C. A. Ardagna, J. Camenisch, M. Kohlweiss, R. Leenes, G. Neven et al., Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project, Journal of Computer Security, vol.18, issue.1, 2009.
DOI : 10.3233/JCS-2010-0367

A. Adams, The implications of users' privacy perception on communication and information privacy policies, Proceedings of Telecommunications Policy Research Conference, 1999.

D. Chaumcut95 and ]. R. Cutler, Security without identification: Transaction systems to make big brother obsolete Distributed presence and community in cyberspace, Communications of the ACM, pp.1030-104412, 1985.

J. Camenisch and E. Van-herreweghen, anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002.
DOI : 10.1145/586110.586114

[. Franz, H. Wahrig, A. Böttcher, and K. Borcea-pfitzmann, Access control in a privacy-aware eLearning environment, First International Conference on Availability, Reliability and Security (ARES'06), pp.879-886, 2006.
DOI : 10.1109/ARES.2006.20

M. Hansen, K. Borcea-pfitzmann, and A. Pfitzmann, PRIME -Ein europäisches Projekt für nutzerbestimmtes Identitätsmanagement. it -Information Technology, pp.352-359, 2005.
DOI : 10.1524/itit.2005.47.6.352

D. Kao, S. Wang, K. Mathur, S. Jain, F. Fu-yuan et al., Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet, 2008 IEEE Asia-Pacific Services Computing Conference, pp.1364-1368, 1971.
DOI : 10.1109/APSCC.2008.106

S. Pötzsch, Privacy Awareness: A Means to Solve the Privacy Paradox?, IFIP Advances in Information and Communication Technology, pp.226-236, 2009.
DOI : 10.2307/1321160

S. Pötzsch, Untersuchung des Einflusses von wahrgenommener Privatsphäre und Anonymität auf die Kommunikation in einer Online- Community, Gesellschaft fr Informatik. [PP09], pp.2152-2165, 2009.

M. Pekárek, S. N. Pötzsch-[-ri07-]-m, L. Razavi, and . Iverson, A comparison of privacy issues in collaborative workspaces and social networks Identity in the Information Society Special Issue on Social Web and Identity Towards usable privacy for social software Supporting selective information sharing with people-tagging, Proceedings of the ACM CHI '08 Extended Abstracts on Human Factors in Computing Systems, 2007.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

W. Tolone, G. Ahn, T. Pai, and S. Hong, Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 2005.
DOI : 10.1145/1057977.1057979

K. Roshan and . Thomas, Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In RBAC '97: Proceedings of the second ACM workshop on Role-based access control, ACM. [Wor09] Online harassment and cyberstalking cumula- tive statistics for the years, pp.13-19, 1997.