J. R. Abrial, Data semantics) Data Base Management, pp.1-59, 1974.

J. R. Abrial, The B-Book, 1996.
DOI : 10.1017/CBO9780511624162

T. Antignac, L. Métayer, and D. , Privacy Architectures: Reasoning about Data Minimisation and Integrity, Lecture Notes in Computer Science, vol.8743, pp.17-32, 2014.
DOI : 10.1007/978-3-319-11851-2_2

URL : https://hal.archives-ouvertes.fr/hal-01054758

T. Antignac, L. Métayer, and D. , Privacy by Design: From Technologies to Architectures, Privacy Technologies and Policy, pp.1-17, 2014.
DOI : 10.1007/978-3-319-06749-0_1

URL : https://hal.archives-ouvertes.fr/hal-01070140

J. Balasch, A. Rial, C. Troncoso, and C. Geuens, PrETP: Privacy-Preserving electronic toll pricing, Proceedings of the 19th USENIX Security Symposium, pp.63-78, 2010.

L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice. SEI series in Software Engineering, 2012.

D. Bjørner and C. B. Jones, The Vienna Development Method: The Meta-Language, 1978.
DOI : 10.1007/3-540-08766-4

Y. Deswarte and C. Aguilar-melchor, Technologies Actuelles et Futures Pour la Protection de la Vie Priv??e sur Internet, annals of telecommunications - annales des t??l??communications, vol.1514, issue.1, pp.399-417, 2006.
DOI : 10.1007/BF03219914

C. Diaz, E. Kosta, H. Dekeyser, M. Kohlweiss, and N. Girma, Privacy preserving electronic petitions, Identity in the Information Society, vol.28, issue.10, pp.203-209, 2009.
DOI : 10.1007/s12394-009-0012-8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.3599

R. Fagin, J. Y. Halpern, Y. Moses, and M. Vardi, Reasoning About Knowledge, 2004.

C. Fournet, M. Kohlweiss, G. Danezis, and Z. Luo, Zql: A compiler for privacy-preserving data processing, Proceedings of the 22Nd USENIX Conference on Security. pp. 163?178. SEC'13, USENIX Association, 2013.

F. Garcia, B. Jacobs, J. Cuellar, J. Lopez, G. Barthe et al., Privacy-Friendly Energy-Metering via Homomorphic Encryption, Security and Trust Management, pp.226-238, 2011.
DOI : 10.1007/978-3-642-22444-7_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.113

I. Goldberg, Privacy-Enhancing Technologies for the Internet III, Digital Privacy: Theory, Tech., and Practices, pp.3-18, 2007.
DOI : 10.1201/9781420052183.ch1

S. Gürses, C. Troncoso, and C. Diaz, Engineering Privacy by Design, Presented at the Computers , Privacy & Data Protection conference, 2011.

M. Hafiz, A pattern language for developing privacy enhancing technologies, Software: Practice and Experience, vol.3027, issue.5, pp.769-787, 2010.
DOI : 10.1002/spe.1131

J. Y. Halpern and R. Pucella, Dealing with logical omniscience, Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge , TARK '07, 2007.
DOI : 10.1145/1324249.1324273

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.6711

J. H. Hoepman, Privacy Design Strategies, ICT Systems Security and Privacy Protection, IFIP Advances in Information and Communication Technology, pp.446-459, 2014.
DOI : 10.1007/978-3-642-55415-5_38

URL : https://hal.archives-ouvertes.fr/hal-01370395

M. Jawurek, F. Kerschbaum, and G. Danezis, Privacy technologies for smart grids -a survey of options, 2012.

W. De-jonge and B. Jacobs, Privacy-Friendly Electronic Traffic Pricing via Commits, Formal Aspects in Security and Trust, pp.143-161, 2008.
DOI : 10.1007/978-3-642-01465-9_10

F. Kerschbaum, Privacy-preserving computation (position paper) Presented at the Annual Privacy Forum conference, 2012.

A. Kung, PEARs: Privacy Enhancing ARchitectures, Proceedings of the Annual Privacy forum, 2014.
DOI : 10.1007/978-3-319-06749-0_2

L. Métayer and D. , Privacy by design: A matter of choice, Data Protection in a Profiled World, pp.323-334, 2010.

L. Métayer and D. , Privacy by design: A formal framework for the analysis of architectural choices, Proc. of the Third ACM Conference on Data and Application Security and Privacy. pp. 95?104. CODASPY '13, 2013.

M. Lemay, G. Gross, C. A. Gunter, and S. Garg, Unified Architecture for Large-Scale Attested Metering, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), pp.115-124, 2007.
DOI : 10.1109/HICSS.2007.586

M. Maffei, K. Pecina, and M. Reinert, Security and Privacy by Declarative Design, 2013 IEEE 26th Computer Security Foundations Symposium, pp.2013-2039, 2013.
DOI : 10.1109/CSF.2013.13

V. Manousakis, C. Kalloniatis, E. Kavakli, and S. Gritzalis, Privacy in the Cloud: Bridging the Gap between Design and Implementation, Advanced Information Systems Eng. Workshops, Lecture Notes in Business Information Processing, pp.455-465, 2013.
DOI : 10.1007/978-3-642-38490-5_41

D. K. Mulligan and J. King, Bridging the gap between privacy and design, University of Pennsylvania Journal of Constitutional Law, vol.14, issue.4, pp.989-1034, 2012.

S. Pearson, A. Benameur, S. Fischer-hübner, P. Duquenoy, M. Hansen et al., A Decision Support System for Design for Privacy, Privacy and Identity Management for Life, IFIP Advances in Information and Communication Technology, pp.283-296, 2011.
DOI : 10.1007/978-3-642-20769-3_23

R. A. Popa, H. Balakrishnan, and A. J. Blumberg, VPriv: protecting privacy in Location-Based vehicular services, Proceedings of the 18th USENIX Security Symposium, pp.335-350, 2009.

R. Pucella, Deductive algorithmic knowledge. CoRR cs, p.405038, 2004.
DOI : 10.1093/logcom/exi078

URL : http://arxiv.org/abs/cs/0405038

A. Rezgui, A. Bouguettaya, and M. Y. Eltoweissy, Privacy on the web: facts, challenges, and solutions, IEEE, vol.1, issue.6, pp.40-49, 2003.

A. Rial and G. Danezis, Privacy-Preserving smart metering, 2010.
DOI : 10.1145/2046556.2046564

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.8900

S. Romanosky, A. Acquisti, J. Hong, L. F. Cranor, and B. Friedman, Privacy patterns for online interactions, Proceedings of the 2006 conference on Pattern languages of programs, PLoP '06, pp.1-12, 2006.
DOI : 10.1145/1415472.1415486

S. Spiekermann and L. F. Cranor, Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.67-82, 2009.
DOI : 10.1109/TSE.2008.88

C. Sprenger and D. Basin, Developing security protocols by refinement, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010.
DOI : 10.1145/1866307.1866349

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.379.5263

C. Troncoso, G. Danezis, E. Kosta, and B. Preneel, Pripayd, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, pp.99-107, 2007.
DOI : 10.1145/1314333.1314353

M. C. Tschantz and J. M. Wing, Formal Methods for Privacy, FM 2009: Formal Methods, pp.1-15, 2009.
DOI : 10.1007/978-3-642-05089-3_1