Abstract, The Journal of Symbolic Logic, vol.48, issue.02, pp.510-530, 1985. ,
DOI : 10.1080/00048408412341331
Extensible access control markup language (XACML) version 2, 2004. ,
A Combined System for Update Logic and Belief Revision, 2003. ,
DOI : 10.1007/978-3-540-32128-6_1
URL : https://hal.archives-ouvertes.fr/inria-00537233
Reasoning About Permitted Announcements, ESSLLI 2009 workshop Logical Methods for Social Concepts, 2009. ,
DOI : 10.1007/s10992-011-9187-1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.646.5121
Protecting deductive databases from unauthorized retrieval and update requests, Data & Knowledge Engineering, vol.43, issue.3, pp.293-315, 2002. ,
DOI : 10.1016/S0169-023X(02)00126-X
Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006. ,
DOI : 10.1109/SP.2006.32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610
Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.279-294, 2007. ,
DOI : 10.1109/SP.2006.32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610
What is computer security?, IEEE Security & Privacy Magazine, vol.1, issue.1, 2003. ,
DOI : 10.1109/MSECP.2003.1176998
Modal Logic, Cambridge Tracts in Computer Science, vol.53, 2001. ,
DOI : 10.1017/CBO9781107050884
URL : https://hal.archives-ouvertes.fr/inria-00100502
Foundations of secure deductive databases, IEEE Transactions on Knowledge and Data Engineering, vol.7, issue.3, pp.406-422, 1995. ,
DOI : 10.1109/69.390247
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.2559
The paradoxes of Deontic Logic: the simplest solution to all of them in one fell swoop. Synthese library, pp.37-86, 1981. ,
Knowledge and Epistemic Obligation, Philosophical Perspectives, vol.2, pp.211-233, 1988. ,
DOI : 10.2307/2214075
Web Privacy with P3P, 2002. ,
A logical formalization of secrecy, [1993] Proceedings Computer Security Foundations Workshop VI, 1993. ,
DOI : 10.1109/CSFW.1993.246639
Normative Conflicts in a Confidentiality Policy, In: ECAI Workshop on Artificial Normative Reasoning, 1994. ,
A deontic logic for reasoning about confidentiality, Deontic Logic, Agency and Normative Systems, DEON '96: Third International Workshop on Deontic Logic in Computer Science, 1996. ,
DOI : 10.1007/978-1-4471-1488-8_4
A modal logical framework for security policies, ISMIS 1997, pp.579-589, 1997. ,
DOI : 10.1007/3-540-63614-5_56
Collaborative Planning With Privacy, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.265-278, 2007. ,
DOI : 10.1109/CSF.2007.12
A privacy policy model for enterprises, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 2002. ,
DOI : 10.1109/CSFW.2002.1021821
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.2559
Probabilistic dynamic epistemic logic, Journal of Logic, Language and Information, vol.12, issue.4, pp.381-408, 2003. ,
DOI : 10.1023/A:1025050800836
A Formalization of HIPAA for a Medical Messaging System, Trust, Privacy and Security in Digital Business, TrustBus 2009, pp.73-85, 2009. ,
DOI : 10.1109/2.485845
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.85-97, 2006. ,
DOI : 10.1109/CSFW.2006.24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.173.471
The dynamic logic of permission, Journal of Logic and Computation, vol.6, issue.3, pp.465-479, 1996. ,
DOI : 10.1093/logcom/6.3.465
A different approach to deontic logic: deontic logic viewed as a variant of dynamic logic., Notre Dame Journal of Formal Logic, vol.29, issue.1, pp.109-136, 1988. ,
DOI : 10.1305/ndjfl/1093637776
A flow-sensitive analysis of privacy properties, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.249-264, 2007. ,
DOI : 10.1109/CSF.2007.4
The Logic of Knowledge Based Obligation, Synthese, vol.132, issue.3, 2006. ,
DOI : 10.1007/s11229-005-3877-6
Dynamic Epistemic Logic, Synthese library, 2007. ,
DOI : 10.1007/978-1-4020-5839-4
URL : https://hal.archives-ouvertes.fr/hal-00868361