J. W. Byun, E. Bertino, and N. Li, Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.102-110, 2005.
DOI : 10.1145/1063979.1063998

C. A. Ardagna, M. Cremonini, S. De-capitani-di-vimercati, and P. Samarati, A privacy-aware access control system, Journal of Computer Security, vol.16, issue.4, pp.369-397, 2008.
DOI : 10.3233/JCS-2008-0328

H. Gomi, A persistent data tracking mechanism for user-centric identity governance, Identity in the Information Society, vol.6, issue.3, 2010.
DOI : 10.1007/s12394-010-0069-4

P. Schneck, Persistent access control to prevent piracy of digital information, Proceedings of the IEEE, vol.87, issue.7, pp.1239-1250, 1999.
DOI : 10.1109/5.771075

O. Sibert, D. Bernstein, and D. Wie, DigiBox: A Self-Protecting Container for Information Commerce, Proceedings of the 1st Conference on USENIX Workshop on Electronic Commerce (WOEC'95, pp.15-15, 1995.

G. Karjoth, M. Schunter, and M. Waidner, Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data, Proceedings of the 2nd International Conference on Privacy Enhancing Technologies (PET'02, pp.69-84, 2002.
DOI : 10.1007/3-540-36467-6_6

C. Mont, M. Pearson, S. Bramhall, and P. , Towards accountable management of identity and privacy: sticky policies and enforceable tracing services, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., pp.377-382, 2003.
DOI : 10.1109/DEXA.2003.1232051

P. Mazzoleni, B. Crispo, S. Sivasubramanian, and E. Bertino, XACML Policy Integration Algorithms, ACM Transactions on Information and System Security, vol.11, issue.1, pp.1-29, 2008.
DOI : 10.1145/1330295.1330299

A. Belokosztolszki and K. Moody, Meta-policies for distributed role-based access control systems, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp.3-18, 2002.
DOI : 10.1109/POLICY.2002.1011298

C. Bettini, S. Jajodia, S. Wang, X. Wijesekera, and D. , Provisions and Obligations in Policy Management and Security Applications, Proceedings of the 28th International Conference on Very Large Data Bases (VLDB'02, pp.502-513, 2002.
DOI : 10.1016/B978-155860869-6/50051-2

H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication (1997) RFC 2104 OECD: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 2004.