1. Ashley, P., Hada, S., Karjoth, G., Schunter, M.: E-p3p privacy policies and privacy authorization. In: Jajodia, S., Samarati, P. (eds.) WPES, pp. 103–109. ACM, New York (2002)
2. Lecture Notes in Computer Science;S. Benbernou,2007
3. Cheung, W., Gil, Y.: Towards privacy aware data analysis workflows for e-science. In: AAAI Workshop on Semantic e-Science 2007, pp. 22–26. AAAI Press, Menlo Park (2007)
4. Gil, Y., Fritz, C.: Reasoning about the appropriate use of private data through computational workflows. In: Spring Symposium on Intelligent Privacy Management. AAAI Press, Menlo Park (2010)
5. Juszczyk, L., Dustdar, S.: Script-based generation of dynamic testbeds for soa. In: ICWS, pp. 195–202. IEEE Computer Society, Los Alamitos (2010)