Reaching for informed revocation: Shutting off the tap on personal data. Privacy and Identity Management for Life, pp.246-258, 2010. ,
DOI : 10.1007/978-3-642-14282-6_20
URL : https://hal.archives-ouvertes.fr/hal-01061066
Applying formal methods to detect and resolve ambiguities in privacy requirements. Privacy and Identity Management for Life, pp.271-282, 2011. ,
DOI : 10.1007/978-3-642-20769-3_22
Model-Checking Driven Security Testing of Web-Based Applications, 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, pp.361-370, 2010. ,
DOI : 10.1109/ICSTW.2010.54
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.3730
Privacy and identity management in europe.overview of existing assurance methods in the area of privacy and it security, 2004. ,
An experiment in automatic generation of test suites for protocols with verification technology, Science of Computer Programming, vol.29, issue.1-2, pp.123-146, 1997. ,
DOI : 10.1016/S0167-6423(96)00032-9
URL : https://hal.archives-ouvertes.fr/inria-00073775
Privacy and freedom, 1967. ,
Information privacy consent and the 'control' of personal data, Inform. Secur. Tech. Rep, 2009. ,