Data semantics) Data Base Management, pp.1-59, 1974. ,
The B-Book, 1996. ,
DOI : 10.1017/CBO9780511624162
Privacy Architectures: Reasoning about Data Minimisation and Integrity, Lecture Notes in Computer Science, vol.8743, pp.17-32, 2014. ,
DOI : 10.1007/978-3-319-11851-2_2
URL : https://hal.archives-ouvertes.fr/hal-01054758
Privacy by Design: From Technologies to Architectures, Privacy Technologies and Policy, pp.1-17, 2014. ,
DOI : 10.1007/978-3-319-06749-0_1
URL : https://hal.archives-ouvertes.fr/hal-01070140
PrETP: Privacy-Preserving electronic toll pricing, Proceedings of the 19th USENIX Security Symposium, pp.63-78, 2010. ,
Software Architecture in Practice. SEI series in Software Engineering, 2012. ,
The Vienna Development Method: The Meta-Language, 1978. ,
DOI : 10.1007/3-540-08766-4
Technologies Actuelles et Futures Pour la Protection de la Vie Priv??e sur Internet, annals of telecommunications - annales des t??l??communications, vol.1514, issue.1, pp.399-417, 2006. ,
DOI : 10.1007/BF03219914
Privacy preserving electronic petitions, Identity in the Information Society, vol.28, issue.10, pp.203-209, 2009. ,
DOI : 10.1007/s12394-009-0012-8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.3599
Reasoning About Knowledge, 2004. ,
Zql: A compiler for privacy-preserving data processing, Proceedings of the 22Nd USENIX Conference on Security. pp. 163?178. SEC'13, USENIX Association, 2013. ,
Privacy-Friendly Energy-Metering via Homomorphic Encryption, Security and Trust Management, pp.226-238, 2011. ,
DOI : 10.1007/978-3-642-22444-7_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.113
Privacy-Enhancing Technologies for the Internet III, Digital Privacy: Theory, Tech., and Practices, pp.3-18, 2007. ,
DOI : 10.1201/9781420052183.ch1
Engineering Privacy by Design, Presented at the Computers , Privacy & Data Protection conference, 2011. ,
A pattern language for developing privacy enhancing technologies, Software: Practice and Experience, vol.3027, issue.5, pp.769-787, 2010. ,
DOI : 10.1002/spe.1131
Dealing with logical omniscience, Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge , TARK '07, 2007. ,
DOI : 10.1145/1324249.1324273
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.6711
Privacy Design Strategies, ICT Systems Security and Privacy Protection, IFIP Advances in Information and Communication Technology, pp.446-459, 2014. ,
DOI : 10.1007/978-3-642-55415-5_38
URL : https://hal.archives-ouvertes.fr/hal-01370395
Privacy technologies for smart grids -a survey of options, 2012. ,
Privacy-Friendly Electronic Traffic Pricing via Commits, Formal Aspects in Security and Trust, pp.143-161, 2008. ,
DOI : 10.1007/978-3-642-01465-9_10
Privacy-preserving computation (position paper) Presented at the Annual Privacy Forum conference, 2012. ,
PEARs: Privacy Enhancing ARchitectures, Proceedings of the Annual Privacy forum, 2014. ,
DOI : 10.1007/978-3-319-06749-0_2
Privacy by design: A matter of choice, Data Protection in a Profiled World, pp.323-334, 2010. ,
Privacy by design: A formal framework for the analysis of architectural choices, Proc. of the Third ACM Conference on Data and Application Security and Privacy. pp. 95?104. CODASPY '13, 2013. ,
Unified Architecture for Large-Scale Attested Metering, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), pp.115-124, 2007. ,
DOI : 10.1109/HICSS.2007.586
Security and Privacy by Declarative Design, 2013 IEEE 26th Computer Security Foundations Symposium, pp.2013-2039, 2013. ,
DOI : 10.1109/CSF.2013.13
Privacy in the Cloud: Bridging the Gap between Design and Implementation, Advanced Information Systems Eng. Workshops, Lecture Notes in Business Information Processing, pp.455-465, 2013. ,
DOI : 10.1007/978-3-642-38490-5_41
Bridging the gap between privacy and design, University of Pennsylvania Journal of Constitutional Law, vol.14, issue.4, pp.989-1034, 2012. ,
A Decision Support System for Design for Privacy, Privacy and Identity Management for Life, IFIP Advances in Information and Communication Technology, pp.283-296, 2011. ,
DOI : 10.1007/978-3-642-20769-3_23
VPriv: protecting privacy in Location-Based vehicular services, Proceedings of the 18th USENIX Security Symposium, pp.335-350, 2009. ,
Deductive algorithmic knowledge. CoRR cs, p.405038, 2004. ,
DOI : 10.1093/logcom/exi078
URL : http://arxiv.org/abs/cs/0405038
Privacy on the web: facts, challenges, and solutions, IEEE, vol.1, issue.6, pp.40-49, 2003. ,
Privacy-Preserving smart metering, 2010. ,
DOI : 10.1145/2046556.2046564
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.8900
Privacy patterns for online interactions, Proceedings of the 2006 conference on Pattern languages of programs, PLoP '06, pp.1-12, 2006. ,
DOI : 10.1145/1415472.1415486
Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.67-82, 2009. ,
DOI : 10.1109/TSE.2008.88
Developing security protocols by refinement, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010. ,
DOI : 10.1145/1866307.1866349
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.379.5263
Pripayd, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, pp.99-107, 2007. ,
DOI : 10.1145/1314333.1314353
Formal Methods for Privacy, FM 2009: Formal Methods, pp.1-15, 2009. ,
DOI : 10.1007/978-3-642-05089-3_1