1. [1] M. Bellare and O. Goldreich, “On defining proofs of knowledge,” CRYPTO' 92, LNCS 740, pp.390-420, Springer, 1993. 10.1007/3-540-48071-4_28
2. [2] M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized trust management,” IEEE Symposium on Security and Privacy 1996, pp.164-173, IEEE, 1996. 10.1109/secpri.1996.502679
3. [3] D.F.C. Brewer and M.J. Nash, “The Chinese wall security policy,” IEEE Symposium on Security and Privacy 1989, pp.206-214, IEEE, 1989. 10.1109/secpri.1989.36295
4. [4] Bundesnetzagentur, “IT-Sicherheitskatalog gemäß Absatz 1a Energiewirtschaftsgesetz,” 2015.
5. [5] A. Cavoukian, “Privacy by design the 7 foundational principles,” 2011 https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf [last accessed 2017-07-16]