M. Meints, The relationship between data protection legislation and information security related standards The Future of Identity in the Information Society, IFIP, vol.298, pp.254-267, 2009.

R. England, Review of recent ITIL studies (APMG), 2011.

I. Iec, ISO/IEC 27000 -information technology security techniques information security management systems overview and vocabulary, 2009.

I. Iec, ISO/IEC 29100 -information technology ? security techniques ? privacy framework, 2011.

I. Iec, ISO/IEC 15504 -information technology process assessment parts 1-5, 2003.

D. Wright and P. D. Hert, Introduction to Privacy Impact Assessment, 2012.
DOI : 10.1007/978-94-007-2543-0_1

D. Wright, K. Wadhwa, M. Lagazio, C. Raab, and E. Charikane, Privacy impact assessment and risk management, Report for the Information Commissioners OfficeResearch_and_ reports/pia-and-risk-management-full-report-for-the-ico, 2013.

H. Zwingelberg, M. Hansen-bruno-crispo, S. Fischer-hbner, R. Leenes, and G. Russello, Privacy protection goals and their implications for eid systems Privacy and Identity Management for Life, IFIP Advances in Information and Communication Technology, pp.245-260, 2012.

C. Kalloniatis, E. Kavakli, and S. Gritzalis, Addressing privacy requirements in system design: the PriS method, Requirements Engineering, vol.2, issue.1, pp.241-255, 2008.
DOI : 10.1007/s00766-008-0067-3

M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering, vol.18, issue.2, pp.3-32, 2011.
DOI : 10.1007/s00766-010-0115-7

S. Gregory-neven-vimercati, E. Paraboschi, F. Pedrini, D. Preiss, P. Raggett et al., Primelife policy language, 2009.

N. Doty and M. Gupta, Privacy Patterns, 2012.