G. Bella and L. C. Paulson, Accountability protocols, ACM Transactions on Information and System Security, vol.9, issue.2, pp.138-161, 2006.
DOI : 10.1145/1151414.1151416

M. Bellare and B. S. Yee, Forward Integrity for Secure Audit Logs, 1997.

D. Butin, M. Chicote, L. Métayer, and D. , Log Design for Accountability, 2013 IEEE Security and Privacy Workshops, pp.1-7, 2013.
DOI : 10.1109/SPW.2013.26

URL : https://hal.archives-ouvertes.fr/hal-00799100

D. Butin, L. Métayer, and D. , Log Analysis for Data Protection Accountability, FM 2014: Formal Methods, pp.163-178, 2014.
DOI : 10.1007/978-3-319-06410-9_12

URL : https://hal.archives-ouvertes.fr/hal-00984308

C. J. Bennett, Implementing Privacy Codes of Practice, Canadian Standards Association, 1995.

D. Hert and P. , Accountability and System Responsibility: New Concepts in Data Protection Law and Human Rights Law In: Managing Privacy through Accountability, pp.193-232, 2012.

D. Pooter, S. Wittocx, J. Denecker, and M. , A Prototype of a Knowledge-Based Programming Environment, Proceedings of the 19th International Conference on Applications of Declarative Programming and Knowledge Management, pp.191-196, 2011.
DOI : 10.1007/978-3-642-41524-1_16

K. Decroix, J. Lapon, B. Decker, and V. Naessens, A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services, Engineering Secure Software and Systems, pp.155-170, 2013.
DOI : 10.1007/978-3-642-36563-8_11

K. Decroix, J. Lapon, B. Decker, and V. Naessens, A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services, Lecture Notes in Computer Science, vol.8303, pp.106-120, 2013.
DOI : 10.1007/978-3-642-45204-8_8

M. Denecker, A Knowledge Base System Project for FO(.), Logic Programming, p.22, 2009.
DOI : 10.1007/978-3-642-02846-5_2

M. Gebser, B. Kaufmann, and T. Schaub, Conflict-driven answer set solving: From theory to practice, Artificial Intelligence, vol.187, issue.188, pp.52-89, 2012.
DOI : 10.1016/j.artint.2012.04.001

D. Guagnin, L. Hempel, and C. Ilten, Managing Privacy Through Accountability, 2012.
DOI : 10.1057/9781137032225

A. Haeberlen, A case for the accountable cloud, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.52-57, 2010.
DOI : 10.1145/1773912.1773926

R. Ierusalimschy, L. H. De-figueiredo, and W. Celes, Lua???An Extensible Extension Language, Software: Practice and Experience, vol.26, issue.6, pp.635-652, 1996.
DOI : 10.1002/(SICI)1097-024X(199606)26:6<635::AID-SPE26>3.0.CO;2-P

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.45.2941

D. Jackson, Alloy: a lightweight object modelling notation, ACM Transactions on Software Engineering and Methodology, vol.11, issue.2, pp.256-290, 2002.
DOI : 10.1145/505145.505149

D. Jackson, alloy: a language & tool for relational models, 2012.

L. Lee and W. E. Grimson, Gait analysis for recognition and classification, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition, pp.148-155, 2002.
DOI : 10.1109/AFGR.2002.1004148

N. Leone, G. Pfeifer, W. Faber, T. Eiter, G. Gottlob et al., The DLV system for knowledge representation and reasoning, ACM Transactions on Computational Logic, vol.7, issue.3, pp.499-562, 2006.
DOI : 10.1145/1149114.1149117

A. Mecocci, M. Pannozzo, and A. Fumarola, Automatic detection of anomalous behavioural events for advanced real-time video surveillance, 2003 International Conference Physics and Control. Proceedings (Cat. No.03EX708), pp.187-192, 2003.
DOI : 10.1109/CIMSA.2003.1227225

C. Raab, The Meaning of ???Accountability??? in the Information Privacy Context, pp.15-32, 2012.
DOI : 10.1057/9781137032225_2

A. Van-gelder, K. A. Ross, and J. S. Schlipf, The well-founded semantics for general logic programs, Journal of the ACM, vol.38, issue.3, pp.620-650, 1991.
DOI : 10.1145/116825.116838

P. Viola and M. Jones, Robust Real-Time Face Detection, International Journal of Computer Vision, vol.57, issue.2, pp.137-154, 2004.
DOI : 10.1023/B:VISI.0000013087.49260.fb

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.9805

D. J. Weitzner, H. Abelson, T. Berners-lee, J. Feigenbaum, J. Hendler et al., Information accountability, Communications of the ACM, vol.51, issue.6, pp.82-87, 2008.
DOI : 10.1145/1349026.1349043

J. Wittocx, M. Mariën, and M. Denecker, The IDP system: A model expansion system for an extension of classical logic, Proceedings of the 2nd Workshop on Logic and Search, Logic and Search, pp.153-165, 2008.

D. Wright and P. De-hert, Introduction to Privacy Impact Assessment, Privacy Impact Assessment, pp.3-32, 2012.
DOI : 10.1007/978-94-007-2543-0_1