,
, The Health Insurance Portability and Accountability Act (HIPAA), 2004.
, Addressing privacy requirements in system design: the PriS method, Requirements Engineering, vol.13, pp.241-255, 2008.
Enterprise privacy authorization language (epal), IBM Research, 2003. ,
E-p3p privacy policies and privacy authorization, Workshop on Privacy in the Electronic Society, pp.103-109, 2002. ,
DOI : 10.1145/644527.644538
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements ,
Tropos: an AgentOriented Software Development Methodology, JAAMAS, vol.8, issue.3, pp.203-236, 2004. ,
DOI : 10.1023/b:agnt.0000018806.20944.ef
URL : http://eprints.biblio.unitn.it/84/1/15.pdf
Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach, The Guardian, vol.17, 2018. ,
The platform for privacy preferences 1.0 (p3p1. 0) specification. W3C recommendation, p.16, 2002. ,
Platform for Privacy Preferences (P3P), Encyclopedia of Cryptography and Security, pp.940-941, 2011. ,
Security requirements engineering: designing secure sociotechnical systems, 2016. ,
, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal of the European Union, vol.27, issue.59, 2016.
De-Identification of Personal Information, 2015. ,
Modeling security requirements through ownership, permission and delegation, Proceedings of 13th IEEE International Conference on Requirements Engineering, pp.167-176, 2005. ,
DOI : 10.1109/re.2005.43
URL : http://eprints.biblio.unitn.it/826/1/054.pdf
Goal-oriented requirements analysis and reasoning in the tropos methodology, Engineering Applications of AI, vol.18, issue.2, pp.159-171, 2005. ,
Towards the development of privacy-aware systems. Information and Software Technology 51, vol.2, pp.337-350, 2009. ,
, Engineering privacy by design, 2011.
A framework for modeling privacy requirements in role engineering, Proc. of REFSQ, vol.3, pp.137-146, 2003. ,
, IFIP International Information Security Conference, pp.446-459, 2014.
, Goals and Compliance in Nomos 3. International Conference on Conceptual Modeling, pp.275-288, 2014.
t-Closeness: Privacy Beyond k-Anonymity and lDiversity, IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
DOI : 10.1109/icde.2007.367856
URL : http://www.cs.purdue.edu/homes/ninghui/papers/t_closeness_icde07.pdf
Security and privacy requirements analysis within a social setting, 11th International Requirements Engineering Conf, pp.151-161, 2003. ,
DOI : 10.1109/icre.2003.1232746
URL : http://www.cs.toronto.edu/pub/eric/RE03.pdf
l-Diversity: Privacy Beyond k-Anonymity, ACM Trans. Knowl. Discov. Data, vol.1, issue.52, 2007. ,
DOI : 10.1109/icde.2006.1
URL : http://www.cs.cornell.edu/people/dkifer/ldiversityTKDDdraft.pdf
Extensible access control markup language (xacml) version 2.0. Oasis Standard, 2005. ,
Secure Tropos: A Security-Oriented Extension of the Tropos methodology, Int. J. Soft. Eng. Knowl. Eng, vol.17, issue.2, pp.285-309, 2007. ,
The ucon abc usage control model, ACM Transactions on Information and System Security (TISSEC), vol.7, issue.1, pp.128-174, 2004. ,
Toward GDPR-Compliant Socio-Technical Systems: modeling language and reasoning framework, 2017. ,
DOI : 10.1007/978-3-319-70241-4_16
URL : https://hal.archives-ouvertes.fr/hal-01765249
Capturing variability of law with nómos 2, ER, vol.7532, pp.383-396, 2012. ,
Designing Law-Compliant Software Requirements, pp.472-486, 2009. ,
DOI : 10.1007/978-3-642-04840-1_35
Engineering Law-Compliant Requirements -The Nomos Framework, 2010. ,
DOI : 10.1007/978-3-642-04840-1_35
, A Taxonomy of Privacy, 2005.
Introduction: Privacy self-management and the consent dilemma, Harv. L. Rev, vol.126, issue.7, p.1880, 2012. ,
Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.67-82, 2009. ,
k-Anonymity: a Model for Protecting Privacy, Fuzziness and Knowledge-Based Systems, vol.10, issue.5, pp.557-570, 2002. ,
Managing conflicts in goal-driven requirements engineering, IEEE transactions on Software Engineering, vol.24, issue.11, pp.908-926, 1998. ,
Modelling strategic relationships for process reengineering, Social Modeling for Requirements Engineering, vol.11, 2011. ,