Type-checking zero-knowledge, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.357-370, 2008. ,
DOI : 10.1145/1455770.1455816
URL : http://www.infsec.cs.uni-saarland.de/~hritcu/publications/zk-types-ccs2008.pdf
Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006. ,
DOI : 10.1109/SP.2006.32
URL : http://theory.stanford.edu/people/jcm/papers/barth-datta-mitchell-nissenbaum-2006.pdf
Role-based access control for a distributed calculus, Journal of Computer Security, vol.14, issue.2, pp.113-155, 2006. ,
DOI : 10.3233/JCS-2006-14202
A type system for Discretionary Access Control, Mathematical Structures in Computer Science, vol.6, issue.04, pp.839-875, 2009. ,
DOI : 10.1145/1328438.1328472
URL : https://hal.archives-ouvertes.fr/inria-00535981
Secrecy and group creation, Information and Computation, vol.196, issue.2, pp.127-155, 2005. ,
DOI : 10.1016/j.ic.2004.08.003
Role-based access control for boxed ambients, Theoretical Computer Science, vol.398, issue.1-3, pp.203-216, 2008. ,
DOI : 10.1016/j.tcs.2008.01.040
URL : https://doi.org/10.1016/j.tcs.2008.01.040
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms, Proceedings of ICISS'11, pp.1-27, 2011. ,
DOI : 10.1145/1349026.1349043
URL : http://www.cs.cmu.edu/%7Ehdeyoung/papers/iciss11.pdf
Privacy-Friendly Electronic Traffic Pricing via Commits, Proceedings of FAST'08, pp.143-161, 2009. ,
DOI : 10.1007/3-540-69053-0_9
Types for Role-Based Access Control of Dynamic Web Data, Proceedings of WFLP'10, pp.1-29, 2010. ,
DOI : 10.1109/2.485845
A Type Discipline for Authorization in Distributed Systems, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.31-48, 2007. ,
DOI : 10.1109/CSF.2007.7
safeDpi: a language for controlling mobile code, Acta Informatica, vol.172, issue.3, pp.227-290, 2005. ,
DOI : 10.1007/s00236-005-0178-y
Resource Access Control in Systems of Mobile Agents, Information and Computation, vol.173, issue.1, pp.82-120, 2002. ,
DOI : 10.1006/inco.2001.3089
Model Checking Agent Knowledge in Dynamic Access Control Policies, TACAS'13, pp.448-462, 2013. ,
DOI : 10.1007/978-3-642-36742-7_31
URL : http://www.cs.bham.ac.uk/~mdr/research/papers/pdf/13-tacas.pdf
A Typing System for Privacy, Proceedings of SEFM Workshops 2013, pp.56-68, 2014. ,
DOI : 10.1007/978-3-319-05032-4_5
A static compliance-checking framework for business process models, IBM Systems Journal, vol.46, issue.2, pp.335-362, 2007. ,
DOI : 10.1147/sj.462.0335
URL : http://domino.watson.ibm.com/library/cyberdig.nsf/papers/24f8c9826ffa455585257266003397f3/$file/rz3679.pdf
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.85-97, 2006. ,
DOI : 10.1109/CSFW.2006.24
Privacy-aware role-based access control, ACM Trans. on Information and System Security, vol.13, issue.3, 2010. ,
DOI : 10.1145/1805974.1805980
A Taxonomy of Privacy, University of Pennsylvania Law Review, vol.154, issue.3, pp.477-560, 2006. ,
DOI : 10.2307/40041279
Formal Methods for Privacy, Proceedings of FM'09, pp.1-15, 2009. ,
DOI : 10.1007/978-3-642-05089-3_1