G. A. Agha, ACTORS -a model of concurrent computation in distributed systems series in artificial intelligence, 1985.

D. J. Solove, A Taxonomy of Privacy, University of Pennsylvania Law Review, vol.154, issue.3, pp.477-560, 2006.
DOI : 10.2307/40041279

M. Tschantz and J. Wing, Formal Methods for Privacy, 2nd World Congress on Formal Methods, pp.1-15, 2009.
DOI : 10.1007/978-3-642-05089-3_1

A. T. Rath, C. , and J. N. , Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment, Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC '14, 2014.
DOI : 10.1145/2557977.2557991

M. Jafari, R. Safavi-naini, and N. P. Sheppard, Enforcing purpose of use via workflows, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.113-116, 2009.
DOI : 10.1145/1655188.1655206

R. D. Masellis, C. Ghidini, and S. Ranise, A Declarative Framework for Specifying and??Enforcing Purpose-Aware Policies, Security and Trust Management, pp.55-71, 2015.
DOI : 10.1109/SP.2012.21

A. Masoumzadeh and J. B. Joshi, PuRBAC: Purpose-Aware Role-Based Access Control, On the Move to Meaningful Internet Systems: OTM 2008, pp.1104-1121, 2008.
DOI : 10.1145/1377836.1377857

M. Jawad, P. S. Alvarado, and P. Valduriez, Design of PriServ, a privacy service for DHTs, Proceedings of the 2008 international workshop on Privacy and anonymity in information society, PAIS '08, pp.21-25, 2008.
DOI : 10.1145/1379287.1379293

URL : https://hal.archives-ouvertes.fr/inria-00374320

J. Byun, E. Bertino, and N. Li, Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.102-110, 2005.
DOI : 10.1145/1063979.1063998

Q. Ni, E. Bertino, J. Lobo, C. Brodie, C. Karat et al., Privacy-aware role-based access control, ACM Transactions on Information and System Security, vol.13, issue.3, pp.1-2431, 2010.
DOI : 10.1145/1805974.1805980

M. C. Tschantz, A. Datta, and J. M. Wing, Formalizing and Enforcing Purpose Restrictions in Privacy Policies, 2012 IEEE Symposium on Security and Privacy, pp.176-190, 2012.
DOI : 10.1109/SP.2012.21

URL : http://doi.org/10.1109/sp.2012.21

M. Jafari, R. Safavi-naini, P. W. Fong, and K. Barker, A Framework for Expressing and Enforcing Purpose-Based Privacy Policies, ACM Transactions on Information and System Security, vol.17, issue.1, pp.1-331, 2014.
DOI : 10.1109/ISIAS.2007.4299765

M. Sirjani, A. Movaghar, A. Shali, and F. De-boer, Modeling and verification of reactive systems using Rebeca, Fundamenta Informaticae, vol.63, pp.385-410, 2004.

M. E. Kabir and H. Wang, Conditional purpose based access control model for privacy protection, Proceedings of the Twentieth Australasian Conference on Australasian Database, pp.135-142, 2009.

J. Ronne, Leveraging actors for privacy compliance, Proceedings of the 2nd edition on Programming systems, languages and applications based on actors, agents, and decentralized control abstractions, AGERE! '12, pp.133-136, 2012.
DOI : 10.1145/2414639.2414657

N. Lohmann, E. Verbeek, and R. Dijkman, Petri??Net Transformations for Business??Processes ??? A??Survey, Transactions on Petri Nets and Other Models of Concurrency II, pp.46-63, 2009.
DOI : 10.1016/j.datak.2007.06.006

URL : http://wwwteo.informatik.uni-rostock.de/ls_tpp/publications/LohmannVD_2008_topnoc.pdf

W. Reisig, Petri Nets, An Introduction, EATCS Monographs on Theoretical Computer Science, 1985.

J. C. Baeten and W. P. Weijland, Process Algebra. Cambridge tracts in theoretical computer science, 1990.

W. M. Aalst, THE APPLICATION OF PETRI NETS TO WORKFLOW MANAGEMENT, Journal of Circuits, Systems and Computers, vol.08, issue.01, pp.21-66, 1998.
DOI : 10.1142/S0218126698000043

W. M. Aalst, Three Good Reasons for Using a Petri-Net-Based Workflow Management System, The Springer International Series in Engineering and Computer Science, pp.161-182, 1998.
DOI : 10.1007/978-1-4615-5499-8_10

URL : http://mainpage.nwu.edu.cn/hkg/docs/aalst/ThreeGoodReasonsForUsingPNsInWorkflow.pdf

H. Sabouri and M. Sirjani, Slicing-based Reductions for Rebeca, Proceedings of FACS08, pp.209-224, 2008.
DOI : 10.1016/j.entcs.2009.12.039

URL : https://doi.org/10.1016/j.entcs.2009.12.039