Privacy By Design und die Neuen Schutzziele, DuD, vol.35, issue.1, pp.30-35, 2011. ,
Creation of a Global Privacy Standard, 2006. ,
Privacy by Design Identity in the Information So https://www.ipc.on.ca/images/Resources/ pbd-implement-7found-principles.pdf 5, Chair of Network Architectures and Services, TUM: MeasrDroid, pp.1-12, 2010. ,
Privacy and Data Protection by Design -from policy to engineering, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01097119
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations, 2015 11th International Conference on Network and Service Management (CNSM), pp.366-371, 2015. ,
DOI : 10.1109/CNSM.2015.7367384
Verified iptables firewall analysis, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, 2016. ,
DOI : 10.1109/IFIPNetworking.2016.7497196
Verifying Security Policies Using Host Attributes, pp.133-148, 2014. ,
DOI : 10.1007/978-3-662-43613-4_9
URL : https://hal.archives-ouvertes.fr/hal-01398013
TaintDroid, ACM Transactions on Computer Systems, vol.32, issue.2, p.5, 2014. ,
DOI : 10.1145/1629575.1629604
The loss of architectural knowledge during system evolution: An industrial case study, 2009 IEEE 17th International Conference on Program Comprehension, pp.188-197, 2009. ,
DOI : 10.1109/ICPC.2009.5090042
Privacy Preserving Energy Management, Proceeding of City Labs Workshop, 2014. ,
DOI : 10.1007/978-3-319-15168-7_5
seL4: From General Purpose to a Proof of Information Flow Enforcement, 2013 IEEE Symposium on Security and Privacy, pp.415-429, 2013. ,
DOI : 10.1109/SP.2013.35
Isabelle/HOL: A Proof Assistant for Higher-Order Logic, LNCS, vol.2283, 2002. ,
DOI : 10.1007/3-540-45949-9
Datenschutz-Schutzziele ??? revisited, Datenschutz und Datensicherheit - DuD, vol.184, issue.6, pp.353-358, 2009. ,
DOI : 10.1007/s11623-009-0072-9
DroidDisintegrator, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS '16, pp.401-412, 2016. ,
DOI : 10.1145/502034.502036