K. C. Laudon, Markets and privacy, Communications of the ACM, vol.39, issue.9, pp.92-104, 1996.
DOI : 10.1145/234215.234476

C. R. Taylor, Consumer Privacy and the Market for Customer Information, The RAND Journal of Economics, vol.35, issue.4, pp.631-650, 2004.
DOI : 10.2307/1593765

A. Acquisti, Protecting privacy with economics: Economic incentives for preventive technologies in ubiquitous computing environments, Workshop on Sociallyinformed Design of Privacy-enhancing Solutions in Ubiquitous Computing, pp.1-7, 2002.

S. Berthold and R. Böhme, Valuating Privacy with Option Pricing Theory, Workshop on the Economics of Information Security (WEIS), 2009.
DOI : 10.1007/978-1-4419-6967-5_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.7758

I. H. Hann, K. L. Hui, T. S. Lee, and I. P. Png, Online information privacy: Measuring the cost-benefit trade-off, Proceedings of the 23rd International Conference on Information Systems, 2002.

D. Raggett, Draft 2nd design for policy languages and protocols, 2009.

P. Jones, S. Eber, and J. M. , How to write a financial contract, The Fun of Programming, 2003.
DOI : 10.1007/978-1-349-91518-7_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.7885

P. Jones and S. , Haskell 98 Language and Libraries ? The Revised Report, 2003.

A. Acquisti and H. R. Varian, Conditioning prices on purchase history, Marketing Science, vol.24, issue.3, pp.1-15, 2005.
DOI : 10.2139/ssrn.336684

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.196.5441

R. Böhme and S. Koble, Pricing strategies in electronic marketplaces with privacy-enhancing technologies, WIRTSCHAFTSINFORMATIK, vol.71, issue.2, pp.16-25, 2007.
DOI : 10.2139/ssrn.429762

P. Wadler, The essence of functional programming, Proceedings of the 19th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '92, pp.1-14, 1992.
DOI : 10.1145/143165.143169

E. Rissanen, OASIS extensible access control language (XACML) version 3.0. OASIS working draft 10, OASIS, 2009.

D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985.
DOI : 10.1145/4372.4373

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.319.3690

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Proceedings of the Advances in Cryptology ? EUROCRYPT 2001, pp.93-118, 2001.
DOI : 10.1007/3-540-44987-6_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.7938