S. Abiteboul and R. Agrawal, The Lowell database research self-assessment, Communications of the ACM, vol.48, issue.5, pp.111-118, 2005.
DOI : 10.1145/1060710.1060718

A. Adams and A. Sasse, Privacy in Multimedia Communications: protecting users, not just data. People and Computers XV -Interaction Without Frontiers, Joint Proceedings of HCI2001 and ICM2001, pp.49-64, 2001.

A. Barth, J. C. Mitchell, and J. Rosenstein, Conflict and combination in privacy policy languages, Proceedings of the 2004 ACM workshop on Privacy in the electronic society , WPES '04, pp.45-46, 2004.
DOI : 10.1145/1029179.1029195

E. Bertino, P. Samarati, and S. Jajodia, An extended authorization model for relational databases, IEEE Transactions on Knowledge and Data Engineering, vol.9, issue.1, pp.85-101, 1997.
DOI : 10.1109/69.567051

E. Bertino, J. Byun, and N. Li, Privacy-Preserving Database Systems, Lecture Notes in Computer Science, pp.178-206, 2005.
DOI : 10.1007/11554578_6

P. Bonatti, E. Damiani, S. De-capitani, and P. Samarati, A component-based architecture for secure data publication, Seventeenth Annual Computer Security Applications Conference, p.309, 2001.
DOI : 10.1109/ACSAC.2001.991546

P. Bonatti, E. Damiani, S. De-capitani-di-vimercati, and P. Samarati, An Access Control Model for Data Archives, Proceedings of the 16th international Conference on information Security: Trusted information: the New Decade Challenge, pp.261-276, 2001.
DOI : 10.1007/0-306-46998-7_18

J. Byun, E. Bertino, and N. Li, Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.102-110, 2005.
DOI : 10.1145/1063979.1063998

J. Byun and N. Li, Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, pp.603-619, 2008.
DOI : 10.1007/s00778-006-0023-0

C. Clifton, Using sample size to limit exposure to data mining, Journal of Computer Security, vol.8, issue.4, pp.281-307, 2000.
DOI : 10.3233/JCS-2000-8403

L. Cranor, The platform for privacy preferences 1.1 (P3P) specification, 2006.

Q. Ni, D. Lin, E. Bertino, and J. Lobo, Conditional Privacy-Aware Role Based Access Control, ESORICS, pp.72-89, 2007.
DOI : 10.1007/978-3-540-74835-9_6

Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, Privacy-aware role based access control, Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. France, pp.41-50, 2007.
DOI : 10.1109/msp.2009.102

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.566

M. Li, X. Sun, H. Wang, and Y. Zhang, Optimal Privacy-Aware Path in Hippocratic Databases, The 14th International Conference on Database Systems for Advanced Applications(DASFAA2009), 2009.
DOI : 10.1007/3-540-36467-6_10

N. Li, T. Yu, and A. Anton, A semantics-based approach to privacy languages, 2003.

R. Pitofsky, Privacy online: Fair information practices in the electronic marketplace, a report to congress, 2000.

M. Schunter, The enterprise privacy authorization language (epal 1.1), 2003.

L. Sweeney, ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.571-588, 2002.
DOI : 10.1142/S021848850200165X

H. Wang, J. Cao, and Y. Zhang, Access control management for ubiquitous computing, Future Generation Computer Systems, vol.24, issue.8, pp.870-878, 2008.
DOI : 10.1016/j.future.2007.07.011

H. Zhu and K. Lu, Fine-Grained Access Control for Database Management Systems. Data Management. Data, Data Everywhere, pp.215-223, 2007.