K. Bock and M. Rost, Privacy By Design und die Neuen Schutzziele, DuD, vol.35, issue.1, pp.30-35, 2011.

A. Cavoukian, Creation of a Global Privacy Standard, 2006.

A. Cavoukian, Privacy by Design Identity in the Information So https://www.ipc.on.ca/images/Resources/ pbd-implement-7found-principles.pdf 5, Chair of Network Architectures and Services, TUM: MeasrDroid, pp.1-12, 2010.

G. Danezis, J. Domingo-ferrer, M. Hansen, J. H. Hoepman, D. L. Metayer et al., Privacy and Data Protection by Design -from policy to engineering, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01097119

D. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

C. Diekmann, A. Korsten, and G. Carle, Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations, 2015 11th International Conference on Network and Service Management (CNSM), pp.366-371, 2015.
DOI : 10.1109/CNSM.2015.7367384

C. Diekmann, J. Michaelis, M. Haslbeck, and G. Carle, Verified iptables firewall analysis, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, 2016.
DOI : 10.1109/IFIPNetworking.2016.7497196

C. Diekmann, S. A. Posselt, H. Niedermayer, H. Kinkelin, O. Hanka et al., Verifying Security Policies Using Host Attributes, pp.133-148, 2014.
DOI : 10.1007/978-3-662-43613-4_9

URL : https://hal.archives-ouvertes.fr/hal-01398013

W. Enck, P. Gilbert, S. Han, V. Tendulkar, B. G. Chun et al., TaintDroid, ACM Transactions on Computer Systems, vol.32, issue.2, p.5, 2014.
DOI : 10.1145/1629575.1629604

M. Feilkas, D. Ratiu, and E. Jürgens, The loss of architectural knowledge during system evolution: An industrial case study, 2009 IEEE 17th International Conference on Program Comprehension, pp.188-197, 2009.
DOI : 10.1109/ICPC.2009.5090042

H. Kinkelin, M. Von-maltitz, B. Peter, C. Kappler, H. Niedermayer et al., Privacy Preserving Energy Management, Proceeding of City Labs Workshop, 2014.
DOI : 10.1007/978-3-319-15168-7_5

T. Murray, D. Matichuk, M. Brassil, P. Gammie, T. Bourke et al., seL4: From General Purpose to a Proof of Information Flow Enforcement, 2013 IEEE Symposium on Security and Privacy, pp.415-429, 2013.
DOI : 10.1109/SP.2013.35

T. Nipkow, L. C. Paulson, and M. Wenzel, Isabelle/HOL: A Proof Assistant for Higher-Order Logic, LNCS, vol.2283, 2002.
DOI : 10.1007/3-540-45949-9

M. Rost and A. Pfitzmann, Datenschutz-Schutzziele ??? revisited, Datenschutz und Datensicherheit - DuD, vol.184, issue.6, pp.353-358, 2009.
DOI : 10.1007/s11623-009-0072-9

E. Tromer and R. Schuster, DroidDisintegrator, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS '16, pp.401-412, 2016.
DOI : 10.1145/502034.502036