Mobile Values, New Names, and Secure Communication, Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Formalizing architectural connection, Proceedings of 16th International Conference on Software Engineering, pp.71-80, 1994. ,
DOI : 10.1109/ICSE.1994.296767
Unification in privacy policy evaluation - translating EPAL into Prolog, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.185-188, 2004. ,
DOI : 10.1109/POLICY.2004.1309165
PrETP: Privacy-preserving electronic toll pricing, USENIX Security Symposium, pp.63-78, 2010. ,
Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006. ,
DOI : 10.1109/SP.2006.32
Software architecture in practice, SEI Series in Software Engineering, 2013. ,
A Practical Generic Privacy Language, ICISS, pp.125-139, 2010. ,
DOI : 10.1007/978-3-642-17714-9_10
The Unified Modeling Language Reference Manual, 2004. ,
The probe framework for the personalized cloaking of private locations, Transactions on Data Privacy, vol.3, issue.2, pp.123-148, 2010. ,
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
Technologies Actuelles et Futures Pour la Protection de la Vie Priv??e sur Internet, annals of telecommunications - annales des t??l??communications, vol.1514, issue.1, pp.399-417, 2006. ,
DOI : 10.1007/BF03219914
Engineering privacy by design, Computers , Privacy & Data Protection, 2011. ,
Differential Privacy, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-95, 2011. ,
DOI : 10.1145/1866739.1866758
Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), 2013. ,
Reasoning About Knowledge. A Bradford Book, 2004. ,
Privacy-Friendly Energy-Metering via Homomorphic Encryption, STM'10 Proceedings of the 6th international conference on Security and trust management, pp.226-238, 2010. ,
DOI : 10.1007/978-3-642-22444-7_15
Privacy-Enhancing Technologies for the Internet III, Digital Privacy: Theory, Technologies, and Practices, pp.84-89, 2007. ,
DOI : 10.1201/9781420052183.ch1
A pattern language for developing privacy enhancing technologies, Software: Practice and Experience, vol.3027, issue.5, pp.769-787, 2013. ,
DOI : 10.1002/spe.1131
Dealing with logical omniscience: Expressiveness and pragmatics, Artificial Intelligence, vol.175, issue.1, pp.220-235, 2011. ,
DOI : 10.1016/j.artint.2010.04.009
Privacy Design Strategies, 2013. ,
DOI : 10.1007/978-3-642-55415-5_38
URL : https://hal.archives-ouvertes.fr/hal-01370395
POPCORN: privacy-preserving charging for e-mobility, Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles (CyCAR '13, pp.37-48, 2013. ,
Formal specification and analysis of software architectures using the chemical abstract machine model, IEEE Transactions on Software Engineering, vol.21, issue.4, pp.373-386, 1995. ,
DOI : 10.1109/32.385973
Towards defining semantic foundations for purpose-based privacy policies, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.213-224, 2011. ,
DOI : 10.1145/1943513.1943541
Plug-In Privacy for Smart Metering Billing, Privacy Enhancing Technologies Symposium (PETS'11), pp.192-210, 2011. ,
DOI : 10.1007/978-3-642-22263-4_11
Privacy Technologies for Smart Grids -A Survey of Options. MSR-TR-2012-119, 2012. ,
Privacy-Friendly Electronic Traffic Pricing via Commits, Proceedings of the Workshop of Formal Aspects of Securiy and Trust, pp.132-137, 2009. ,
DOI : 10.1007/978-3-642-01465-9_10
Privacy-Preserving Computation (Position Paper) Annual Privacy Forum (APF'12), 2012. ,
Legal considerations on privacy-enhancing Location Based Services using PRIME technology, Computer Law & Security Review, vol.24, issue.2, pp.139-146, 2008. ,
DOI : 10.1016/j.clsr.2008.01.006
A survey of computational location privacy, Personal and Ubiquitous Computing, vol.10, issue.5, pp.391-399, 2008. ,
DOI : 10.1007/s00779-008-0212-5
PEARs: Privacy Enhancing ARchitectures Annual Privacy Forum (APF'14), Greece, 2014. ,
Privacy by Design ??? Principles of Privacy-Aware Ubiquitous Systems, Proceedings of the Ubicomp Conference, pp.273-291, 2001. ,
DOI : 10.1007/3-540-45427-6_23
Unified Architecture for Large-Scale Attested Metering, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), pp.115-124, 2007. ,
DOI : 10.1109/HICSS.2007.586
Software Architecture Styles As Graph Grammars, ACM SIGSOFT Software Eng. Notes, 1996. ,
A formal privacy management framework In FAST (Formal Aspects of Security and Trust, LNCS, vol.5491, pp.161-176, 2009. ,
Privacy by design: a matter of choice, Data Protection in a Profiled World, pp.323-334, 2010. ,
Privacy by design: a formal framework for the analysis of architectural choices. CODASPY'13, pp.95-104, 2013. ,
A semantics based approach to privacy languages, Comput. Syst. Sci. Eng, vol.21, issue.5, 2006. ,
Provably private data anonymization: Or, kanonymity meets differential privacy, 1101. ,
-diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007. ,
DOI : 10.1145/1217299.1217302
Privacy integrated queries, Communications of the ACM, vol.53, issue.9, pp.89-97, 2010. ,
DOI : 10.1145/1810891.1810916
Differentially private recommender systems, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.627-636, 2009. ,
DOI : 10.1145/1557019.1557090
Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007. ,
DOI : 10.1109/FOCS.2007.66
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.85-97, 2006. ,
DOI : 10.1109/CSFW.2006.24
Bridging the Gap between Privacy and Design, 2012. ,
A Decision Support System for Design for Privacy. Privacy and Identity, IFIP AICT 352, pp.283-296, 2011. ,
Foundations for the study of software architecture, ACM SIGSOFT Software Engineering Notes, vol.17, issue.4, 1992. ,
DOI : 10.1145/141874.141884
Vpriv: Protecting privacy in location-based vehicular services, USENIX Security Symposium, pp.335-350, 2009. ,
About the E-Privacy Directive: Towards a Third Generation of Data Protection Legislation?, Data Protection in a Profile World, pp.3-29, 2010. ,
DOI : 10.1007/978-90-481-8865-9_1
Deductive Algorithmic Knowledge, Journal of Logic and Computation, vol.16, issue.2, pp.287-309, 2006. ,
DOI : 10.1093/logcom/exi078
Privacy on the web: facts, challenges, and solutions, IEEE Security and Privacy, pp.40-49, 2003. ,
Privacy-preserving smart metering, Proceedings of the 2011 ACM Workshop on Privacy in the Electronic Society, 2011. ,
The golden age of software architecture, IEEE Software, vol.23, issue.2, 2006. ,
DOI : 10.1109/MS.2006.58
Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, 2009. ,
DOI : 10.1109/TSE.2008.88
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
Formal verification of differential privacy for interactive systems, 1101. ,
Formal Methods for Privacy, Proceedings of the 2nd World Congress on Formal Methods (FM'09), pp.1-15, 2009. ,
DOI : 10.1007/978-3-642-05089-3_1
A formal semantics for P3P, Proceedings of the 2004 workshop on Secure web service , SWS '04, pp.1-8, 2004. ,
DOI : 10.1145/1111348.1111349