Reaching for informed revocation: Shutting off the tap on personal data. Privacy and Identity Management for Life, pp.246-258, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-01061066
Applying formal methods to detect and resolve ambiguities in privacy requirements. Privacy and Identity Management for Life, pp.271-282, 2011. ,
DOI : 10.1007/978-3-642-20769-3_22
The logic of consent and revocation, 2011. ,
Enterprise privacy authorization language (epal), 2003. ,
Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), p.15, 2006. ,
DOI : 10.1109/SP.2006.32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610
A framework for privacy preferences and data-handling policies, 2009. ,
A component-based architecture for secure data publication, Seventeenth Annual Computer Security Applications Conference, pp.309-318, 2001. ,
DOI : 10.1109/ACSAC.2001.991546
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.463.1043
Web privacy with P3P. O'Reilly Media, 2002. ,
Privacy as contextual integrity, Wash. L. Rev, vol.79, issue.11, p.119, 2004. ,
Formal methods for privacy. FM 2009: Formal Methods, pp.1-15, 2009. ,
DOI : 10.1007/978-3-642-05089-3_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.4114
Perceptions of government technology, surveillance and privacy: the UK identity cards scheme. New directions in surveillance and privacy, p.133, 2009. ,
Information privacy consent and the 'control' of personal data, Inform. Secur. Tech. Rep, 2009. ,