Der identity-protector, Datenschutz und Datensicherheit, vol.20, issue.11, pp.654-658, 1996. ,
Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy, 2000. ,
Pattern- Oriented Software Architecture: A System of Patterns, 1996. ,
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Lecture Notes in Computer Science, vol.2045, pp.93-118, 2001. ,
DOI : 10.1007/3-540-44987-6_7
Privacy by design ? the 7 foundational principles Information and Privacy Commissioner of Ontario, 2011. ,
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981. ,
DOI : 10.1145/358549.358563
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210
Untraceable Electronic Cash, CRYPTO, LNCS 403, pp.319-327, 1988. ,
DOI : 10.1007/0-387-34799-2_25
Design Patterns: Elements of Reusable Object-Oriented Software, 1994. ,
A pattern collection for privacy enhancing technology, The 2nd Int. Conf. on Pervasive Patterns and Applications, 2010. ,
Engineering privacy by design, Conference on Computers, Privacy & Data Protection, 2011. ,
A collection of privacy design patterns, Proceedings of the 2006 conference on Pattern languages of programs, PLoP '06, pp.1-7, 2006. ,
DOI : 10.1145/1415472.1415481
A pattern language for developing privacy enhancing technologies, Software: Practice and Experience, vol.3027, issue.5, 2011. ,
DOI : 10.1002/spe.1131
Privacy design strategies eprint arXiv:1210.6621. A preliminary version was presented at the Amsterdam Privacy Conference, ) and the Privacy Law Scholars Conference, 2012. ,
Select before you collect, Ars Aequi, vol.54, pp.1006-1009, 2005. ,
An ontology of architectural design decisions, Proc. of the 2nd Groningen Workshop on Software Variability Management, 2004. ,
An adaptive privacy management system for data repositories, Trust, Privacy and Security in Digital Business: Second International Conference, Proceedings, LNCS 3592, pp.236-245, 2005. ,
Decision support for design for privacy: A system focused on privacy by policy, PrimeLife/IFIP Summer School 2010: Privacy and Identity Management for Life, 2010. ,
Context-Aware Privacy Design Pattern Selection, Trust, Privacy and Security in Digital Business (TrustBus), 7th International Conference, pp.69-80, 2010. ,
DOI : 10.1007/978-3-642-15152-1_7
Anonymity, unlinkability, undetectability, unobservability , pseudonymity, and identity management ? a consolidated proposal for terminology (version v0, 2010. ,
A Taxonomy of Privacy, University of Pennsylvania Law Review, vol.154, issue.3, pp.477-564, 2006. ,
DOI : 10.2307/40041279
Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.67-82, 2009. ,
DOI : 10.1109/TSE.2008.88
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
The Netherlands, Handbook of Privacy and Privacy-Enhancing Technologies -The case of Intelligent Software Agnets, chapter 3, pp.33-54, 2003. ,
Designing privacy-by-design. Presented at the Annual Privacy Forum, 2012. ,
Privacy and Freedom, 1976. ,