A. Westin, Privacy and Freedom, 1967.

T. Berners-lee, The semantic web will build in privacy, 2009.

W. Simons, K. Mandl, and I. Kohane, The PING Personally Controlled Electronic Medical Record System: Technical Architecture, Journal of the American Medical Informatics Association, vol.12, issue.1, pp.45-54, 2005.
DOI : 10.1197/jamia.M1592

L. F. Cranor, P3P: making privacy policies more useful, IEEE Security & Privacy Magazine, vol.1, issue.6, pp.50-55, 2003.
DOI : 10.1109/MSECP.2003.1253568

M. Backes, M. Dürmuth, and G. Karjoth, Unification in privacy policy evaluation - translating EPAL into Prolog, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.185-188, 2004.
DOI : 10.1109/POLICY.2004.1309165

K. Lefevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu et al., Limiting Disclosure in Hippocratic Databases, pp.108-119, 2004.
DOI : 10.1016/B978-012088469-8.50013-9

A. H. Anderson, A comparison of two privacy policy languages, Proceedings of the 3rd ACM workshop on Secure web services , SWS '06, pp.53-60, 2006.
DOI : 10.1145/1180367.1180378

Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, Privacy-aware role based access control, In: SACMAT, pp.41-50, 2007.
DOI : 10.1109/msp.2009.102

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.566

Q. Ni, E. Bertino, J. Lobo, and S. B. Calo, Privacy-Aware Role-Based Access Control, IEEE Security & Privacy Magazine, vol.7, issue.4, pp.35-43, 2009.
DOI : 10.1109/MSP.2009.102

A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006.
DOI : 10.1109/SP.2006.32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610

D. M. Gabbay, Fibring logics, 1999.

S. Barker, The next 700 access control models or a unifying meta-model?, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.187-196, 2009.
DOI : 10.1145/1542207.1542238

S. Barker, G. Boella, D. M. Gabbay, and V. Genovese, A Meta-model of Access Control in a Fibred Security Language, Studia Logica, vol.149, issue.1, pp.437-477, 2009.
DOI : 10.1007/s11225-009-9203-4

B. W. Lampson, M. Abadi, M. Burrows, and E. Wobber, Authentication in distributed systems: theory and practice, ACM Transactions on Computer Systems, vol.10, issue.4, pp.265-310, 1992.
DOI : 10.1145/138873.138874

N. Li, B. N. Grosof, and J. Feigenbaum, Delegation logic, ACM Transactions on Information and System Security, vol.6, issue.1, pp.128-171, 2003.
DOI : 10.1145/605434.605438

V. Genovese, D. M. Gabbay, G. Boella, and L. Van-der-torre, FSL ? fibred security language, Normative Multi-Agent Systems. Number 09121 in Dagstuhl Seminar Proceedings, 2009.

M. Abadi, M. Burrows, B. W. Lampson, and G. D. Plotkin, A calculus for access control in distributed systems, ACM Transactions on Programming Languages and Systems, vol.15, issue.4, pp.706-734, 1993.
DOI : 10.1145/155183.155225

B. Chellas, Modal logic an introduction, 1980.

D. Gabbay, A. Kurucz, F. Wolter, and M. Zakharyaschev, Many-Dimensional Modal Logics: Theory and Applications, 2003.

J. W. Byun, E. Bertino, and N. Li, Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.102-110, 2005.
DOI : 10.1145/1063979.1063998

S. Barker, M. J. Sergot, and D. Wijesekera, Status-Based Access Control, ACM Transactions on Information and System Security, vol.12, issue.1, 2008.
DOI : 10.1145/1410234.1410235

S. Jajodia, P. Samarati, M. Sapino, and V. Subrahmaninan, Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001.
DOI : 10.1145/383891.383894

S. Fischer-hubner, IT-Security and Privacy, 2001.
DOI : 10.1007/3-540-45150-1