ACTORS -a model of concurrent computation in distributed systems series in artificial intelligence, 1985. ,
A Taxonomy of Privacy, University of Pennsylvania Law Review, vol.154, issue.3, pp.477-560, 2006. ,
DOI : 10.2307/40041279
Formal Methods for Privacy, 2nd World Congress on Formal Methods, pp.1-15, 2009. ,
DOI : 10.1007/978-3-642-05089-3_1
Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment, Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC '14, 2014. ,
DOI : 10.1145/2557977.2557991
Enforcing purpose of use via workflows, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.113-116, 2009. ,
DOI : 10.1145/1655188.1655206
A Declarative Framework for Specifying and??Enforcing Purpose-Aware Policies, Security and Trust Management, pp.55-71, 2015. ,
DOI : 10.1109/SP.2012.21
PuRBAC: Purpose-Aware Role-Based Access Control, On the Move to Meaningful Internet Systems: OTM 2008, pp.1104-1121, 2008. ,
DOI : 10.1145/1377836.1377857
Design of PriServ, a privacy service for DHTs, Proceedings of the 2008 international workshop on Privacy and anonymity in information society, PAIS '08, pp.21-25, 2008. ,
DOI : 10.1145/1379287.1379293
URL : https://hal.archives-ouvertes.fr/inria-00374320
Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.102-110, 2005. ,
DOI : 10.1145/1063979.1063998
Privacy-aware role-based access control, ACM Transactions on Information and System Security, vol.13, issue.3, pp.1-2431, 2010. ,
DOI : 10.1145/1805974.1805980
Formalizing and Enforcing Purpose Restrictions in Privacy Policies, 2012 IEEE Symposium on Security and Privacy, pp.176-190, 2012. ,
DOI : 10.1109/SP.2012.21
URL : http://doi.org/10.1109/sp.2012.21
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies, ACM Transactions on Information and System Security, vol.17, issue.1, pp.1-331, 2014. ,
DOI : 10.1109/ISIAS.2007.4299765
Modeling and verification of reactive systems using Rebeca, Fundamenta Informaticae, vol.63, pp.385-410, 2004. ,
Conditional purpose based access control model for privacy protection, Proceedings of the Twentieth Australasian Conference on Australasian Database, pp.135-142, 2009. ,
Leveraging actors for privacy compliance, Proceedings of the 2nd edition on Programming systems, languages and applications based on actors, agents, and decentralized control abstractions, AGERE! '12, pp.133-136, 2012. ,
DOI : 10.1145/2414639.2414657
Petri??Net Transformations for Business??Processes ??? A??Survey, Transactions on Petri Nets and Other Models of Concurrency II, pp.46-63, 2009. ,
DOI : 10.1016/j.datak.2007.06.006
URL : http://wwwteo.informatik.uni-rostock.de/ls_tpp/publications/LohmannVD_2008_topnoc.pdf
Petri Nets, An Introduction, EATCS Monographs on Theoretical Computer Science, 1985. ,
Process Algebra. Cambridge tracts in theoretical computer science, 1990. ,
THE APPLICATION OF PETRI NETS TO WORKFLOW MANAGEMENT, Journal of Circuits, Systems and Computers, vol.08, issue.01, pp.21-66, 1998. ,
DOI : 10.1142/S0218126698000043
Three Good Reasons for Using a Petri-Net-Based Workflow Management System, The Springer International Series in Engineering and Computer Science, pp.161-182, 1998. ,
DOI : 10.1007/978-1-4615-5499-8_10
URL : http://mainpage.nwu.edu.cn/hkg/docs/aalst/ThreeGoodReasonsForUsingPNsInWorkflow.pdf
Slicing-based Reductions for Rebeca, Proceedings of FACS08, pp.209-224, 2008. ,
DOI : 10.1016/j.entcs.2009.12.039
URL : https://doi.org/10.1016/j.entcs.2009.12.039