T. Aura, Distributed Access-Rights Management with Delegation Certificates, Secure Internet Programming, pp.211-235, 1999.
DOI : 10.1007/3-540-48749-2_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.6485

P. Buneman, S. Khanna, and W. Tan, Why and Where: A Characterization of Data Provenance, ICDT 2001, pp.316-330, 2001.
DOI : 10.1007/3-540-44503-X_20

C. Mont, M. Pearson, and S. , An Adaptive Privacy Management System for Data Repositories, TrustBus 2005, pp.236-245, 2005.
DOI : 10.1007/11537878_24

D. Chaum, Blind Signatures for Untraceable Payments, Advances in Cryptology ? Proceedings of Crypto '82, pp.199-203, 1982.
DOI : 10.1007/978-1-4757-0602-4_18

M. Li, R. Poovendran, and S. Narayanan, Protecting patient privacy against unauthorized release of medical images in a group communication environment, Computerized Medical Imaging and Graphics, vol.29, issue.5, pp.367-383, 2005.
DOI : 10.1016/j.compmedimag.2005.02.003

D. Bundestag, Gesetz zur Modernisierung der gesetzlichen Krankenversicherung, Bundesgesetzblatt Jahrgang Teil I Nr, vol.55, 2003.

S. Goldwasser, S. Micali, R. , and C. , The Knowledge Complexity of Interactive Proof Systems, SIAM Journal on Computing, vol.18, issue.1, pp.186-208, 1989.
DOI : 10.1137/0218012

G. Karjoth, M. Schunter, and M. Waidner, Privacy-enabled Services for Enterprises , 13th Int, Database and Expert Systems Applications, pp.483-487, 2002.

H. Mantel, Information Flow Control and Applications ??? Bridging a Gap ???, LNCS, vol.2021, pp.153-172, 2001.
DOI : 10.1007/3-540-45251-6_9

T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, 2009.

G. Müller, R. Accorsi, S. Höhn, and S. Sackmann, Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten, Informatik-Spektrum, vol.33, issue.1, 2010.

B. Pfitzmann and M. Schunter, Asymmetric Fingerprinting, EUROCRYPT 1996, pp.84-95, 1996.
DOI : 10.1007/3-540-68339-9_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.7633

A. Pretschner, M. Hilty, and D. Basin, Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006.
DOI : 10.1145/1151030.1151053

S. Sackmann, J. Strüker, and R. Accorsi, Personalization in privacy-aware highly dynamic systems, Communications of the ACM, vol.49, issue.9, pp.32-38, 2006.
DOI : 10.1145/1151030.1151052