Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data (General Data Protection Regulation, 2012. ,
Accountability and deterrence in online life (extended abstract ), ACM WebSci'11, pp.1-7, 2011. ,
DOI : 10.1145/2527031.2527043
Information accountability, Communications of the ACM, vol.51, issue.6, pp.82-87, 2008. ,
DOI : 10.1145/1349026.1349043
Designing for accountability on Human-computer interaction, ser. NordiCHI '02, Proceedings of the second Nordic conference, pp.177-186, 2002. ,
A Formal Privacy Management Framework, Lecture Notes in Computer Science, vol.5491, pp.162-176, 2008. ,
DOI : 10.1007/978-3-642-01465-9_11
Implementing Privacy Codes of Practice, Canadian Standards Association, 1995. ,
A posteriori compliance control, Proceedings of the 12th ACM symposium on Access control models and technologies, ser. SACMAT '07, pp.11-20, 2007. ,
DOI : 10.5771/9783845238098-125
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.3351
Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007. ,
DOI : 10.1007/s10207-007-0017-y
URL : http://doc.utwente.nl/67014/1/Cederquist07audit.pdf
Towards a formal model of accountability, Proceedings of the 2011 workshop on New security paradigms workshop, NSPW '11, pp.45-56, 2011. ,
DOI : 10.1145/2073276.2073282
An Audit Logic for Accountability, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05), pp.34-43, 2005. ,
DOI : 10.1109/POLICY.2005.5
URL : http://arxiv.org/abs/cs/0502091
Towards a Theory of Accountability and Audit, Proceedings of the 14th European conference on Research in computer security, ser. ESORICS'09, pp.152-167, 2009. ,
DOI : 10.1145/1288783.1288786
FLAVOR: A Formal Language for a Posteriori Verification of Legal Rules, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.1-8, 2011. ,
DOI : 10.1109/POLICY.2011.26
URL : https://hal.archives-ouvertes.fr/hal-01354418
Secure audit logs to support computer forensics, ACM Transactions on Information and System Security, vol.2, issue.2, pp.159-176, 1999. ,
DOI : 10.1145/317087.317089
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.72.8895
Forward integrity for secure audit logs, 1997. ,
Building an encrypted and searchable audit log, The 11th Annual Network and Distributed System Security Symposium, 2004. ,
Designing log architectures for legal evidence, pp.156-165, 2010. ,
Permis: a modular authorization infrastructure Concurrency and Computation: Practice and Experience, pp.1341-1357, 2008. ,
XACML: eXtensible Access Control Markup Language, " https://www.oasis-open.org/committees, 2005. ,
A controlled natural language interface for authoring access control policies, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.1524-1530, 2011. ,
DOI : 10.1145/1982185.1982510
Towards data protection compliance, pp.213-216, 2010. ,
PPL Engine: A Symmetric Architecture for Privacy Policy Handling, W3C Workshop on Privacy and data usage control, 2010. ,
Break-glass: An approach to granting emergency access to healthcare systems, 2004. ,