S. Banescu and N. Zannone, Measuring Privacy Compliance with Process Specifications, 2011 Third International Workshop on Security Measurements and Metrics, pp.41-50, 2011.
DOI : 10.1109/Metrisec.2011.10

M. Backes, B. Kopf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009.
DOI : 10.1109/SP.2009.18

K. Borders and A. Prakash, Quantifying Information Leaks in Outbound Web Traffic, 2009 30th IEEE Symposium on Security and Privacy, pp.129-140, 2009.
DOI : 10.1109/SP.2009.9

G. Smith, On the Foundations of Quantitative Information Flow, FOSSACS, pp.288-302, 2009.
DOI : 10.1137/060651380

A. Harel, A. Shabtai, L. Rokach, and Y. Elovici, M-Score: A Misuseability Weight Measure, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.3, pp.414-428, 2012.
DOI : 10.1109/TDSC.2012.17

I. M. Abbadi and M. Alawneh, Preventing Insider Information Leakage for Enterprises, 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp.99-106, 2008.
DOI : 10.1109/SECURWARE.2008.14

M. B. Salem, S. Hershkop, and S. J. Stolfo, A Survey of Insider Attack Detection Research, Adv. Inf. Secur, vol.39, pp.69-90, 2008.
DOI : 10.1007/978-0-387-77322-3_5

T. Takebayashi, H. Tsuda, T. Hasebe, and R. Masuoka, Data loss prevention technologies, Fujitsu Scientific and Technical Journal, vol.46, issue.1, pp.47-55, 2010.

R. Koch, Towards next-generation intrusion detection, pp.1-18, 2011.

E. Gessiou, Q. H. Vu, and S. Ioannidis, IRILD: An Information Retrieval Based Method for Information Leak Detection, 2011 Seventh European Conference on Computer Network Defense, pp.33-40, 2011.
DOI : 10.1109/EC2ND.2011.21

J. Gómez-hidalgo, J. Mart?n-abreu, J. Nieves, I. Santos, F. Brezo et al., Data Leak Prevention through Named Entity Recognition, 2010 IEEE Second International Conference on Social Computing, pp.1129-1134, 2010.
DOI : 10.1109/SocialCom.2010.167

M. Hart, P. Manadhata, and R. Johnson, Text Classification for Data Loss Prevention, Privacy Enhancing Technologies, pp.18-37, 2011.
DOI : 10.1007/978-3-642-22263-4_2

F. Farahmand, S. B. Navathe, P. H. Enslow, and G. P. Sharp, Managing vulnerabilities of information systems to security incidents, Proceedings of the 5th international conference on Electronic commerce , ICEC '03, pp.348-354, 2003.
DOI : 10.1145/948005.948050

A. Garg, J. Curtis, and H. Halper, Quantifying the financial impact of IT security breaches, Information Management & Computer Security, vol.11, issue.2, pp.74-83, 2003.
DOI : 10.1108/09685220310468646

B. Blakley, E. Mcdermott, and D. Geer, Information security is information risk management, Proceedings of the 2001 workshop on New security paradigms , NSPW '01, pp.97-104, 2001.
DOI : 10.1145/508171.508187

A. Adriansyah, B. F. Van-dongen, and N. Zannone, Privacy analysis of user behavior using alignments, it -Information Technology, vol.55, issue.6, pp.255-260

T. R. Gruber, Toward principles for the design of ontologies used for knowledge sharing?, International Journal of Human-Computer Studies, vol.43, issue.5-6, pp.907-928, 1995.
DOI : 10.1006/ijhc.1995.1081

C. Doulaverakis, G. Nikolaidis, A. Kleontas, and I. Kompatsiaris, GalenOWL: Ontology-based drug recommendations discovery, Journal of Biomedical Semantics, vol.3, issue.1, p.14, 2012.
DOI : 10.5121/ijwest.2011.2403