Privacy and Freedom, 1967. ,
Privacy and Identity Management, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.38-45, 2008. ,
DOI : 10.1109/MSP.2008.41
URL : https://hal.archives-ouvertes.fr/hal-01276094
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, unobservability, pseudonymity, and identity management -version v0, 2011. ,
Common Criteria for Information Technology Security Evaluation ? Part ,
A Foundation for Requirements Analysis of Dependable Software, Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP, pp.311-325, 2009. ,
DOI : 10.1007/11875567_11
A Method to Derive Software Architectures from Quality Requirements, 2011 18th Asia-Pacific Software Engineering Conference, pp.322-330, 2011. ,
DOI : 10.1109/APSEC.2011.29
Problem Frames. Analyzing and structuring software development problems, 2001. ,
A UML Profile for Requirements Analysis of Dependable Software, In: SAFECOMP, pp.317-331, 2010. ,
DOI : 10.1007/978-3-642-15651-9_24
A systematic account of problem frames, Proceedings of the European Conference on Pattern Languages of Programs, 2007. ,
Deriving specifications from requirements, Proceedings of the 17th international conference on Software engineering , ICSE '95, pp.15-24, 1995. ,
DOI : 10.1145/225014.225016
ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.571-588, 2002. ,
DOI : 10.1142/S021848850200165X
Privacy enhancing identity management: protection against re-identification and profiling, Proceedings of the 2005 workshop on Digital identity management. DIM '05, pp.84-93, 2005. ,
Anonymized data, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pp.1015-1018, 2009. ,
DOI : 10.1145/1559845.1559968
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.141-150, 2007. ,
DOI : 10.1109/POLICY.2007.16
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering, vol.18, issue.2, pp.16-19, 2011. ,
DOI : 10.1007/s00766-010-0115-7
Addressing privacy requirements in system design: the PriS method, Requirements Engineering, vol.2, issue.1, pp.241-255, 2008. ,
DOI : 10.5381/jot.2003.2.1.c6
A collection of privacy design patterns, Proceedings of the 2006 conference on Pattern languages of programs, PLoP '06, pp.1-713, 2006. ,
DOI : 10.1145/1415472.1415481