M. Corporation, Privacy Guidelines for Developing Software Products and Services, 2007.

S. Spiekermann and L. Cranor, Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, 2009.
DOI : 10.1109/TSE.2008.88

J. C. Cannon, Privacy: What Developers and IT Professionals Should Know, 2004.

A. Patrick and S. Kenny, From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions, PET 2003, pp.107-124, 2003.
DOI : 10.1007/978-3-540-40956-4_8

V. Belloti and A. Sellen, Design for Privacy in Ubiquitous Computing Environments, Proc. 3rd conference on European Conference on Computer-Supported Cooperative Work, pp.77-92, 1993.
DOI : 10.1007/978-94-011-2094-4_6

D. N. Jutla and P. Bodorik, Sociotechnical Architecture for Online Privacy, IEEE Security and Privacy Magazine, vol.3, issue.2, pp.29-39, 2005.
DOI : 10.1109/MSP.2005.50

S. Spiekermann and L. F. Cranor, Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.1-42, 2008.
DOI : 10.1109/TSE.2008.88

C. Alexander, S. Ishikawa, M. Silverstein, M. Jacobson, I. Fiksdahl-king et al., A Pattern Language, 1977.

M. Hafiz, A collection of privacy design patterns " . Pattern Languages of Programs, pp.1-13, 2006.

. Dicodess, Open Source Model-Driven DSS Generator, 2009.

S. Pearson, T. Sander, and R. Sharma, Privacy Management for Global Organisations " . Data Privacy Management and Autonomous Spontaneous Security, LNCS, vol.5939, pp.9-17, 2010.
DOI : 10.1007/978-3-642-11207-2_2

A. Benameur, S. Fenet, A. Saidane, K. Sinha, and S. , A Pattern-Based General Security Framework: An eBusiness Case Study, 2009 11th IEEE International Conference on High Performance Computing and Communications, 2009.
DOI : 10.1109/HPCC.2009.93

URL : https://hal.archives-ouvertes.fr/hal-01437680

N. A. Delessy and E. B. Fernandez, A Pattern-Driven Security Process for SOA Applications, pp.416-421, 2008.
DOI : 10.1145/1363686.1364217

L. L. Lobato and E. B. Fernandez, Sergio Donizetti Zorzo: Patterns to Support the Development of Privacy Policies, pp.744-74, 2009.

E. Mendelson, Introduction to Mathematical Logic, 1964.
DOI : 10.1007/978-1-4615-7288-6

P. Blackburn, M. De-rijke, and Y. Venema, Modal Logic
DOI : 10.1017/CBO9781107050884

URL : https://hal.archives-ouvertes.fr/inria-00100502

S. Benferhat, D. Dubois, and H. Prade, Towards a Possibilistic Logic Handling of Preferences, Applied Intelligence, vol.14, issue.3, pp.303-317, 2001.
DOI : 10.1007/978-1-4615-0843-4_14

A. Bundy, The Computer Modelling of Mathematical Reasoning, 1986.

S. Pearson, P. Rao, T. Sander, A. Parry, A. Paull et al., Scalable, accountable privacy management for large organizations, 2009 13th Enterprise Distributed Object Computing Conference Workshops, pp.168-175, 2009.
DOI : 10.1109/EDOCW.2009.5331996