G. Bella and L. C. Paulson, Accountability protocols, ACM Transactions on Information and System Security, vol.9, issue.2, pp.138-161, 2006.
DOI : 10.1145/1151414.1151416

M. Bellare and B. S. Yee, Forward Integrity for Secure Audit Logs, 1997.

D. Butin, M. Chicote, L. Métayer, and D. , Log Design for Accountability, 2013 IEEE Security and Privacy Workshops, pp.1-7, 2013.
DOI : 10.1109/SPW.2013.26

URL : https://hal.archives-ouvertes.fr/hal-00799100

D. Butin, M. Chicote, L. Métayer, and D. , Strong Accountability: Beyond Vague Promises, pp.343-369, 2014.
DOI : 10.1007/978-94-007-7540-4_16

URL : https://hal.archives-ouvertes.fr/hal-00917350

D. Butin, L. Métayer, and D. , Log Analysis for Data Protection Accountability (Extended Version), Inria, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00921156

J. Cederquist, R. Corin, M. Dekker, S. Etalle, J. Den-hartog et al., Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007.
DOI : 10.1007/s10207-007-0017-y

C. J. Bennett, Implementing Privacy Codes of Practice, Canadian Standards Association, 1995.

D. Hert and P. , Accountability and System Responsibility: New Concepts in Data Protection Law and Human Rights Law, 2012.

S. Etalle and W. H. Winsborough, A Posteriori Compliance Control, Proceedings of the 12th ACM symposium on Access control models and technologies, pp.11-20, 2007.

D. Guagnin, L. Hempel, and C. Ilten, Managing Privacy Through Accountability, 2012.
DOI : 10.1057/9781137032225

A. Haeberlen, A case for the accountable cloud, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.52-57, 2010.
DOI : 10.1145/1773912.1773926

R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely, Towards a Theory of Accountability and Audit, Proceedings of the 14th European conference on Research in computer security, pp.152-167, 2009.
DOI : 10.1145/1288783.1288786

N. Joint, P. Security, and . Committee, SPC): Break-Glass: An Approach to Granting Emergency Access to Healthcare Systems, 2004.

L. Métayer, D. Mazza, E. Potet, and M. L. , Designing Log Architectures for Legal Evidence, 2010 8th IEEE International Conference on Software Engineering and Formal Methods, pp.156-165, 2010.
DOI : 10.1109/SEFM.2010.29

F. B. Schneider, Accountability for Perfection, IEEE Security & Privacy Magazine, vol.7, issue.2, pp.3-4, 2009.
DOI : 10.1109/MSP.2009.30

B. Schneier and J. Kelsey, Secure audit logs to support computer forensics, ACM Transactions on Information and System Security, vol.2, issue.2, pp.159-176, 1999.
DOI : 10.1145/317087.317089

B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters, Building an Encrypted and Searchable Audit Log, Proceedings of the Network and Distributed System Security Symposium. NDSS 2004, 2004.