I. Agrafiotis, S. Creese, M. Goldsmith, and N. Papanikolaou, Reaching for informed revocation: Shutting off the tap on personal data. Privacy and Identity Management for Life, pp.246-258, 2010.
DOI : 10.1007/978-3-642-14282-6_20

URL : https://hal.archives-ouvertes.fr/hal-01061066

I. Agrafiotis, S. Creese, M. Goldsmith, and N. Papanikolaou, Applying formal methods to detect and resolve ambiguities in privacy requirements. Privacy and Identity Management for Life, pp.271-282, 2011.
DOI : 10.1007/978-3-642-20769-3_22

A. Armando, R. Carbone, L. Compagna, K. Li, and G. Pellegrino, Model-Checking Driven Security Testing of Web-Based Applications, 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, pp.361-370, 2010.
DOI : 10.1109/ICSTW.2010.54

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Marco-casassa-mont, G. Pearson, Y. Kounga, P. Shen, and . Bramhall, Privacy and identity management in europe.overview of existing assurance methods in the area of privacy and it security, 2004.

J. C. Fernandez, C. Jard, T. Jéron, and C. Viho, An experiment in automatic generation of test suites for protocols with verification technology, Science of Computer Programming, vol.29, issue.1-2, pp.123-146, 1997.
DOI : 10.1016/S0167-6423(96)00032-9

URL : https://hal.archives-ouvertes.fr/inria-00073775

A. F. Westin, Privacy and freedom, 1967.

A. Edgar and . Whitley, Information privacy consent and the 'control' of personal data, Inform. Secur. Tech. Rep, 2009.