. Acatech, Cyber-Physical Systems Driving force for innovation in mobility, health, energy and production. acatech -National Academy of Science and Engineering, acatech POSITION PAPER, 2011.

R. Accorsi, A secure log architecture to support remote auditing, Mathematical and Computer Modelling, vol.57, issue.7-8, 2013.
DOI : 10.1016/j.mcm.2012.06.035

R. Accorsi, A. Lehmann, and N. Lohmann, Information leak detection in business process models: Theory, application, and tool support, Information Systems, vol.47, 2014.
DOI : 10.1016/j.is.2013.12.006

B. Alpern and F. B. Schneider, Defining liveness, Information Processing Letters, vol.21, issue.4, pp.181-185, 1985.
DOI : 10.1016/0020-0190(85)90056-0

R. J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems 2nd edition, 2008.

A. Avi?ienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

M. Blaze, J. Feigenbaum, and J. Lacy, Distributed Trust Management, IEEE Symposium on Security and Privacy, pp.164-173, 1996.

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation Advances in Cryptology ? Eurocrypt, LNCS 2045, pp.93-118, 2001.

D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, 1985.
DOI : 10.1145/4372.4373

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.319.3690

F. De-keukelaere, S. Yoshihama, S. Trent, Y. Zhang, L. Luo et al., Adaptive Security Dialogs for Improved Security Behaviors of Users. Human-Computer Interaction ? INTERACT, LNCS, vol.5426, pp.510-523, 2009.

M. Dekker, C. Karsberg, and M. Lakka, Annual Incident Reports 2012 ? Analysis of Article 13a incident reports, European Union Agency for Network and Communication Security (ENISA), 2013.

D. Dolev and A. C. Yao, On the Security of Public Key Protocols. SFCS'81, IEEE Computer Society, pp.350-357, 1981.

C. Eckert, IT-Sicherheit: Konzepte
DOI : 10.1524/9783486595970

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung et al., TaintDroid, Communications of the ACM, vol.57, issue.3, pp.99-106, 2014.
DOI : 10.1145/2494522

E. Commission, EC of the European ParliamentEC on a common regulatory framework for electronic communications networks and services, EC on access to, and interconnection of electronic communications networks and associated facilitiesEC on the authorisation of electronic communications networks and services. Official Journal of the European Communities, pp.37-69, 2002.

E. Gamma, R. Helm, R. E. Johnson, and J. Vlissides, Design Patterns. Elements of Reusable Object-Oriented Software, 1994.

D. Gerd-tom-markotten, User-Centered Security Engineering, 2002.

D. Gerd-tom-markotten, S. Wohlgemuth, and G. Müller, Mit Sicherheit zukunftsfähig, PIK Sonderheft Sicherheit, vol.26, issue.1, 2003.

M. Gilliot, V. Matyas, and S. Wohlgemuth, Privacy and Identity in The Future of Identity in the Information Society (FIDIS) ? Challenges and Opportunities, 2009.

K. Holzinger, A. Holzinger, C. Safran, G. Koiner, and E. Weippl, Use of Wiki Systems in Archaeology: Privacy, Security and Data Protection as Key Problems, 2010.

A. Holzinger, K. Struggl, and M. Debevc, Applying Model-View-Controller (MVC) in Design and Development of Information Systems: An example of smart assistive script breakdown in an e-Business Application, pp.2010-63, 2010.

K. W. Hamlen, G. Morrisett, and F. B. Schneider, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006.
DOI : 10.1145/1111596.1111601

U. Jendricke and D. Gerd-tom-markotten, Usability Meets Security ? the Identity-Manager As Your Personal Security Assistant for the Internet. ACSAC '00, pp.344-354, 2000.

T. Kajiyama and I. Echizen, Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites, 2012 Seventh International Conference on Availability, Reliability and Security, 2012.
DOI : 10.1109/ARES.2012.48

G. Karjoth and M. Schunter, A Privacy Model for Enterprises, CSFW'02 Proceedings of the 15 th IEEE Workshop on Computer Security Foundations, pp.271-281, 2002.

P. Kieseberg, H. Hobel, S. Schrittwieser, E. Weippl, and A. Holzinger, Protecting Anonymity in the Data-Driven Medical Sciences. Interactive Knowledge Discovery and Data Mining: State-of-the-Art and Future Challenges, Biomedical Informatics, 2014.

P. Kieseberg, S. Schrittwieser, M. Mulazzani, I. Echizen, and E. Weippl, An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata, Special issue Security and Privacy in Business Processes Electronic Markets, 2014.
DOI : 10.1007/s12525-014-0154-x

U. Maurer, Modeling a Public-Key Infrastructure, ESORICS 1996, pp.325-350, 1996.

M. Miettinen, S. Heuser, W. Kronz, A. Sadeghi, and N. Asokan, ConXsense ? Context Profiling and Classification for Context-Aware Access Control, ASIACCS, vol.2014, 2014.

C. Mulliner, W. Robertson, and E. Kirda, Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces, 2014 IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/SP.2014.17

B. Otto, Y. W. Lee, and I. Caballero, Information and data quality in business networking: a key concept for enterprises in its early stages of development, Electronic Markets, vol.110, issue.6, pp.83-97, 2011.
DOI : 10.1007/s12525-011-0063-1

H. Orman and R. Schroeppel, Positive feedback and the madness of crowds, Proceedings of the 1996 workshop on New security paradigms , NSPW '96, 1996.
DOI : 10.1145/304851.304882

A. S. Patrick, P. Briggs, and S. Marsh, Designing Systems That People Will Trust " . Security and Usability: Designing Secure Systems that People Can Use, 2005.

L. A. Pineda, I. V. Meza, and L. Salinas, Dialogue Model Specification and Interpretation for Intelligent Multimodal HCI, IBERAMIA 2010, pp.20-29, 2010.
DOI : 10.1007/978-3-642-16952-6_3

K. Rannenberg, A. Pfitzmann, and G. Müller, IT Security and Multilateral Security, Multilateral Security in Communications ? Technology, Infrastructure, Economy, 1999.

K. Rechert, D. Von-suchodoletz, I. Valizada, T. J. Cardenas, and A. Kulzhabayev, Take care of your belongings today ??? securing accessibility to complex electronic business processes, Special issue Security and Privacy in Business Processes Electronic Markets, 2014.
DOI : 10.1007/s12525-013-0151-5

K. Riemer, C. Steinfeld, and D. Vogel, eCollaboration: On the nature and emergence of communication and collaboration technologies, Electronic Markets, vol.56, issue.1, pp.181-188, 2009.
DOI : 10.1007/s12525-009-0023-1

J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, 1975.
DOI : 10.1109/PROC.1975.9939

N. Sonehara, I. Echizen, and S. Wohlgemuth, Isolation in Cloud Computing and Privacy- Enhancing Technologies ? Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes, Gabler, 155?162, 2011.

W. Wahlster and G. Müller, Placing Humans in the Feedback Loop of Social Infrastructures ? NII Research Strategies on Cyber-Physical Systems, Informatik Spektrum, vol.36, issue.6, pp.520-529, 2013.

M. Waidner, Open Issues in Secure Electronic Commerce, 1998.

Q. Wang and N. Li, Satisfiability and Resiliency in Workflow Authorization Systems, ACM Transactions on Information and System Security, vol.13, issue.4, p.35, 2010.
DOI : 10.1145/1880022.1880034

A. Whitten and J. D. Tygar, Why Johnny can't encrypt: A Usability Evaluation of PGP 5.0, SSYM'99, USENIX Association, 1999.

S. Wohlgemuth, I. Echizen, N. Sonehara, and G. Müller, Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy, 25th IFIP International Information Security Conference Security & Privacy ? Silver Linings in the Cloud (SEC) 2010, IFIP AICT 330, IFIP International Federation for Information Processing, 2010.
DOI : 10.1145/1151030.1151052

URL : https://hal.archives-ouvertes.fr/hal-01054512

S. Wohlgemuth, Resilience as a new Enforcement Model for IT Security based on Usage Control. 5th International Workshop on Data Usage Management, IEEE CS Security & Privacy Workshop (SPW 2014) within 35th IEEE Symposium on Security and Privacy (S&P) 2014, 2014.

S. Wohlgemuth, S. Sackmann, N. Sonehara, and M. Tjoa, Security and Privacy in Business Networking. Special issue 'Security and Privacy in Business Networking, Electronic Markets, vol.24, issue.2, 2014.

M. E. Zurko, User-Centered Security: Stepping Up to the Grand Challenge, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.187-202, 2005.
DOI : 10.1109/CSAC.2005.60