A. Jean-raymond, B. The, A. Martín, and F. Cédric, Mobile Values, New Names, and Secure Communication, Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL '01, pp.104-115, 1996.

A. John, G. Stefanos, and K. Chris, Privacy enhancing technologies : A review, pp.282-287, 2003.

A. Nagham, A. Yann, B. Patricia, S. Philippe, and L. English, Trust Evaluation of a System for an Activity with Subjective Logic, Trust, Privacy, and Security in Digital Business. Sous la dir. de Claudia EEEEE, SokratisK. KK et Günther PPPPPP. T. 8647. Lecture Notes in Computer Science, pp.48-59, 2014.

R. J. Aaaaa, A Formal Approach to Software Architecture, Thèse de doct, 1997.

A. Thibaud, L. Daniel, and . Mmm, PrivaSy : systematic exploration of the design space using constraint solving techniques (ongoing work, Atelier de Protection de la Vie Privée Île de Groix, 2012.

A. Thibaud, A. Daniel, and L. English, Privacy Architectures : Reasoning about Data Minimisation and Integrity, Lecture Notes in Computer Science, pp.17-32, 2014.

A. Thibaud, A. Daniel, and L. English, Privacy by Design : From Technologies to Architectures In : Privacy Technologies and Policy, Lecture Notes in Computer Science, pp.1-17, 2014.

A. Thibaud, L. Daniel, J. English, M. Stephen, D. Theo et al., Trust Driven Strategies for Privacy by Design In : Trust Management IX, 454. IFIP Advances in Information and Communication Technology, pp.60-75, 2015.

R. J. Aaaaaaaa, Security Engineering : A Guide to Building Dependable Distributed Systems. 2 e éd, 2008.

A. Marc, Why Software Is Eating the World, The Wall Street Journal, 2011.

. Arf+14, A. Ghada, G. Sébastien, L. Patrick, L. Jean-francois et al., A Privacy-Preserving Contactless Transport Service for NFC Smartphones, English. In : Mobile Computing, Applications , and Services. Sous la dir. de Gérard MMMMM et Ulf BBBBBB. T. 130. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp.282-285, 2014.

B. Josep, R. Alfredo, T. Carmela, and G. Christophe, PrETP : Privacy-Preserving Electronic Toll Pricing, Proceedings of the 19th USENIX Security Symposium, pp.63-78, 2010.

]. A. Bar+06, A. D. , J. C. Mmmmmmmm, and H. Nnnnnnn, Privacy and contextual integrity : framework and applications, IEEE Symposium, pp.15-198, 2006.

B. Gilles, C. David, and C. Claude, Minimum Disclosure Proofs of Knowledge, Journal of Computer and System Sciences, vol.37, pp.156-189, 1988.

B. Len, C. Paul, and K. Rick, Software Architecture in Practice. 3rd. SEI series in Software Engineering, 2012.

M. [. Dddddddd and G. Kkkkkk, Unification in privacy policy evaluation -translating EPAL into Prolog, Policies for Distributed Systems and Networks Proceedings. Fifth IEEE International Workshop on, pp.185-188, 2004.

B. Niklas, B. Van, D. David, and S. English, Paragon for Practical Programming with Information-Flow Control, Programming Languages and Systems. Sous la dir. de Chung-chieh SSSS. T. 8301. Lecture Notes in Computer Science, pp.217-232, 2013.

B. Amos, G. Ariel, I. Yuval, K. Eyal, S. Mmmmet-anat et al., Non-Interactive Secure Multiparty Computation, English. In : Advances in Cryptology ? CRYPTO 2014

A. G. De-juan and G. T. Rosario, Lecture Notes in Computer Science, pp.387-404

B. Manuel, F. Paul, and M. Silvio, Non-interactive Zero-knowledge and Its Applications, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing. STOC '88, pp.103-112, 1988.

R. Alastair, . Bbbbbbbbb, K. Dorothea, and P. Sören, Unwillingness to pay for privacy : A field experiment, Economics Letters, vol.1171, pp.25-27, 2012.

Y. Moritz, . Bbbbbb, M. Alexander, and B. Laurent, A Practical Generic Privacy Language, Information Systems Security. T. 6503. Lecture Notes in Computer Science, pp.125-139, 2011.

. Bob+08, B. François, C. Sylvain, E. C. Mohamed, I. Stéphane et al., The Alt-Ergo automated theorem prover, 2008.

. Bob+11, B. François, F. Jean-christophe, M. Claude, and P. Andrei, Why3 : Shepherd your herd of provers, Boogie 2011 : First International Workshop on Intermediate Verification Languages, pp.53-64, 2011.

]. B. Boe88, A spiral model of software development and enhancement, IEEE Computer, vol.215, pp.61-72, 1988.

B. Grady, R. James, and J. Ivar, Unified Modeling Language User Guide. Sous la dir. d'AAAAAAA-WWWWWW. 2 e éd. Object Technology Series, 2005.

B. Niklas and S. David, Paralocks : Role-based Information Flow Control and Beyond, Proceedings of the 37th Annual ACM SIGPLAN- SIGACT Symposium on Principles of Programming Languages. POPL '10, pp.431-444, 2010.

. Byg02 and A. Lee, Privacy-enhancing technologies-caught between a rock and a hard place, Privacy Law and Policy Reporter, vol.9, pp.135-137, 2002.

C. Ron, Universally Composable Security : A New Paradigm for Cryptographic Protocols, Proceedings. 42nd IEEE Symposium on. Sous la dir. de Ron C, 2001.

C. Ann, Privacy by Design . . . Take the Challenge, 2009.

C. Pierre and C. Nicolas, Mission d'expertise sur la fiscalité de l'économie numérique, 2013.

C. Véronique and D. Stéphanie, Safely Composing Security Protocols, In : Formal Methods in System Design, vol.341, pp.1-36, 2009.

[. Cnil and F. , Pack de conformité pour les compteurs communicants, 2014.

L. David and . Ccc, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Commun. ACM, vol.24, issue.2, pp.84-90, 1981.

C. David, Security without identification : transaction systems to make big brother obsolete, Communications of the ACM, vol.28, pp.1030-1044, 1985.

C. Benny, K. Eyal, G. Oded, and S. Madhu, Private information retrieval, Journal of the ACM, vol.456, pp.965-981, 1998.

C. Paul and . Cccccccc, A Survey of Architecture Description Languages, Proceedings of the 8th International Workshop on Software Specification and Design Etude annuelle 2014 du Conseil d'Etat -Le numérique et les droits fondamentaux " . La Documentation française, p.16, 1996.

[. Eee, Convention de sauvegarde des Droits de l'Homme et des Libertés fondamentales telle qu'amendée par les Protocoles n ? 11 et n ? 14, 1950.

[. Luisa, D. English-de-serge, G. Ronald, L. , P. et al., Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS : Research Issues and Trends, European Data Protection : Coming of Age. Sous la dir, pp.223-239

D. Claudia, K. Eleni, D. Hannelore, K. Markulf, and G. Nigusse, Privacy preserving electronic petitions, In : Identity in the Information Society, vol.1, issue.1, pp.203-209, 2009.

D. Stéphanie, K. Steve, and D. R. Mark, on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending DirectiveEC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data [Dir95] Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data Verifying Privacy-Type Properties of Electronic Voting Protocols : A Taster, Towards Trustworthy Elections ? New Directions in Electronic Voting Miros?aw KKK et Ben AAAA. T. 6000. Lecture Notes in Computer Science, pp.289-309, 1995.

D. George, K. Markulf, and R. Alfredo, Differentially Private Billing with Rebates, 2011.

D. Leonardo, . Mmmmm, and B. Nikolaj, Z3 : An efficient SMT solver " . In : Tools and Algorithms for the Construction and Analysis of Systems, pp.337-340, 2008.

D. Cynthia, Differential privacy In : Automata, languages and programming, pp.1-12, 2006.

D. Danny and C. Y. Andrew, On the Security of Public Key Protocols. Rapp. tech, 1981.

]. Z. Erk+13, J. R. Eeeee, R. L. Tt-p, F. Ll, and . Ppppp-gggggggg, INSA de Lyon, tous droits réservés Bibliographie Privacy-preserving data aggregation in smart metering systems : an overview, these.pdf © [T. Antignac], [2015] Signal Processing Magazine, pp.75-86, 2013.

W. L. Philip, . Fff, A. Mohd, and Z. Zhen, A Privacy Preservation Model for Facebook-Style Social Network Systems, Lecture Notes in Computer Science, pp.303-320, 2009.

F. Jjj, The Future of Privacy Working report WP168. Joint contribution to the Consultation of the European Commission on the legal framework for the fundamental right to protection of personal data, déc, 2009.

F. Cédric, K. Markulf, D. George, and L. Zhengqin, ZQL : A Compiler for Privacy-preserving Data Processing, Proceedings of the 22Nd USENIX Conference on Security. SEC'13, pp.163-178, 2013.

G. Craig, Computing arbitrary functions of encrypted data, Communications of the ACM, vol.533, pp.97-105, 2010.

. German, Federal Constitutional C. Decision on national census 15.12, 1983.

G. Sébastien, K. Marc-olivier, M. Núñez-del, and P. , Show me how you move and I will tell you who you are, SPRINGL '10 : Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, pp.34-41, 2010.

G. Shafi, M. Silvio, and R. Charles, The knowledge complexity of interactive proof-systems, Proceedings of the seventeenth annual ACM symposium on Theory of computing. STOC '85, pp.291-304, 1985.

G. Ian, Privacy-enhancing technologies for the Internet, II : Five years later, Privacy Enhancing Technologies, pp.1-12, 2003.

G. Ian, G. Stefanos, L. Costos, and V. Sabrina-di, Privacy Enhancing Technologies for the Internet III : Ten Years Later In : Digital Privacy : Theory, Tech., and Practices, pp.3-18, 2007.

G. Mike, From LCF to HOL : a short history, Proof, Language, and Interaction, pp.169-186, 2000.

G. Glenn, No Place to Hide : Edward Snowden, the NSA, and the U, S

G. Werner, Lessons Learned, Cost/Schedule Assessment Guide, 1992.

G. Sada, T. Carmela, and D. Claudia, Engineering Privacy by Design . Presented at the Computers, Privacy & Data Protection conference, 2011.

G. Ian, W. David, and B. Eric, Privacy-enhancing technologies for the Internet, Compcon '97. Proceedings, IEEE, 1997.

H. Munawar, A Pattern language for developing privacy enhancing technologies, Software : Practice and Experience 43, pp.769-787, 2010.

H. Mireille and G. Serge, Profiling the European citizen, 2008.

H. Mireille, M. Bbb, M. Cc, G. Hhhhhhhhhhh, and . Metakides, The Dawn of a Critical Transparency Right for the Profiling Era In : Digital Enlightenment Yearbook 2012, 2012.

[. Jane, H. Stephen, and T. Mmmmmmmm, Regulating Cryptocurrencies in the United States : Current Issues and Future Directions, William Mitchell Law Review, vol.40, p.813, 2014.

H. Jaap-henk, C. English-de-nora, C. Frédéric, J. Sushil, A. Anas et al., Privacy Design Strategies In : ICT Systems Security and Privacy Protection. Sous la dir, 428. IFIP Advances in Information and Communication Technology, pp.446-459, 2014.

]. B. Hoh+06, M. Hhh, . Gg, X. Hui, and A. Aaaaa, Enhancing Security and Privacy in Traffic-Monitoring Systems, pp.38-46, 2006.

[. Usman, I. Samsung, and L. , An automated real-world privacy assessment of GPS tracking and profiling, Proceedings of the 2nd Workshop on Social Implications of National Security : From Dataveillance to Uberveillance, pp.225-240, 2007.

[. Iiiii and T. , Baromètre sur les français et le numérique, 2014.

J. Mohammad, P. W. Fff, S. Reihaneh, K. B. , N. Paul et al., Towards defining semantic foundations for purposebased privacy policies, Proceedings of the first ACM conference on Data and application security and privacy. CODASPY '11, pp.213-224, 2011.

J. Tobias, Privacy-preserving Smart Metering without a Trusted-third-party, pp.114-123, 2011.

J. Wiebren-de and J. Bart, Privacy-Friendly Electronic Traffic Pricing via Commits In : Formal Aspects in Security and Trust, pp.143-161, 2008.

J. Marek, J. Martin, and K. Florian, Plug-in privacy for smart metering billing " . In : Privacy Enhancing Technologies'11, pp.192-210, 2011.

J. Marek, K. Florian, and D. George, Privacy Technologies for Smart Grids -A Survey of Options, 2012.

K. Klaus, D. George, and K. Markulf, Privacy-friendly aggregation for the smart-grid " . In : Privacy-friendly aggregation for the smart-grid

K. Florian, Privacy-Preserving Computation (Position Paper) Presented at the Annual Privacy Forum conference, 2012.

K. Auguste, La cryptographie militaire, Journal des sciences militaries, 1883.

K. Antonio, L. Peter, M. Michael, P. Krzysztof, and P. Steffen, PEARs : Privacy Enhancing ARchitectures Privacy-Enhancing Technique : A Survey and Classification, Proceedings of the Annual Privacy forum. Greece, 2014. [Lan+08] Handbook of Research on Wireless Security. Sous la dir. d'Yan ZZZZ, Jun ZZZZ et Miao MM, 2008.

L. Marc, D. English-de-gregory, . Aa, B. Barry, and S. T. Steven, Privacy by Design ? Principles of Privacy-Aware Ubiquitous Systems Ubiquitous Computing. Sous la dir, Lecture Notes in Computer Science, pp.273-291, 2001.

L. Emiliano, D. Robert, . English, . B. Suzannek, S. Jordi et al., From Binary Trust to Graded Trust in Information Sources : A Logical Perspective In : Trust in Agent Societies, SSS. T. Lecture Notes in Computer Science, vol.5396, pp.205-225, 2008.

L. Michael, G. George, C. A. Gggggg, and G. Sanjam, Unified Architecture for Large-Scale Attested Metering, 40th annual Hawaii International Conference on System Sciences (HICSS'07, pp.115-124, 2007.

L. Chao, D. Yang, L. Gerome, M. Dan, and S. , A Theory of Pricing Private Data, Proceedings of the 16th International Conference on Database Theory. ICDT '13, pp.33-44, 2013.

L. Hsiao-ying, T. Wen-guey, S. Shiuan-tzuo, P. Bao-shuh, and . Lll, A practical smart metering system supporting privacy preserving billing and load monitoring, Applied Cryptography and Network Security, pp.544-560, 2012.

L. Zhan, R. B. Boris, F. Yves, and P. , Privacyfriendly Business Models for Location-based Mobile, J. Theor. Appl. Electron . Commer. Res, vol.6, issue.2, pp.90-107, 2011.

L. Jing, X. Yang, L. Shuhui, L. Wei, C. L. Philip et al., Cyber Security and Privacy Issues in Smart Grids, pp.981-997, 2012.

L. Fenjun, L. Bo, and L. Peng, Secure information aggregation for smart grids using homomorphic encryption, Smart Grid Communications (SmartGrid- Comm), 2010 First IEEE International Conference on, pp.327-332, 2010.

L. Ninghui, L. Tiancheng, and V. Suresh, t-Closeness : Privacy Beyond k-Anonymity and l-Diversity, ICDE'07, pp.106-115, 2007.

L. Daniel, D. Mmm-de-pierpaolo, G. Joshua, and M. T. Fabio, A Formal Privacy Management Framework In : Formal Aspects in Security and Trust. Sous la dir Lecture Notes in Computer Science. Inria Grenoble Rhône-Alpes 655 venue de l, Europe Montbonnot France, pp.162-176, 2009.

L. Daniel, G. Mmm-de-serge, Y. Ppppppp, D. Paul, and . Hhh, Privacy by Design : A Matter of Choice In : Data Protection in a Profiled World. Sous la dir, pp.323-334, 2010.

L. Daniel and . Mmm, Privacy by Design : A Formal Framework for the Analysis of Architectural Choices, Proceedings of the Third ACM Conference on Data and Application Security and Privacy. CODASPY '13, pp.95-104, 2013.

@. Loi-n, L. Thierry, S. Thierry, and P. Guilhem, du 6 janvier 1978 relative à l'informatique, aux fichiers et aux libertés Formal methods in safety-critical railway systems, Proceedings of SMBF 2007. Ouro Preto, pp.78-95, 1978.

M. Ashwin, K. Daniel, G. Johannes, and V. Muthuramakrishnan, l-diversity : Privacy beyond k-anonymity, In : ACM Transactions on Knowledge Discovery from Data (TKDD), vol.1, issue.1, p.3, 2007.

M. James, C. Michael, B. Brad, B. Jacques, D. Richard et al., Big data : The next frontier for innovation, competition, and productivity, 2011.

M. Andrés, S. Prashant, F. Kevin, C. Emmanuel, and I. David, Private memoirs of a smart meter, Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys '10, pp.61-66, 2010.

]. J. Mon76 and M. Donald, Mathematical Logic, 1976.

N. Nicolás, C. Alberto, L. Daniel, . Mmm, M. José et al., PRIPARE : Integrating Privacy Best Practices into a Privacy Engineering Methodology, 2015.

O. Andrew, Privacy, economics, and price discrimination on the Internet

[. Martin, O. Lex, S. Bill, and V. , Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Rapp. tech Programming in Scala, p.852, 1980.

P. Pascal, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, English. In : Advances in Cryptology ? EUROCRYPT '99. Sous la dir. de Jacques S. T. 1592. Lecture Notes in Computer Science, pp.223-238, 1999.

P. Siani and B. Azzedine, A Decision Support System for Design for Privacy " . In : Privacy and Identity Management for Life, LLLLLL et Ge ZZZZ. T. 352. IFIP Advances in Information and Communication Technology

[. Ada, P. , H. B. , and A. J. Bb, VPriv : Protecting Privacy in Location-Based Vehicular Services, Proceedings of the 18th USENIX Security Symposium, pp.335-350, 2009.

P. Ronald, A privacy-preserving concept for smart grids, Sicherheit in vernetzten Systemen, pp.1-14, 2010.

P. Andreas and H. Marit, A terminology for talking about privacy by data minimization : Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, p.34, 2010.

A. Richard and . Pppppp, Economic analysis of law, Little Brown et Company, 1973.

P. Raúl, S. Gerardo, and . English, A Formal Privacy Policy Framework for Social Networks In : Software Engineering and Formal Methods, Lecture Notes in Computer Science, pp.378-392, 2014.

P. Riccardo, Deductive Algorithmic Knowledge, p.405038, 2004.

O. Michael and . Rrrrr, How to exchange secrets by oblivious transfer, A, 1981. Rapp. tech, 1981.

R. L. Rrrrr, A. Len, L. Michael, and . Ddd, On data banks and privacy homomorphisms, Foundations of Secure Computation, pp.169-177, 1978.

R. Antoinette and B. Thomas, Gouvernementalité algorithmique et perspectives d'émancipation : le disparate comme condition d'individuation par la relation ? " In : RESEAUX 31, pp.163-196, 2013.

[. Hhhh and E. W. Records, Computers and the Rights of Citizens. Rapp. tech, 1973.

R. Alfredo and D. George, Privacy-Preserving Smart Metering, 2010.

R. Antoinette and P. Yves, The right to informational self-determination and the value of self-development : Reassessing the importance of privacy for democracy, pp.45-76, 2009.

K. Michael, . Rrrrrr, and D. R. Aviel, Crowds : Anonymity for Web Transactions, In : ACM Trans. Inf. Syst. Secur, vol.1, issue.1, pp.66-92, 1998.

P. [. Rrrr and . Ggggggggg, Anonymous connections and onion routing, Selected Areas in Communications, pp.482-494, 1998.

S. Christoph and B. David, Developing Security Protocols by Refinement, Proceedings of the 17th ACM Conference on Computer and Communications Security. CCS '10, pp.361-374, 2010.

S. Sarah, L. Faith, and C. , Engineering Privacy, IEEE Transactions on Software Engineering, vol.351, pp.67-82, 2009.

S. Markus, F. Eduardo, H. Duane, B. Frank, and S. Peter, Security Patterns : Integrating Security and Systems Engineering, 2005.

S. Bruce, Applied cryptography : protocols, algorithms, and source code in C, 2007.

S. Bruce, Applied Cryptography. 2 e éd, 1996.

S. Adi, How to share a secret, Communications of the ACM, vol.2211, pp.612-613, 1979.

J. Daniel and . Ssss, A taxonomy of privacy, University of Pennsylvania Law Review, pp.477-564, 2006.

S. Ian, Software engineering, 2011.

[. Xiaodong and S. , Athena : A New Efficient Automatic Checker for Security Protocol Analysis, Proceedings of the 12th IEEE Workshop on Computer Security Foundations. CSFW '99, p.192, 1999.

S. Dawn, P. Adrian, and P. Doantam, AGVI ? Automatic Generation, Verification, and Implementation of Security Protocols, Proceedings of 13th Conference on Computer Aided Verification (CAV), 2001.

S. Latanya, k-anonymity : A model for protecting privacy Fuzziness and Knowledge-Based Systems 10, International Journal of Uncertainty, pp.5-557, 2002.

T. Vinh-thong, A. Thibaud, . English, G. Joaquin, Z. Nur et al., Privacy by Design : On the Conformance Between Protocols and Architectures In : Foundations and Practice of Security, Lecture Notes in Computer Science, vol.8930, pp.65-81, 2015.

]. C. Tro+07, G. D. Tt, E. K. , and B. Ppppppp, PriPAYD : privacy friendly pay-as-you-drive insurance, Proc. of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007. Sous la dir. de Peng NNN et Ting YY, pp.99-107, 2007.

D. W. Samuel, D. Louis, and . Bbbbbbbb, Privacy Rights, Harvard law review, pp.193-220, 1890.
DOI : 10.4135/9781412952446.n484

F. Alan and . Www, Privacy and freedom, 1967.

C. Y. Andrew, Protocols for secure computations, SFCS '08. 23rd Annual Symposium on, pp.160-164, 1982.

Y. Ting, L. Ninghui, and A. I. Aaaaa, A Formal Semantics for P3P, Proceedings of the 2004 Workshop on Secure Web Service. SWS '04, pp.1-8, 2004.

Á. Gergely and C. Claude, I Have a DREAM ! (DiffeRentially privatE smArt Metering) . In : Information Hiding, Lecture Notes in Computer Science, pp.118-132, 2011.