Privacy-enhancing technologies -caught between a rock and a hard place, Privacy Law and Policy Reporter, vol.9, pp.135-137, 2002. ,
An Audit Logic for Accountability, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05), pp.34-43, 2005. ,
DOI : 10.1109/POLICY.2005.5
Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007. ,
DOI : 10.1007/s10207-007-0017-y
Promoting data protection by privacy enhancing technologies, EC Communication, vol.598, issue.07, 2007. ,
The Meaning of Logs, Proc. 4th Int. Conference on Trust, Privacy & Security in Digital Business (TrustBus), p.page to appear, 2007. ,
DOI : 10.1007/978-3-540-74409-2_17
A posteriori commpliance control, Proc. 12th ACM Symp. on Access Control Models and Technologies (SACMAT), page to appear, 2007. ,
Cryptographic Protocol to Establish Trusted History of Interactions, Lecture Notes in Computer Science, vol.4357, pp.136-149, 2006. ,
DOI : 10.1007/11964254_13
URL : https://hal.archives-ouvertes.fr/hal-00402744
Can we trust trust?, Trust: Making and Breaking Cooperative Relatioins, chapter 13, pp.213-237, 2000. ,
Privacy by Design ??? Principles of Privacy-Aware Ubiquitous Systems, Ubicomp 2001 Proceedings, pp.273-291, 2001. ,
DOI : 10.1007/3-540-45427-6_23
A Privacy Awareness System for Ubiquitous Computing Environments, Ubicomp 2002 Proceedings , volume 2498 of Lecture Notes in Computer Science, pp.237-245, 2002. ,
DOI : 10.1007/3-540-45809-3_19
Personal privacy in ubiquitous computing . tools and system support. Dissertation Document ETH 16100, 2005. ,
Design of a role-based trust-management framework, Proc. of the Symp. on Research in Security and Privacy (S&P), pp.114-130, 2002. ,
Structural operational semantics as a basis for static program analysis 14. G. Sartor. Privacy, reputation, and trust: Some implications for data protection. EUI-LAW Working Papers 4, European University Institute (EUI), Department of Law, ACM Computing surveys, vol.28, issue.2, 1996. ,
Denotational semantics : a methodology for language development, 1986. ,
TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group, 2005. ,
The Right to Privacy, Harvard Law Review, vol.4, issue.5, pp.193-220, 1890. ,
DOI : 10.2307/1321160