D. W. Chadwick and K. Fatema, An advanced policy based authorisation infrastructure, Proceedings of the 5th ACM workshop on Digital identity management, DIM '09, 2009.
DOI : 10.1145/1655028.1655045

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.251.1250

K. Fatema, D. W. Chadwick, and S. Lievens, A Multi-privacy Policy Enforcement System, In: Privacy and Identity IFIP AICT, vol.352, pp.297-310, 2010.
DOI : 10.1007/978-3-642-20769-3_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.250.4615

G. Karjoth, M. Schunter, and M. Waidner, Privacy-enabled services for enterprises, Proceedings. 13th International Workshop on Database and Expert Systems Applications, pp.483-487, 2002.
DOI : 10.1109/DEXA.2002.1045944

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.2365

M. C. Mont, Dealing with Privacy Obligations: Important Aspects and Technical Approaches, International conference on trust and privacy in digital business No1, 2004.

S. Trabelsi, A. Njeh, L. Bussard, and G. Neven, PPL Engine: A Symmetric Architecture for Privacy Policy Handling, :position paper at W3C Workshop on Privacy and data usage control, 2010.

D. Chadwick, G. Zhao, S. Otenko, R. Laborde, L. Su et al., PERMIS: a modular authorization infrastructure, Concurrency And Computation: Practice And Experience, pp.1341-1357, 2008.
DOI : 10.1002/cpe.1284

URL : http://kar.kent.ac.uk/14877/1/PERMISChadwick.pdf

S. H. Ashley, G. Karjoth, C. Powers, and M. Schunter, Enterprise Privacy Authorization Language (EPAL 1.2), 2003.

N. Casellas, M. R. Mozos, and P. Casanovas, Ontology-Enhanced Legal Decision-Support Tools: The NEURONA Data Protection Compliance Application

N. Casellas, J. Nieto, A. Merono, A. Roig, S. Torralba et al., Ontology Semantics for Data Privacy Compliance: The NEURONA Project, 1071.

T. D. Breaux and A. I. Antón, Analyzing Regulatory Rules for Privacy and Security Requirements, IEEE Transactions on Software Engineering, vol.34, issue.1, pp.5-20, 2008.
DOI : 10.1109/TSE.2007.70746

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.206.2507

T. D. Breaux and A. I. Antón, A Systematic Method for Acquiring Regulatory Requirements: A Frame-Based Approach, Proc. 6th International Workshop on Requirements for High Assurance Systems (RHAS-6), 2007.

T. D. Breaux, A. I. Antón, and . Antón, Analyzing goal semantics for rights, permissions, and obligations, 13th IEEE International Conference on Requirements Engineering (RE'05), pp.177-186, 2005.
DOI : 10.1109/RE.2005.12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.551.6928

N. Kiyavitskaya, N. Zeni, T. D. Breaux, A. I. Antón, J. R. Cordy et al., Automating the Extraction of Rights and Obligations for Regulatory Compliance, Proc. 27th International Conference on Conceptual Modelling (ER'08), pp.154-168, 2008.
DOI : 10.1109/MSECP.2004.1281243

I. Rec and X. , | ISO/IEC 10181-3:1996 " Security Frameworks for open systems: Access control framework " PERMIS, Standalone authorization Server, 1995.