A. F. Westin, Privacy and Freedom, 1967.

M. Hansen, A. Schwartz, and A. Cooper, Privacy and Identity Management, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.38-45, 2008.
DOI : 10.1109/MSP.2008.41

URL : https://hal.archives-ouvertes.fr/hal-01276094

A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, unlinkability, unobservability, pseudonymity, and identity management -version v0, 2011.

I. Iso, Common Criteria for Information Technology Security Evaluation ? Part

D. Hatebur and M. Heisel, A Foundation for Requirements Analysis of Dependable Software, Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP, pp.311-325, 2009.
DOI : 10.1007/11875567_11

A. Alebrahim, D. Hatebur, and M. Heisel, A Method to Derive Software Architectures from Quality Requirements, 2011 18th Asia-Pacific Software Engineering Conference, pp.322-330, 2011.
DOI : 10.1109/APSEC.2011.29

M. Jackson, Problem Frames. Analyzing and structuring software development problems, 2001.

D. Hatebur and M. Heisel, A UML Profile for Requirements Analysis of Dependable Software, In: SAFECOMP, pp.317-331, 2010.
DOI : 10.1007/978-3-642-15651-9_24

I. Côté, D. Hatebur, M. Heisel, H. Schmidt, and I. Wentzlaff, A systematic account of problem frames, Proceedings of the European Conference on Pattern Languages of Programs, 2007.

M. Jackson and P. Zave, Deriving specifications from requirements, Proceedings of the 17th international conference on Software engineering , ICSE '95, pp.15-24, 1995.
DOI : 10.1145/225014.225016

L. Sweeney, ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.571-588, 2002.
DOI : 10.1142/S021848850200165X

S. Clauß, D. Kesdogan, and T. Kölsch, Privacy enhancing identity management: protection against re-identification and profiling, Proceedings of the 2005 workshop on Digital identity management. DIM '05, pp.84-93, 2005.

G. Cormode and D. Srivastava, Anonymized data, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pp.1015-1018, 2009.
DOI : 10.1145/1559845.1559968

A. Kapadia, P. Naldurg, and R. H. Campbell, Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.141-150, 2007.
DOI : 10.1109/POLICY.2007.16

M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering, vol.18, issue.2, pp.16-19, 2011.
DOI : 10.1007/s00766-010-0115-7

C. Kalloniatis, E. Kavakli, and S. Gritzalis, Addressing privacy requirements in system design: the PriS method, Requirements Engineering, vol.2, issue.1, pp.241-255, 2008.
DOI : 10.5381/jot.2003.2.1.c6

M. Hafiz, A collection of privacy design patterns, Proceedings of the 2006 conference on Pattern languages of programs, PLoP '06, pp.1-713, 2006.
DOI : 10.1145/1415472.1415481