M. Abadi and C. Fournet, Mobile Values, New Names, and Secure Communication, Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

R. Allen and D. Garlan, Formalizing architectural connection, Proceedings of 16th International Conference on Software Engineering, pp.71-80, 1994.
DOI : 10.1109/ICSE.1994.296767

M. Backes, M. Dürmuth, and G. Karjoth, Unification in privacy policy evaluation - translating EPAL into Prolog, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.185-188, 2004.
DOI : 10.1109/POLICY.2004.1309165

J. Balasch, A. Rial, C. Troncoso, B. Preneel, I. Verbauwhede et al., PrETP: Privacy-preserving electronic toll pricing, USENIX Security Symposium, pp.63-78, 2010.

A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006.
DOI : 10.1109/SP.2006.32

L. Bass, P. Clements, and R. Kazman, Software architecture in practice, SEI Series in Software Engineering, 2013.

M. Y. Becker, A. Malkis, and L. Bussard, A Practical Generic Privacy Language, ICISS, pp.125-139, 2010.
DOI : 10.1007/978-3-642-17714-9_10

G. Booch, I. Jacobson, and J. Rumbaugh, The Unified Modeling Language Reference Manual, 2004.

M. L. Damiani, E. Bertino, and C. Silvestri, The probe framework for the personalized cloaking of private locations, Transactions on Data Privacy, vol.3, issue.2, pp.123-148, 2010.

S. Delaune, S. Kremer, and M. D. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

Y. Deswarte and C. A. Melchor, Technologies Actuelles et Futures Pour la Protection de la Vie Priv??e sur Internet, annals of telecommunications - annales des t??l??communications, vol.1514, issue.1, pp.399-417, 2006.
DOI : 10.1007/BF03219914

S. F. Gürses, C. Troncoso, and C. Diaz, Engineering privacy by design, Computers , Privacy & Data Protection, 2011.

C. Dwork, Differential Privacy, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-95, 2011.
DOI : 10.1145/1866739.1866758

E. C. European-commission, Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), 2013.

R. Fagin, J. Y. Halpern, Y. Moses, and M. Vardi, Reasoning About Knowledge. A Bradford Book, 2004.

F. D. Garcia and B. Jacobs, Privacy-Friendly Energy-Metering via Homomorphic Encryption, STM'10 Proceedings of the 6th international conference on Security and trust management, pp.226-238, 2010.
DOI : 10.1007/978-3-642-22444-7_15

I. Goldberg, Privacy-Enhancing Technologies for the Internet III, Digital Privacy: Theory, Technologies, and Practices, pp.84-89, 2007.
DOI : 10.1201/9781420052183.ch1

M. Hafiz, A pattern language for developing privacy enhancing technologies, Software: Practice and Experience, vol.3027, issue.5, pp.769-787, 2013.
DOI : 10.1002/spe.1131

J. Y. Halpern and R. Pucella, Dealing with logical omniscience: Expressiveness and pragmatics, Artificial Intelligence, vol.175, issue.1, pp.220-235, 2011.
DOI : 10.1016/j.artint.2010.04.009

J. Hoepman, Privacy Design Strategies, 2013.
DOI : 10.1007/978-3-642-55415-5_38

URL : https://hal.archives-ouvertes.fr/hal-01370395

C. Höfer, J. Petit, R. Schmidt, and F. Kargl, POPCORN: privacy-preserving charging for e-mobility, Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles (CyCAR '13, pp.37-48, 2013.

P. Inverardi and A. Wolf, Formal specification and analysis of software architectures using the chemical abstract machine model, IEEE Transactions on Software Engineering, vol.21, issue.4, pp.373-386, 1995.
DOI : 10.1109/32.385973

M. Jafari, P. W. Fong, R. Safavi-naini, K. Barker, and N. P. Sheppard, Towards defining semantic foundations for purpose-based privacy policies, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.213-224, 2011.
DOI : 10.1145/1943513.1943541

M. Jawurek, M. Johns, and F. Kerschbaum, Plug-In Privacy for Smart Metering Billing, Privacy Enhancing Technologies Symposium (PETS'11), pp.192-210, 2011.
DOI : 10.1007/978-3-642-22263-4_11

M. Jawurek, F. Kerschbaum, and G. Danezis, Privacy Technologies for Smart Grids -A Survey of Options. MSR-TR-2012-119, 2012.

W. D. Jonge and B. Jacobs, Privacy-Friendly Electronic Traffic Pricing via Commits, Proceedings of the Workshop of Formal Aspects of Securiy and Trust, pp.132-137, 2009.
DOI : 10.1007/978-3-642-01465-9_10

F. Kerschbaum, Privacy-Preserving Computation (Position Paper) Annual Privacy Forum (APF'12), 2012.

E. Kosta, J. Zibuschka, T. Scherner, and J. Dumortier, Legal considerations on privacy-enhancing Location Based Services using PRIME technology, Computer Law & Security Review, vol.24, issue.2, pp.139-146, 2008.
DOI : 10.1016/j.clsr.2008.01.006

J. Krumm, A survey of computational location privacy, Personal and Ubiquitous Computing, vol.10, issue.5, pp.391-399, 2008.
DOI : 10.1007/s00779-008-0212-5

A. Kung, PEARs: Privacy Enhancing ARchitectures Annual Privacy Forum (APF'14), Greece, 2014.

M. Langheinrich, Privacy by Design ??? Principles of Privacy-Aware Ubiquitous Systems, Proceedings of the Ubicomp Conference, pp.273-291, 2001.
DOI : 10.1007/3-540-45427-6_23

M. Lemay, G. Gross, C. A. Gunter, and S. Garg, Unified Architecture for Large-Scale Attested Metering, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), pp.115-124, 2007.
DOI : 10.1109/HICSS.2007.586

L. Métayer, Software Architecture Styles As Graph Grammars, ACM SIGSOFT Software Eng. Notes, 1996.

L. Métayer, A formal privacy management framework In FAST (Formal Aspects of Security and Trust, LNCS, vol.5491, pp.161-176, 2009.

D. and L. Métayer, Privacy by design: a matter of choice, Data Protection in a Profiled World, pp.323-334, 2010.

D. and L. Métayer, Privacy by design: a formal framework for the analysis of architectural choices. CODASPY'13, pp.95-104, 2013.

N. Li, T. Yu, and A. I. Antón, A semantics based approach to privacy languages, Comput. Syst. Sci. Eng, vol.21, issue.5, 2006.

N. Li, W. H. Qardaji, and D. Su, Provably private data anonymization: Or, kanonymity meets differential privacy, 1101.

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007.
DOI : 10.1145/1217299.1217302

F. Mcsherry, Privacy integrated queries, Communications of the ACM, vol.53, issue.9, pp.89-97, 2010.
DOI : 10.1145/1810891.1810916

F. Mcsherry and I. Mironov, Differentially private recommender systems, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.627-636, 2009.
DOI : 10.1145/1557019.1557090

F. Mcsherry and K. Talwar, Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007.
DOI : 10.1109/FOCS.2007.66

M. J. May, C. A. Gunter, and I. Lee, Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.85-97, 2006.
DOI : 10.1109/CSFW.2006.24

D. K. Mulligan and J. King, Bridging the Gap between Privacy and Design, 2012.

S. Pearson and A. Benameur, A Decision Support System for Design for Privacy. Privacy and Identity, IFIP AICT 352, pp.283-296, 2011.

D. E. Perry and A. L. Wolf, Foundations for the study of software architecture, ACM SIGSOFT Software Engineering Notes, vol.17, issue.4, 1992.
DOI : 10.1145/141874.141884

R. A. Popa, H. Balakrishnan, and A. J. Blumberg, Vpriv: Protecting privacy in location-based vehicular services, USENIX Security Symposium, pp.335-350, 2009.

Y. Poullet, About the E-Privacy Directive: Towards a Third Generation of Data Protection Legislation?, Data Protection in a Profile World, pp.3-29, 2010.
DOI : 10.1007/978-90-481-8865-9_1

R. Pucella, Deductive Algorithmic Knowledge, Journal of Logic and Computation, vol.16, issue.2, pp.287-309, 2006.
DOI : 10.1093/logcom/exi078

A. Rezgui, A. Bouguettaya, and M. Y. Eltoweissy, Privacy on the web: facts, challenges, and solutions, IEEE Security and Privacy, pp.40-49, 2003.

A. Rial and G. Danezis, Privacy-preserving smart metering, Proceedings of the 2011 ACM Workshop on Privacy in the Electronic Society, 2011.

M. Shaw and P. Clements, The golden age of software architecture, IEEE Software, vol.23, issue.2, 2006.
DOI : 10.1109/MS.2006.58

S. Spiekermann and L. F. Cranor, Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, 2009.
DOI : 10.1109/TSE.2008.88

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

M. C. Tschantz, D. K. Kaynar, and A. Datta, Formal verification of differential privacy for interactive systems, 1101.

M. C. Tschantz and J. M. Wing, Formal Methods for Privacy, Proceedings of the 2nd World Congress on Formal Methods (FM'09), pp.1-15, 2009.
DOI : 10.1007/978-3-642-05089-3_1

T. Yu, N. Li, and A. I. Antón, A formal semantics for P3P, Proceedings of the 2004 workshop on Secure web service , SWS '04, pp.1-8, 2004.
DOI : 10.1145/1111348.1111349