L. A. Bygrave, Privacy-enhancing technologies -caught between a rock and a hard place, Privacy Law and Policy Reporter, vol.9, pp.135-137, 2002.

J. G. Cederquist, R. J. Corin, M. A. Dekker, S. Etalle, and J. I. Hartog, An Audit Logic for Accountability, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05), pp.34-43, 2005.
DOI : 10.1109/POLICY.2005.5

J. G. Cederquist, R. J. Corin, M. A. Dekker, S. Etalle, J. I. Hartog et al., Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007.
DOI : 10.1007/s10207-007-0017-y

E. Commission, Promoting data protection by privacy enhancing technologies, EC Communication, vol.598, issue.07, 2007.

S. Etalle, F. Massacci, and A. Yautsiukhin, The Meaning of Logs, Proc. 4th Int. Conference on Trust, Privacy & Security in Digital Business (TrustBus), p.page to appear, 2007.
DOI : 10.1007/978-3-540-74409-2_17

S. Etalle and W. H. Winsborough, A posteriori commpliance control, Proc. 12th ACM Symp. on Access Control Models and Technologies (SACMAT), page to appear, 2007.

S. Galice, M. Minier, J. Mullins, and S. Ubéda, Cryptographic Protocol to Establish Trusted History of Interactions, Lecture Notes in Computer Science, vol.4357, pp.136-149, 2006.
DOI : 10.1007/11964254_13

URL : https://hal.archives-ouvertes.fr/hal-00402744

D. Gambetta, Can we trust trust?, Trust: Making and Breaking Cooperative Relatioins, chapter 13, pp.213-237, 2000.

M. Langheinrich, Privacy by Design ??? Principles of Privacy-Aware Ubiquitous Systems, Ubicomp 2001 Proceedings, pp.273-291, 2001.
DOI : 10.1007/3-540-45427-6_23

M. Langheinrich, A Privacy Awareness System for Ubiquitous Computing Environments, Ubicomp 2002 Proceedings , volume 2498 of Lecture Notes in Computer Science, pp.237-245, 2002.
DOI : 10.1007/3-540-45809-3_19

M. Langheinrich, Personal privacy in ubiquitous computing . tools and system support. Dissertation Document ETH 16100, 2005.

N. Li, J. Mitchell, and W. Winsborough, Design of a role-based trust-management framework, Proc. of the Symp. on Research in Security and Privacy (S&P), pp.114-130, 2002.

D. , L. Métayer, and D. Schmidt, Structural operational semantics as a basis for static program analysis 14. G. Sartor. Privacy, reputation, and trust: Some implications for data protection. EUI-LAW Working Papers 4, European University Institute (EUI), Department of Law, ACM Computing surveys, vol.28, issue.2, 1996.

D. Schmidt, Denotational semantics : a methodology for language development, 1986.

C. Trusted and . Group, TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group, 2005.

S. Warren and L. Brandeis, The Right to Privacy, Harvard Law Review, vol.4, issue.5, pp.193-220, 1890.
DOI : 10.2307/1321160