, Privacy and Identity Management for Life, 2011.

, California's New Privacy Law: It's Almost GDPR in the US

, Create an online store with 3dcart store builder

H. Aaron, Privacy Commons Icon Set, 2009.

M. Abadi, Logic in access control, Proceedings of 18th IEEE Symposium on Logic in Computer Science (LICS 2003), p.228, 2003.

M. Abrams and M. Crompton, Multi-layered privacy notices: A better way, vol.2, pp.1-4, 2005.

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, An XPath-based preference language for P3P, Proceedings of the 12th International Conference on World Wide Web, pp.629-639, 2003.

W. Ammar, S. Wilson, N. Sadeh, and N. A. Smith, Automatic categorization of privacy policies: A pilot study, 2012.

A. Anderson, A. Nadalin, B. Parducci, D. Engovatov, H. Lockhart et al., Extensible access control markup language (xacml) version 1.0, 2003.

W. Apolinarski, M. Handte, and P. J. Marron, Automating the Generation of Privacy Policies for Context-Sharing Applications, pp.73-80

P. Ashley, S. Hada, G. Karjoth, and M. Schunter, E-P3P privacy policies and privacy authorization, Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, pp.103-109, 2002.

P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter, Enterprise privacy authorization language (EPAL), 2003.

M. Azraoui, K. Elkhiyaoui, K. Melekönen, A. Bernsmed, J. Santana-de-oliveira et al., A-PPL: An Accountability Policy Language, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance -9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, vol.8872, pp.319-326, 2014.

C. Baier and J. Katoen, Principles of Model Checking, 2008.

M. Bar-sinai, L. Sweeney, and M. Crosas, DataTags, data handling policy spaces and the tags language, Security and Privacy Workshops, p.2016

, IEEE, pp.1-8, 2016.

A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, Privacy and contextual integrity: Framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), p.15, 2006.

Y. Moritz, A. Becker, L. Malkis, and . Bussard, S4P: A generic language for specifying privacy preferences and policies, 2010.

K. Bohrer and B. Holland, Customer Profile Exchange (Cpexchange) Specification, 2000.

C. A. Brodie, C. Karat, and J. Karat, An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench, Proceedings of the Second Symposium on Usable Privacy and Security -SOUPS '06, 2006.

S. Byers, L. F. Cranor, D. Kormann, and P. Mcdaniel, Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine, Privacy Enhancing Technologies, vol.3424, p.314

, , 2005.

F. H. Cate, The Limits of Notice and Choice, vol.8, pp.2010-2013

H. Fred and . Cate, The Failure of Fair Information Practice Principles, p.38, 2008.

A. Church, An unsolvable problem of elementary number theory, American Journal of Mathematics, vol.58, issue.2, p.10806377, 1936.

F. William, C. S. Clocksin, and . Mellish, Programming in Prolog (4, 1994.

. Cnil and . The, CNIL's restricted committee imposes a financial penalty of 50 Million euros against GOOGLE LLC

. Inria,

E. Costante, Y. Sun, M. Petkovi?, and J. Hartog, A machine learning solution to assess privacy policy completeness:(short paper), Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, pp.91-96, 2012.

L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-marshall, and J. Reagle, The platform for privacy preferences 1.0 (P3P1. 0) specification, vol.16, 2002.

L. F. Cranor, Necessary but not sufficient: Standardized mechanisms for privacy notice and choice, vol.10, p.273, 2012.

A. Das, M. Degeling, D. Smullen, and N. Sadeh, Personalized Privacy Assistants for the Internet of Things, 2018.

M. Degeling, C. Utz, C. Lentzsch, H. Hosseini, F. Schaub et al., Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy, 2019.

D. Delpercio, Privacy Policy Online, pp.2019-2022, 2011.

H. Deyoung, D. Garg, L. Jia, A. Dilsun-kirli-kaynar, and . Datta, Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws, Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, pp.73-82, 2010.

, Disconnect. Privacy Icons, pp.2016-2019

. Docracy, An open source privacy policy for mobile apps, pp.2012-2019

S. Egelman, J. Tsai, L. F. Cranor, and A. Acquisti, Timing is everything?: The effects of timing and placement of online privacy indicators, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.319-328

S. Egelman, R. Kannavara, and R. Chow, Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms, pp.1669-1678, 2015.

P. Emami-naeini, H. Dixon, Y. Agarwal, and L. F. Cranor, Exploring How Privacy and Security Factor into IoT Device Purchase Behavior, Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems -CHI '19, pp.1-12, 2019.

E. Parliament, General Data Protection Regulation, pp.2016-2020

, Federal Trade Commission. FAIR INFORMATION PRACTICES IN THE ELECTRONIC MARKETPLACE, vol.208, pp.2000-2006

, Children's Online Privacy Protection Rule; Final Rule, pp.2013-2014

J. Feigenbaum, M. J. Freedman, T. Sander, and A. Shostack, Privacy engineering for digital rights management systems, Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM, vol.2320, pp.76-105, 2001.

. Springer, , 2001.

, Forbrukerrådet. Deceived by Design, pp.2018-2024

. Freeprivacypolicies and . Com, Free Privacy Policy Generator & Template with GDPR -Free Privacy Policy, pp.2019-2022

A. Gerl, N. Bennani, H. Kosch, and L. Brunie, LPL, Towards a GDPR-Compliant Privacy Language: Formal Definition and Usage, Trans. Large-Scale Data-and Knowledge-Centered Systems, vol.37, pp.41-80, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01866050

. Getterms, . Getterms, and . Io, , pp.2019-2022

. Google, Android Permissions overview, pp.2019-2022

C. M. Gray, Y. Kou, B. Battles, J. Hoggatt, and A. L. Toombs, The Dark (Patterns) Side of UX Design, Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems -CHI '18, pp.1-14, 2018.

M. D. Hagan, User-Centered Privacy Communication Design, 2016.

H. Harkous, K. Fawaz, R. Lebret, F. Schaub, G. Kang et al., Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning

M. Hilty, A. Pretschner, D. A. Basin, C. Schaefer, and T. Walter, A Policy Language for Distributed Usage Control, Proceedings of the 12th European Symposium On Research in Computer Security, ESORICS'07, vol.4734, pp.531-546, 2007.

G. J. Holzmann, The SPIN Model Checker -Primer and Reference Manual, 2004.

M. Huth and . Mark-dermot-ryan, Logic in computer science -modelling and reasoning about systems, 2004.

. Iubenda, Features -Compliance Solutions, pp.2019-2022

. Iubenda, Terms of service, pp.2019-2022

J. Iyilade and J. Vassileva, P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage, pp.18-22

C. Jensen and C. Potts, Privacy policies as decision-making tools: An evaluation of online privacy notices, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.471-478, 2004.

L. Kagal and . Rei, , 2002.

S. Kasem, -. Madani, and M. Meier, Security and privacy policy languages: A survey, categorization and gap identification, 2015.

P. Kelley, J. Bresee, L. F. Cranor, and R. W. Reeder, A nutrition label for privacy, Proceedings of the 5th Symposium on Usable Privacy and Security, 2009.

P. Kelley, L. Cesca, J. Bresee, and L. F. Cranor, Standardizing privacy notices: An online study of the nutrition label approach, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.1573-1582, 2010.

J. Kolter and G. Pernul, Generating User-Understandable Privacy Preferences, pp.299-306, 2009.

K. Ã. Ulrich, J. ¶nig, and . Schallaboeck, Privacy preferences for E-Mail messages, 2012.

M. Langheinrich, L. Cranor, and M. Marchiori, Appel: A p3p preference exchange language, 2002.

. Daniel-le-mã©tayer, A formal privacy management framework, International Workshop on Formal Aspects in Security and Trust, pp.162-176, 2008.

A. Matheus and . Herrmann, Geospatial Extensible Access Control Markup Language (GeoXACML), 2008.

M. J. May, C. A. Gunter, and I. Lee, Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, Proceedings of the 19th IEEE Computer Security Foundations Workshop, CSFW'06, pp.85-97, 2006.

A. M. Mcdonald and L. F. Cranor, The cost of reading privacy policies. 4:543, 2008.

M. Mehldau, Icons of privacy (original), 2007.

D. Miao, PrivacyInformer: An Automated Privacy Description Generator for the MIT App Inventor, 2014.

V. Morel, M. Cunche, and D. L. Mã©tayer, A generic information and consent framework for the iot, Proceedings of the 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications(TrustCom), pp.366-373, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02166181

, Short Form Notice Code of Conduct to Promote Transparency in Mobile Apps Practices, 2013.

H. Nissenbaum, Privacy as contextual integrity, vol.79, p.119, 2004.

, Skills matter: Further results from the survey of adult skills, p.953634518, 2016.

R. Pardo and D. L. Métayer, Analysis of privacy policies to enhance informed consent, Proceedings of the 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, vol.11559, pp.177-198, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02384593

J. Park and R. S. Sandhu, The UCON ABC Usage Control Model, ACM Trans. Inf. Syst. Secur, vol.7, issue.1, pp.128-174, 2004.

N. Paul, B. Welderufael, D. Tesfay, M. Kipker, S. Stelter et al., Assessing Privacy Policies of Internet of Things Services, Lech Jan Janczewski and Miros law Kuty lowski, vol.529, pp.156-169, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02023740

. C. Polisis and . Polisis, , pp.2019-2022

F. Polisis and . Polisis, , pp.2019-2022

. Polisis and . Polisis, , pp.2019-2022

A. Pretschner, M. Hilty, and D. A. Basin, Distributed Usage Control, Commun. ACM, vol.49, issue.9, pp.39-44, 2006.

, Privacy Policy Generator. Privacy Policy Generator, pp.2019-2022

, Privacy Tech. Privacy icons, 2018.

. Privacypolicies and . Com, Privacy Policy Generator: Free, GDPR, CalOPPA -PrivacyPolicies.com, pp.2019-2022

A. Raskin, Making Privacy Policies not Suck, 2010.

A. Raskin, Privacy Icons -MozillaWiki, 2011.

J. R. Reidenberg, T. Breaux, L. F. Cranor, B. French, A. Grannis et al., Disagreeable privacy policies: Mismatches between meaning and users' understanding, vol.30, p.39, 2015.

J. R. Reidenberg, J. Bhatia, T. Breaux, and T. B. Norton, Automated comparisons of ambiguity in privacy policies and the impact of regulation, 2016.

J. R. Reidenberg, J. Bhatia, T. D. Breaux, and T. B. Norton, Ambiguity in Privacy Policies and the Impact of Regulation, S163-S190, 2016-06, vol.45, pp.1537-5366

A. Rossi and M. Palmirani, DaPIS: An Ontology-Based Data Protection Icon Set, pp.181-195, 2019.

A. Rossi, R. Ducato, H. Haapio, and S. Passera, When Design Met Law: Design Patterns for Information Transparency, p.43, 2019.

M. Rundle, International Data Protection and Digital Identity Management Tools, presentation at IGF, 2006.

N. Sadeh, A. Acquisti, T. D. Breaux, L. F. Cranor, A. M. Mcdonald et al., The usable privacy policy project, 2013.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-Based Access Control Models, IEEE Computer, vol.29, issue.2, pp.38-47, 1996.

F. Schaub, R. Balebako, A. L. Durity, and L. F. Cranor, A design space for effective privacy notices, Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pp.1-17, 2015.

D. J. Solove, A taxonomy of privacy, vol.154, p.477, 2005.

C. State-of, Assembly Bill No. 375 California Consumer Privacy Act, 2018.

C. R. Sunstein, Choosing Not to Choose, 2014.

L. Sweeney, M. , and M. Bar-sinai, Sharing sensitive data with confidence: The datatags system, 2015.

A. Taylor, Privacy policy, pp.2012-2013

, Terms of Service

. Didn't-read, Terms of Service Classification, pp.2019-2022

. Termsfeed, Generic Privacy Policy template, pp.2019-2022

J. Y. Tsai, S. Egelman, L. Cranor, and A. Acquisti, The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study, vol.22, pp.1526-5536, 2011.

, United States Congress. Health Insurance Portability and Accountability Act, 1996.

C. Utz, M. Degeling, S. Fahl, F. Schaub, and T. Holz, Un)informed Consent: Studying GDPR Consent Notices in the Field, p.18, 2019.

F. Jasper-van-de-ven and . Dylla, Qualitative Privacy Description Language, Annual Privacy Forum, pp.171-189, 2016.

B. Van-den, S. Berg, and . Van-der-hof, What happens to my data? A novel approach to informing users of data processing practices, 2012.

S. Wilson, F. Schaub, A. Dara, F. Liu, S. Cherivirala et al., The creation and analysis of a website privacy policy corpus, Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (ACL), 2016.

, WP29. Opinion 8/2014 on the Recent Developments on the Internet of Things, 2014.

, WP29. Guidelines on transparency under Regulation, vol.679, pp.2017-2029, 2016.

J. Yang, K. Yessenov, and A. Solar-lezama, A language for automatically enforcing privacy policies, vol.85, 2012.

L. Yu, T. Zhang, X. Luo, and L. Xue, AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications, pp.39-50, 2015.

R. L. Razieh-nokhbeh-zaeem, K. S. German, and . Barber, PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining, vol.18, pp.1-18, 2016.

, Zero-knowledge. Privacy Rights Markup Language Specification, 2001.

S. Zimmeck and S. M. Bellovin, Privee: An Architecture for Automatically Analyzing Web Privacy Policies. USENIX Association, 2014.