A. Westin, Privacy and Freedom, 1967.

S. Marco-casassa-mont, G. Pearson, Y. Kounga, P. Shen, and . Bramhall, On the Management of Consent and Revocation in Enterprises: Setting the Context, 2009.

A. Edgar and . Whitley, Information privacy consent and the " control " of personal data, Inform. Secur. Tech. Rep, 2009.

A. Edgar and . Whitley, Perceptions of government technology, surveillance and privacy: the UK identity cards scheme, editor, new directions in privacy and surveillance, Gullompton: William, pp.133-156, 2009.

I. Agrafiotis, S. Creese, M. Goldsmith, and N. Papanikolaou, Reaching for Informed Revocation: Shutting Off the Tap on Personal Data, Proceedings of Fifth International Summer School on Privacy and Identity Management for Life, pp.7-11, 2009.
DOI : 10.1007/978-3-642-14282-6_20

URL : https://hal.archives-ouvertes.fr/hal-01061066

I. Agrafiotis, S. Creese, M. Goldsmith, and N. Papanikolaou, The Logic of Consent and Revocation, 2010.

K. and K. Waterman, Pre-processing Legal Text: Policy Parsing and Isomorphic Intermediate Representation, Intelligent information Privacy Management Symposium at the AAAI Spring Symposium, 2010.

P. Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, University of Colorado Law Legal Studies Research Paper No. 09-12, 2009.

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, 2001.
DOI : 10.1109/69.971193

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.7472

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, and P. Samarati, kanonymity .Secure Data, Managment in Decentralized Systems, pp.323-353, 2007.

H. Nissenbaum, Privacy as contextual integrity, Washington Law Review, vol.79, issue.1, 2004.

A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006.
DOI : 10.1109/SP.2006.32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610

C. Powers and M. Schunter, Enterprise privacy authorization language (EPAL 1.2), 2003.

M. Carl-tschantz and J. M. Wing, Formal Methods for Privacy, FM 2009: Formal Methods, Second World Congress Eindhoven The Netherlands, 2009.
DOI : 10.1007/978-3-642-05089-3_1