S. Warren and L. Brandeis, The Right to Privacy, Harvard Law Review, vol.4, issue.5, 1890.
DOI : 10.2307/1321160

A. Westin, Privacy and Freedom, 1967.

D. J. Solove, A Taxonomy of Privacy, University of Pennsylvania Law Review, vol.154, issue.3, p.477, 2006.
DOI : 10.2307/40041279

H. Nissenbaum, Privacy as Contextual Integrity, Washington Law Review, pp.101-139, 2004.

S. Pearson, Privacy, Security and Trust in Cloud Computing, Privacy and Security for Cloud Computing, Computer Communications and Networks, 2012.
DOI : 10.1007/978-3-642-14992-4_13

. The-white-house, Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy, 2012.

E. Commission, Proposal for a Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such data, 2012.

A. Cavoukian, Privacy by Design, Privacy Protection Measures and Technologies in Business Organisations, pp.170-208, 2012.
DOI : 10.4018/978-1-61350-501-4.ch007

J. C. Cannon, Privacy: What Developers and IT Professionals Should Know, 2004.

A. Patrick and S. Kenny, From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions, PET 2003, pp.107-124, 2003.
DOI : 10.1007/978-3-540-40956-4_8

V. Belloti and A. Sellen, Design for Privacy in Ubiquitous Computing Environments, Proc. 3rd conference on European Conference on Computer-Supported Cooperative Work, pp.77-92, 1993.
DOI : 10.1007/978-94-011-2094-4_6

S. Pearson, Taking Account of Privacy when Designing Cloud Computing Services Wikipedia, http://en.wikipedia.org/wiki/Capability_Maturity_Model 24. The Institute of Internal Auditors: Managing and Auditing Privacy Risks, ICSE-Cloud'09, 2009.
DOI : 10.1109/cloud.2009.5071532

S. Creese, P. Hopkins, S. Pearson, and Y. Shen, Data Protection-Aware Design for Cloud Computing, Proc. 1st CloudCom Beijing, Springer LNCS 5931, pp.119-130, 2009.

S. Spiekermann and L. F. Cranor, Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.1-42, 2008.
DOI : 10.1109/TSE.2008.88

J. Camenisch, T. Groß, and T. Heydt-benjamin, Accountable privacy supporting services, Identity in the Information Society, pp.244-267, 2009.
DOI : 10.1007/s12394-009-0023-5

D. J. Weitzner, H. Abelson, T. Berners-lee, J. Feigenbaum, J. Hendler et al., Information accountability, Communications of the ACM, vol.51, issue.6, 2008.
DOI : 10.1145/1349026.1349043

. Asia-pacific, Economic Co-operation (APEC): APEC Privacy Framework, 2005.

M. Crompton, C. Cowper, and C. Jefferis, The Australian Dodo Case: an insight for data protection regulation, World Data Protection Report BNA, vol.9, issue.1, 2009.

S. Pearson and A. Charlesworth, Accountability as a Way Forward for Privacy Protection in the Cloud, Proc. CloudCom Beijing, Springer LNCS 5931, pp.131-144, 2009.
DOI : 10.1007/978-3-642-10665-1_12

A. Cavoukian, S. Taylor, and M. Abrams, Privacy by Design, pp.405-413, 2010.
DOI : 10.4018/978-1-61350-501-4.ch007

D. Chaum, Intraceable electronic mail, return addresses and digital pseudonyms, Communications of the ACM, 1981.
DOI : 10.1007/978-1-4615-0239-5_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. K. Reiter and A. D. Rubin, Anonymous Web transactions with Crowds, Communications of the ACM, vol.42, issue.2, pp.32-48, 1999.
DOI : 10.1145/293411.293778

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Y. Shen and S. Pearson, Privacy Enhancing Technologies: A Review. HPL-2011-113

S. Pearson, P. Rao, T. Sander, A. Parry, A. Paull et al., Scalable, Accountable Privacy Management for Large Organisations, pp.168-175, 2009.
DOI : 10.1109/edocw.2009.5331996

S. Pearson, Addressing Complexity in a Privacy Expert System, IPMU 2010, pp.612-621, 2010.
DOI : 10.1007/978-3-642-14058-7_63

S. Pearson and T. Sander, A Decision Support System for Privacy Compliance In: Threats, Countermeasures, and Advances in, Information Science Reference, pp.158-180, 2012.

S. Pearson, T. Sander, and R. Sharma, Privacy Management for Global Organisations. Data Privacy Management and Autonomous Spontaneous Security, LNCS, vol.5939, pp.9-17, 2010.
DOI : 10.1007/978-3-642-11207-2_2

D. Tancock, S. Pearson, and A. Charlesworth, Analysis of Privacy Impact Assessments within Major jurisdictions, 2010 Eighth International Conference on Privacy, Security and Trust, 2010.
DOI : 10.1109/PST.2010.5593260

D. Tancock, S. Pearson, and A. Charlesworth, Privacy Impact Assessments for Cloud Computing . Privacy and Security for Cloud Computing, Computer Communications and Networks, 2012.

T. Sander and S. Pearson, Decision Support for Selection of Cloud Service Providers, GTSF, 2010.

S. Pearson and D. Allison, Privacy Compliance Checking using a Model-Based Approach. E- Business Applications for Product Development and Competitive Growth: Emerging Technologies, Business Science Reference, IGI Global, pp.199-220, 2011.
DOI : 10.4018/9781609601324.ch010

R. Ko, B. S. Lee, and S. Pearson, Towards Achieving Accountability, Auditability and Trust in Cloud Computing, ACC 2011, Part IV, CCIS 193, pp.432-444, 2011.
DOI : 10.1145/1773912.1773926

M. Mowbray, S. Pearson, and Y. Shen, Enhancing Privacy in Cloud Computing via Policybased Obfuscation, Journal of Supercomputing, 2010.
DOI : 10.1007/s11227-010-0425-z

S. Pearson, C. Mont, and M. , Sticky Policies: An Approach for Managing Privacy across Multiple Parties, Computer, vol.44, issue.9, pp.60-68, 2011.
DOI : 10.1109/MC.2011.225

S. Pearson, C. Mont, M. Novoa, and M. , Securing Information Transfer in Distributed Computing Environments, IEEE Security & Privacy Magazine, vol.6, issue.1, pp.34-42, 2008.
DOI : 10.1109/MSP.2008.19