M. Backes, C. Hritcu, and M. Maffei, Type-checking zero-knowledge, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.357-370, 2008.
DOI : 10.1145/1455770.1455816

URL : http://www.infsec.cs.uni-saarland.de/~hritcu/publications/zk-types-ccs2008.pdf

A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006.
DOI : 10.1109/SP.2006.32

URL : http://theory.stanford.edu/people/jcm/papers/barth-datta-mitchell-nissenbaum-2006.pdf

C. Braghin, D. Gorla, and V. Sassone, Role-based access control for a distributed calculus, Journal of Computer Security, vol.14, issue.2, pp.113-155, 2006.
DOI : 10.3233/JCS-2006-14202

M. Bugliesi, D. Colazzo, S. Crafa, and D. Macedonio, A type system for Discretionary Access Control, Mathematical Structures in Computer Science, vol.6, issue.04, pp.839-875, 2009.
DOI : 10.1145/1328438.1328472

URL : https://hal.archives-ouvertes.fr/inria-00535981

L. Cardelli, G. Ghelli, and A. D. Gordon, Secrecy and group creation, Information and Computation, vol.196, issue.2, pp.127-155, 2005.
DOI : 10.1016/j.ic.2004.08.003

A. B. Compagnoni, E. L. Gunter, and P. Bidinger, Role-based access control for boxed ambients, Theoretical Computer Science, vol.398, issue.1-3, pp.203-216, 2008.
DOI : 10.1016/j.tcs.2008.01.040

URL : https://doi.org/10.1016/j.tcs.2008.01.040

A. Datta, J. Blocki, N. Christin, H. Deyoung, D. Garg et al., Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms, Proceedings of ICISS'11, pp.1-27, 2011.
DOI : 10.1145/1349026.1349043

URL : http://www.cs.cmu.edu/%7Ehdeyoung/papers/iciss11.pdf

W. De-jonge and B. Jacobs, Privacy-Friendly Electronic Traffic Pricing via Commits, Proceedings of FAST'08, pp.143-161, 2009.
DOI : 10.1007/3-540-69053-0_9

M. Dezani-ciancaglini, S. Ghilezan, S. Jaksic, and J. Pantovic, Types for Role-Based Access Control of Dynamic Web Data, Proceedings of WFLP'10, pp.1-29, 2010.
DOI : 10.1109/2.485845

C. Fournet, A. Gordon, and S. Maffeis, A Type Discipline for Authorization in Distributed Systems, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.31-48, 2007.
DOI : 10.1109/CSF.2007.7

M. Hennessy, J. Rathke, and N. Yoshida, safeDpi: a language for controlling mobile code, Acta Informatica, vol.172, issue.3, pp.227-290, 2005.
DOI : 10.1007/s00236-005-0178-y

M. Hennessy and J. Riely, Resource Access Control in Systems of Mobile Agents, Information and Computation, vol.173, issue.1, pp.82-120, 2002.
DOI : 10.1006/inco.2001.3089

M. Koleini, E. Ritter, and M. Ryan, Model Checking Agent Knowledge in Dynamic Access Control Policies, TACAS'13, pp.448-462, 2013.
DOI : 10.1007/978-3-642-36742-7_31

URL : http://www.cs.bham.ac.uk/~mdr/research/papers/pdf/13-tacas.pdf

D. Kouzapas and A. Philippou, A Typing System for Privacy, Proceedings of SEFM Workshops 2013, pp.56-68, 2014.
DOI : 10.1007/978-3-319-05032-4_5

Y. Liu, S. Müller, and K. Xu, A static compliance-checking framework for business process models, IBM Systems Journal, vol.46, issue.2, pp.335-362, 2007.
DOI : 10.1147/sj.462.0335

URL : http://domino.watson.ibm.com/library/cyberdig.nsf/papers/24f8c9826ffa455585257266003397f3/$file/rz3679.pdf

M. J. May, C. A. Gunter, and I. Lee, Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.85-97, 2006.
DOI : 10.1109/CSFW.2006.24

Q. Ni, E. Bertino, J. Lobo, C. Brodie, C. Karat et al., Privacy-aware role-based access control, ACM Trans. on Information and System Security, vol.13, issue.3, 2010.
DOI : 10.1145/1805974.1805980

D. J. Solove, A Taxonomy of Privacy, University of Pennsylvania Law Review, vol.154, issue.3, pp.477-560, 2006.
DOI : 10.2307/40041279

M. C. Tschantz and J. M. Wing, Formal Methods for Privacy, Proceedings of FM'09, pp.1-15, 2009.
DOI : 10.1007/978-3-642-05089-3_1