differential Privacy, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, F. D. Garcia, and B. Jacobs, A firm foundation for private data analysis, STM'10 Proceedings of the 6th international conference on Security and trust management, pp.86-95, 2010.
DOI : 10.1145/1866739.1866758

I. Goldberg, Privacy-Enhancing Technologies for the Internet III, Digital Privacy: Theory, Technologies, and Practices, pp.84-89, 2007.
DOI : 10.1201/9781420052183.ch1

S. Gürses, C. Troncoso, and C. Diaz, Engineering privacy by design, Conference on Computers, Privacy and Data Protection, 2011.

M. Jafari, P. W. Fong, R. Safavi-naini, K. Barker, and N. P. Sheppard, Towards defining semantic foundations for purpose-based privacy policies, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.213-224, 2011.
DOI : 10.1145/1943513.1943541

W. D. Jonge and B. Jacobs, Privacy-Friendly Electronic Traffic Pricing via Commits, Proceedings of the Workshop of Formal Aspects of Securiy and Trust, pp.132-137, 2009.
DOI : 10.1007/978-3-642-01465-9_10

G. Karjoth, M. Schunter, and E. V. Herreweghen, Translating privacy practices into privacy promises - how to promise what you can keep, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.135-146, 2003.
DOI : 10.1109/POLICY.2003.1206967

G. Karjoth, M. Schunter, E. V. Herreweghen, and M. Waidner, Amending P3P for clearer privacy promises, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., pp.445-449, 2003.
DOI : 10.1109/DEXA.2003.1232062

E. Kosta, J. Zibuschka, T. Scherner, and J. Dumortier, Legal considerations on privacyenhancing location based services using PRIME technology, Computer Law and Security Report, vol.4, pp.139-146, 2008.

J. Krumm, A survey of computational location privacy, Personal and Ubiquitous Computing, vol.10, issue.5, pp.391-399, 2008.
DOI : 10.1007/s00779-008-0212-5

T. Kuo and P. Mishra, Strictness analysis, Proceedings of the fourth international conference on Functional programming languages and computer architecture , FPCA '89, pp.260-272, 1989.
DOI : 10.1145/99370.99390

M. Langheinrich, Privacy by Design ??? Principles of Privacy-Aware Ubiquitous Systems, Proceedings of the Ubicomp Conference, pp.273-291, 2001.
DOI : 10.1007/3-540-45427-6_23

L. Métayer, A formal privacy management framework In FAST (Formal Aspects of Security and Trust), LNCS, vol.5491, pp.161-176, 2009.

D. and L. Métayer, Privacy by design: a matter of choice, Data Protection in a Profiled World, pp.323-334, 2010.

D. and L. Métayer, Formal methods a link between software code and legal rules, SEFM (Software Engineering and Formal Methods), pp.3-18, 2011.

M. Lemay, G. Gross, C. A. Gunter, and S. Garg, Unified Architecture for Large-Scale Attested Metering, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), p.115, 2007.
DOI : 10.1109/HICSS.2007.586

N. Li, W. H. Qardaji, and D. Su, Provably private data anonymization: Or, k-anonymity meets differential privacy, 1101.

N. Li, T. Yu, and A. I. Antón, A semantics based approach to privacy languages, Comput. Syst. Sci. Eng, vol.21, issue.5, 2006.

J. Liu, M. D. George, K. Vikram, X. Qi, L. Waye et al., Fabric, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.321-334, 2009.
DOI : 10.1145/1629575.1629606

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, -diversity, ICDE, p.24, 2006.
DOI : 10.1145/1217299.1217302

M. J. May, C. A. Gunter, and I. Lee, Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.85-97, 2006.
DOI : 10.1109/CSFW.2006.24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.173.471

F. Mcsherry, Privacy integrated queries, Communications of the ACM, vol.53, issue.9, pp.89-97, 2010.
DOI : 10.1145/1810891.1810916

F. Mcsherry and K. Talwar, Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007.
DOI : 10.1109/FOCS.2007.66

A. C. Myers and B. Liskov, Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.410-442, 2000.
DOI : 10.1145/363516.363526

A. Narayanan, V. Toubiana, S. Barocas, H. Nissenbaum, and D. Boneh, A critical look at decentralized personal data architectures, 1202.

R. A. Popa, H. Balakrishnan, and A. J. Blumberg, Vpriv: Protecting privacy in locationbased vehicular services, USENIX Security Symposium, pp.335-350, 2009.

Y. Poullet, About the E-Privacy Directive: Towards a Third Generation of Data Protection Legislation?, Data Protection in a Profile World, pp.3-29, 2010.
DOI : 10.1007/978-90-481-8865-9_1

A. Rezgui, A. Bouguettaya, and M. Y. Eltoweissy, Privacy on the web: facts, challenges, and solutions, IEEE Security and Privacy, pp.40-49, 2003.

A. Rial and G. Danezis, Privacy-preserving smart metering, Proceedings of the 2011 ACM Workshop on Privacy in the Electronic Society, 2011.
DOI : 10.1145/2046556.2046564

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.8900

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

M. C. Tschantz, D. K. Kaynar, and A. Datta, Formal verification of differential privacy for interactive systems, 1101.

M. C. Tschantz and J. M. Wing, Formal Methods for Privacy, In FM, pp.1-15, 2009.
DOI : 10.1007/978-3-642-05089-3_1

D. J. Weitzner, H. Abelson, T. Berners-lee, J. Feigenbaum, J. A. Hendler et al., Information accountability, Communications of the ACM, vol.51, issue.6, pp.82-87, 2008.
DOI : 10.1145/1349026.1349043

T. Yu, N. Li, and A. I. Antón, A formal semantics for P3P, Proceedings of the 2004 workshop on Secure web service , SWS '04, pp.1-8, 2004.
DOI : 10.1145/1111348.1111349

S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers, Secure program partitioning, ACM Transactions on Computer Systems, vol.20, issue.3, pp.283-328, 2002.
DOI : 10.1145/566340.566343