C. Alchourrón, P. Gärdenfors, and D. Makinson, Abstract, The Journal of Symbolic Logic, vol.48, issue.02, pp.510-530, 1985.
DOI : 10.1080/00048408412341331

A. Anderson, Extensible access control markup language (XACML) version 2, 2004.

G. Aucher, A Combined System for Update Logic and Belief Revision, 2003.
DOI : 10.1007/978-3-540-32128-6_1

URL : https://hal.archives-ouvertes.fr/inria-00537233

P. Balbiani, H. Van-ditmarsch, and P. Seban, Reasoning About Permitted Announcements, ESSLLI 2009 workshop Logical Methods for Social Concepts, 2009.
DOI : 10.1007/s10992-011-9187-1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.646.5121

S. Barker, Protecting deductive databases from unauthorized retrieval and update requests, Data & Knowledge Engineering, vol.43, issue.3, pp.293-315, 2002.
DOI : 10.1016/S0169-023X(02)00126-X

A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006.
DOI : 10.1109/SP.2006.32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610

A. Barth, J. C. Mitchell, A. Datta, and S. Sundaram, Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.279-294, 2007.
DOI : 10.1109/SP.2006.32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610

M. Bishop, What is computer security?, IEEE Security & Privacy Magazine, vol.1, issue.1, 2003.
DOI : 10.1109/MSECP.2003.1176998

P. Blackburn, M. De-rijke, and Y. Venema, Modal Logic, Cambridge Tracts in Computer Science, vol.53, 2001.
DOI : 10.1017/CBO9781107050884

URL : https://hal.archives-ouvertes.fr/inria-00100502

P. Bonatti, S. Kraus, and V. Subrahmanian, Foundations of secure deductive databases, IEEE Transactions on Knowledge and Data Engineering, vol.7, issue.3, pp.406-422, 1995.
DOI : 10.1109/69.390247

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.2559

H. Castañeda, The paradoxes of Deontic Logic: the simplest solution to all of them in one fell swoop. Synthese library, pp.37-86, 1981.

H. Castañeda, Knowledge and Epistemic Obligation, Philosophical Perspectives, vol.2, pp.211-233, 1988.
DOI : 10.2307/2214075

L. Cranor, Web Privacy with P3P, 2002.

F. Cuppens, A logical formalization of secrecy, [1993] Proceedings Computer Security Foundations Workshop VI, 1993.
DOI : 10.1109/CSFW.1993.246639

F. Cuppens and R. Demolombe, Normative Conflicts in a Confidentiality Policy, In: ECAI Workshop on Artificial Normative Reasoning, 1994.

F. Cuppens and R. Demolombe, A deontic logic for reasoning about confidentiality, Deontic Logic, Agency and Normative Systems, DEON '96: Third International Workshop on Deontic Logic in Computer Science, 1996.
DOI : 10.1007/978-1-4471-1488-8_4

F. Cuppens and R. Demolombe, A modal logical framework for security policies, ISMIS 1997, pp.579-589, 1997.
DOI : 10.1007/3-540-63614-5_56

M. Kanovich, P. Rowe, and A. Scedrov, Collaborative Planning With Privacy, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.265-278, 2007.
DOI : 10.1109/CSF.2007.12

G. Karjoth and M. Schunter, A privacy policy model for enterprises, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 2002.
DOI : 10.1109/CSFW.2002.1021821

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.2559

B. Kooi, Probabilistic dynamic epistemic logic, Journal of Logic, Language and Information, vol.12, issue.4, pp.381-408, 2003.
DOI : 10.1023/A:1025050800836

P. Lam, J. Mitchell, and S. Sundaram, A Formalization of HIPAA for a Medical Messaging System, Trust, Privacy and Security in Digital Business, TrustBus 2009, pp.73-85, 2009.
DOI : 10.1109/2.485845

M. May, C. Gunter, and I. Lee, Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.85-97, 2006.
DOI : 10.1109/CSFW.2006.24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.173.471

R. Van-der-meyden, The dynamic logic of permission, Journal of Logic and Computation, vol.6, issue.3, pp.465-479, 1996.
DOI : 10.1093/logcom/6.3.465

J. J. Meyer, A different approach to deontic logic: deontic logic viewed as a variant of dynamic logic., Notre Dame Journal of Formal Logic, vol.29, issue.1, pp.109-136, 1988.
DOI : 10.1305/ndjfl/1093637776

H. Nielson and F. Nielson, A flow-sensitive analysis of privacy properties, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.249-264, 2007.
DOI : 10.1109/CSF.2007.4

E. Pacuit and R. Parikh, The Logic of Knowledge Based Obligation, Synthese, vol.132, issue.3, 2006.
DOI : 10.1007/s11229-005-3877-6

H. Van-ditmarsch, W. Van-der-hoek, and B. Kooi, Dynamic Epistemic Logic, Synthese library, 2007.
DOI : 10.1007/978-1-4020-5839-4

URL : https://hal.archives-ouvertes.fr/hal-00868361