H. Castañeda, Knowledge and Epistemic Obligation, Philosophical Perspectives, vol.2, pp.211-233, 1988.
DOI : 10.2307/2214075

L. Cranor, Web Privacy with P3P, 2002.

F. Cuppens, A logical formalization of secrecy, [1993] Proceedings Computer Security Foundations Workshop VI, 1993.
DOI : 10.1109/CSFW.1993.246639

F. Cuppens and R. Demolombe, A deontic logic for reasoning about confidentiality A modal logical framework for security policies, Deontic Logic, Agency and Normative Systems, Third International Workshop on Deontic Logic in Computer Science Foundations of Intelligent Systems, 10th International Symposium, ISMIS '97, pp.579-589, 1996.

H. Deyoung, D. Garg, L. Jia, D. Kaynar, and A. Datta, Experiences in the logical specification of the HIPAA and GLBA privacy laws, Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, WPES '10, pp.73-82, 2010.
DOI : 10.1145/1866919.1866930

H. Van-ditmarsch, W. Van-der-hoek, B. Kooi, R. Fagin, J. Halpern et al., Dynamic Epistemic Logic Synthese library Reasoning about knowledge Children's Online Privacy Protection Act of 1998 (COPPA) http://www.ftc.gov/ogc/coppa1.htm Federal Trade Commission (1999) Gramm-Leach-Bliley Act (GLBA), 1995.

J. Halpern and Y. Moses, A guide to completeness and complexity for modal logics of knowledge and belief, Artificial Intelligence, vol.54, issue.3, pp.311-379, 1992.
DOI : 10.1016/0004-3702(92)90049-4

T. Hinke, Database inference engine design approach, Database Security DB- Sec, pp.247-262, 1988.

J. Horty, M. Usa-kanovich, P. Rowe, and A. Scedrov, Agency and deontic logic Collaborative planning with privacy, IEEE Computer Security Foundations Symposium CSF'07, pp.265-278, 2001.

G. Karjoth and M. Schunter, A privacy policy model for enterprises, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 2002.
DOI : 10.1109/CSFW.2002.1021821

P. Lam, J. Mitchell, and S. Sundaram, A Formalization of HIPAA for a Medical Messaging System, pp.73-85, 2009.
DOI : 10.1109/2.485845

M. May, C. Gunter, and I. Lee, Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.85-97, 2006.
DOI : 10.1109/CSFW.2006.24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Van-der-meyden, The dynamic logic of permission, Journal of Logic and Computation, vol.6, issue.3, pp.465-479, 1996.
DOI : 10.1093/logcom/6.3.465

J. Meyer, A different approach to deontic logic: deontic logic viewed as a variant of dynamic logic., Notre Dame Journal of Formal Logic, vol.29, issue.1, 1988.
DOI : 10.1305/ndjfl/1093637776

T. Moses, Extensible Access Control Markup Language (XACML) ver- sion 2.0, 2005.

H. Nielson and F. Nielson, A flow-sensitive analysis of privacy properties, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.249-264, 2007.
DOI : 10.1109/CSF.2007.4

E. Pacuit, R. Parikh, and E. Cogan, The Logic of Knowledge Based Obligation, Synthese, vol.132, issue.3, pp.311-341, 2006.
DOI : 10.1007/s11229-005-3877-6

H. Sahlqvist, Completeness and Correspondence in the First and Second Order Semantics for Modal Logic, Proceedings of the 3rd Scandinavian Logic Symposium Studies in Logic, 1973.
DOI : 10.1016/S0049-237X(08)70728-6

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

S. Warren and L. Brandeis, The Right to Privacy, Harvard Law Review, vol.4, issue.5, pp.193-220, 1890.
DOI : 10.2307/1321160

A. Westin, Privacy and freedom, 1968.