Accountability protocols, ACM Transactions on Information and System Security, vol.9, issue.2, pp.138-161, 2006. ,
DOI : 10.1145/1151414.1151416
Forward Integrity for Secure Audit Logs, 1997. ,
Log Design for Accountability, 2013 IEEE Security and Privacy Workshops, pp.1-7, 2013. ,
DOI : 10.1109/SPW.2013.26
URL : https://hal.archives-ouvertes.fr/hal-00799100
Log Analysis for Data Protection Accountability, FM 2014: Formal Methods, pp.163-178, 2014. ,
DOI : 10.1007/978-3-319-06410-9_12
URL : https://hal.archives-ouvertes.fr/hal-00984308
Implementing Privacy Codes of Practice, Canadian Standards Association, 1995. ,
Accountability and System Responsibility: New Concepts in Data Protection Law and Human Rights Law In: Managing Privacy through Accountability, pp.193-232, 2012. ,
A Prototype of a Knowledge-Based Programming Environment, Proceedings of the 19th International Conference on Applications of Declarative Programming and Knowledge Management, pp.191-196, 2011. ,
DOI : 10.1007/978-3-642-41524-1_16
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services, Engineering Secure Software and Systems, pp.155-170, 2013. ,
DOI : 10.1007/978-3-642-36563-8_11
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services, Lecture Notes in Computer Science, vol.8303, pp.106-120, 2013. ,
DOI : 10.1007/978-3-642-45204-8_8
A Knowledge Base System Project for FO(.), Logic Programming, p.22, 2009. ,
DOI : 10.1007/978-3-642-02846-5_2
Conflict-driven answer set solving: From theory to practice, Artificial Intelligence, vol.187, issue.188, pp.52-89, 2012. ,
DOI : 10.1016/j.artint.2012.04.001
Managing Privacy Through Accountability, 2012. ,
DOI : 10.1057/9781137032225
A case for the accountable cloud, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.52-57, 2010. ,
DOI : 10.1145/1773912.1773926
Lua???An Extensible Extension Language, Software: Practice and Experience, vol.26, issue.6, pp.635-652, 1996. ,
DOI : 10.1002/(SICI)1097-024X(199606)26:6<635::AID-SPE26>3.0.CO;2-P
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.45.2941
Alloy: a lightweight object modelling notation, ACM Transactions on Software Engineering and Methodology, vol.11, issue.2, pp.256-290, 2002. ,
DOI : 10.1145/505145.505149
alloy: a language & tool for relational models, 2012. ,
Gait analysis for recognition and classification, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition, pp.148-155, 2002. ,
DOI : 10.1109/AFGR.2002.1004148
The DLV system for knowledge representation and reasoning, ACM Transactions on Computational Logic, vol.7, issue.3, pp.499-562, 2006. ,
DOI : 10.1145/1149114.1149117
Automatic detection of anomalous behavioural events for advanced real-time video surveillance, 2003 International Conference Physics and Control. Proceedings (Cat. No.03EX708), pp.187-192, 2003. ,
DOI : 10.1109/CIMSA.2003.1227225
The Meaning of ???Accountability??? in the Information Privacy Context, pp.15-32, 2012. ,
DOI : 10.1057/9781137032225_2
The well-founded semantics for general logic programs, Journal of the ACM, vol.38, issue.3, pp.620-650, 1991. ,
DOI : 10.1145/116825.116838
Robust Real-Time Face Detection, International Journal of Computer Vision, vol.57, issue.2, pp.137-154, 2004. ,
DOI : 10.1023/B:VISI.0000013087.49260.fb
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.9805
Information accountability, Communications of the ACM, vol.51, issue.6, pp.82-87, 2008. ,
DOI : 10.1145/1349026.1349043
The IDP system: A model expansion system for an extension of classical logic, Proceedings of the 2nd Workshop on Logic and Search, Logic and Search, pp.153-165, 2008. ,
Introduction to Privacy Impact Assessment, Privacy Impact Assessment, pp.3-32, 2012. ,
DOI : 10.1007/978-94-007-2543-0_1