. Raisonner-sur-le-contexte-normatif-d, autres agents, inférant ainsi les normes auxquelles ils sont soumis et permettant d'´ evaluer plus finement les risques encourus lors de la transmission de données personnelles. De même, nous n'avons pas doté l'agent PAw des interfaces qui lui permettraient d'? etre un client effectif dans les différentes architectures applicatives que nous représentons. Le développement d'une plate-forme d'accueil telle que présentée dans la section 5.3, par exemple

. Malgré-leur-simplicité, ils mettent en oeuvre les concepts de conflits d'obligations, de protection locale et de protectionétendueprotectionétendue, permettant ainsi de mesurer l'intérêt de l'utilisation d'un agent de type

. Dans-ce-scénario, autorité normative self représente les préférences personnelles de l'utilisateur relativesàrelativesà ses données médicales. L'autorité hospital représente l'ensemble des réglementations qui régissent le fonctionnement d'unétablissementunétablissement de soins, dans lequel est admis l'utilisateur, différents ensembles de normes seront associés associésà ces autorités. 7.2.1.2 Acteurs Les acteurs suivant interviennent dans le scénario

. Bibliographie-[-acc-+-06-]-c, J. Ardagna, M. C. Camenisch, S. Mont, S. Clauss et al., An architecture for privacy-enhancing identity management, LAAS report, vol.05206, 2006.

A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

C. Adam, F. Evrard, B. Gaudou, A. Herzig, and D. Longin, Modélisation logique d'agents rationnels pour l'intelligence ambiante, Actes des 14èmes Journées Francophones des Systèmes Multiagents (JFSMA'06)

J. F. Allen, Towards a general theory of action and time, Artificial Intelligence, vol.23, issue.2, pp.123-154, 1984.
DOI : 10.1016/0004-3702(84)90008-0

R. Anderson, Trusted Computing " frequently asked questions, 2003.

. Aos and . Aos, Autonomous Decision-Making Software

G. Amato and U. Straccia, User Profile Modeling and Applications to Digital Libraries, Proceedings of the Third European Conference on Research and Advanced Technology for Digital Libraries (ECDL'99), number 1696 in LNCS, pp.184-197, 1999.
DOI : 10.1007/3-540-48155-9_13

+. Avdhr, . Thomasågotnesthomasågotnes, J. A. Wiebe-van-der-hoek, C. Rodríguez-aguilar, M. Sierra et al., On the logic of normative systems, Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI'07), 2007.

S. Baase, A Gift of Fire : Social, Legal, and Ethical Issues in Computing, 2003.

P. Balbiani, Constitution et développement d'une logique des modalités aléthiques, déontiques, dynamiques, et temporelles en vue de la formalisation du raisonnement sur les actions et sur les normes, Troisì emes journées francophones sur les modèles formels de l'interaction (MFI'05)Cépadù eséditions eséditions, 2005.

[. Burrows, M. Abadi, and R. Needham, A Logic of Authentication, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.426, issue.1871, pp.233-271, 1989.
DOI : 10.1098/rspa.1989.0125

J. Brunel, J. Bodeveix, and M. Filali, A State/Event Temporal Deontic Logic, Eighth International Workshop on Deontic Logic in Computer Science (DEON'06), number 4048, 2006.
DOI : 10.1007/11786849_9

E. Brickell, J. Camenisch, and L. Chen, Direct anonymous attestation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.132-145, 2004.
DOI : 10.1145/1030083.1030103

J. Broersen, M. Dastani, J. Hulstijn, Z. Huang, and L. Van-der-torre, The BOID architecture, Proceedings of the fifth international conference on Autonomous agents , AGENTS '01, pp.9-16, 2001.
DOI : 10.1145/375735.375766

[. Blackburn, Maarten de Rijke, and Yde Venema. Modal Logic, 2001.

D. Boneh and M. Franklin, Identity-based encryption from the weil pairing, LNCS, vol.2139, pp.213-229, 2001.

H. Rafael, J. F. Bordini, and . Hübner, Jason : A Java-based AgentSpeak interpreter used with SACI for multi-agent distribution over the net, 2006.

A. Bürkle, A. Hertel, W. Müller, and M. Wieser, Evaluating mobile agent platform security, Proceedings of the 4th German Conference on Multiagent System Technologies, pp.159-171, 2006.

M. Bouzeghoub and D. Kostadinov, Personnalisation de l'information : aperçu de l'´ etat de l'art et définition d'un modèle flexible de profils, Conférence en Recherche d'Information (CORIA), pp.201-218, 2005.

D. E. Bell and L. J. Lapadula, Secure computer systems : unified exposition and multics interpretation, 1976.

J. J. Borking, Privacy incorporated software agent (pisa) : proposal for building a privacy guardian for the electronic age In International Workshop on Design 227 BIBLIOGRAPHIE Issues in Anonymity and Unobservability Seeing to it that : a canonical form for agentives, LNCS Theoria, vol.54, pp.130-140175, 1988.

E. Michael and . Bratman, Intentions, plans and practical reason, 1987.

G. Boella, L. Van-der-torre, and H. Verhagen, Introduction to normative multiagent systems, Computational & Mathematical Organization Theory, vol.60, issue.1\slash2, pp.71-79, 2006.
DOI : 10.1007/s10588-006-9537-7

J. Béziau, S5 is a paraconsistent logic and so is first-order classical logic, Logical Studies, vol.9, 2002.

J. Béziau, [CA07] Richard Cissée and Sahin Albayrak. An agent-based approach for privacypreserving recommender systems Trust mediation in knowledge management and sharing, Proceedings of the 6th International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS'07) Proceedings of the Second International Conference on Trust Management, pp.1-8, 2004.

L. Cholvy and F. Cuppens, Analyzing consistency of security policies, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997.
DOI : 10.1109/SECPRI.1997.601324

L. Cholvy and F. Cuppens, Reasoning about norms provided by conflicting regulations [CDA99] Ibrahim Cingil, Asuman Dogac, and Ayca Azgin. A broader approach to personalization [CF98] Cristiano Castelfranchi and Rino Falcone. Principles of trust for multi-agent systems : Cognitive anatomy, social importance, and quantification, Norms, Logics and Information Systems : New Studies in Deontic Logic and Computer Science Proceedings of the Third International Conference of Multi-Agent Systems (ICMAS'98), pp.247-264, 1998.

F. Brian and . Chellas, Modal Logic, an Introduction, 1980.

R. M. Chisholm, Contrary-To-Duty Imperatives and Deontic Logic, Analysis, vol.24, issue.2, pp.33-36, 1963.
DOI : 10.1093/analys/24.2.33

G. Chicoisne, Dialogue entre agents naturels et agents artificiels Une application aux communautés virtuelles, 2004.

L. Cholvy, Checking regulation consistency by using SOL-resolution, Proceedings of the seventh international conference on Artificial intelligence and law , ICAIL '99, pp.73-79, 1999.
DOI : 10.1145/323706.323717

J. Carmo and A. J. Jones, Deontic database constraints and the characterisation of recovery, Second international workshop on deontic logic in computer science (DEON'94), pp.56-85, 1994.

R. Philip, H. J. Cohen, and . Levesque, Intention is choice with commitment, Artificial Intelligence, vol.42, issue.2-3, pp.213-261, 1990.

A. Michael, D. Covington, A. Nute, and . Vellino, Prolog Programming in Depth, 1997.

S. Marco-casassa-mont, P. Pearson, and . Bramhall, Towards accountable management of identity and privacy : Sticky policies and enforceable tracing services, HP Laboratories Bristol, 2003.

[. Crépin, G. Piolle, O. Boissier, and Y. Demazeau, Des systèmes normatifs comme outils de protection de la vie privée, Intelligence Artificielle et Web Intelligence (IAWI'07), 2007.

L. Cholvy and S. Roussel, Raisonner avec une réglementation in-compì ete : le cas d'une politique d'´ echange d'informations, 16e congrès francophone AFRIF-AFIA sur la Reconnaissance de Formes et l'Intelligence Artificielle (RFIA'08), 2008.

[. Cuppens, A logical analysis of authorized and prohibited information flows, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp.100-109, 1993.
DOI : 10.1109/RISP.1993.287639

L. Cvj-+-08-]-ludivine-crépin, F. Vercouter, Y. Jacquenet, O. Demazeau, and . Boissier, Hippocratic multi-agent systems, Proceedings of the International Conference on Enterprise Information Systems (ICEIS'08), pp.301-307, 2008.

Y. Deswarte and C. Aguilar-melchor, Technologies Actuelles et Futures Pour la Protection de la Vie Priv??e sur Internet, annals of telecommunications - annales des t??l??communications, vol.1514, issue.1, pp.399-417, 2006.
DOI : 10.1007/BF03219914

V. Broersen, J. Dignum, and . Meyer, Meeting the deadline : Why, when and how, Third International Workshop on Formal Approaches to Agent-Based Systems number 3228 in LNCS, pp.30-40, 2004.

G. Danezis, R. Dingledine, and N. Mathewson, Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.2-15, 2003.
DOI : 10.1109/SECPRI.2003.1199323

R. Demolombe, Reasoning About Trust: A Formal Logical Framework, 2nd international conference on trust management, pp.291-303, 2004.
DOI : 10.1007/978-3-540-24747-0_22

R. Demolombe, Formalisation de l'obligation de faire avec délais, Troisì emes journées francophones des modèles formels de l'interaction (MFI'05), 2005.

M. Desjardins, E. Eaton, and K. L. Wagstaff, Learning user preferences for sets of objects, Proceedings of the 23rd international conference on Machine learning , ICML '06, pp.273-280, 2006.
DOI : 10.1145/1143844.1143879

D. Inverno, M. Kinny, M. Luck, and . Wooldridge, A formal specification of dMars, Intelligent Agents IV : Proceedings of the Fourth International Workshop on Agent Theories, Architectures and Languages (ATAL'97), number 1365 in LNAI, 1997.

I. Degirmenciyan and F. Marc, Des objets aux agents : JACK et ses applications en aéronautique, OFTA -groupe Systèmes Multi-Agents, 2002.

I. Dickinson, D. Reynolds, D. Banks, S. Cayzer, and P. L. Vora, User Profiling with Privacy: A Framework for Adaptive Information Agents, Intelligent Information Agents -The AgentLink Perspective, pp.123-151, 2003.
DOI : 10.1007/3-540-36561-3_6

M. Desjardins and K. L. Wagstaff, DD-PREF : a language for expressing preferences over sets, Proceedings of the 20th National Conference on Artificial Intelligence, JPL TRS 1992+, 2005.

M. Esteva, J. Antonio-rodríguez-aguilar, C. Sierra, P. Garcia, and J. Arcos, On the formal specification of electronic institutions Agent-mediated Electronic Commerce (The European AgentLink Perspective), LNCS, pp.126-147, 1991.

M. Esteva, J. Antonio-rodríguez-aguilar, C. Sierra, and W. Vasconcelos, Verifying norm consistency in electronic institutions, Proceedings of the AAAI-04 Workshop on Agent Organizations : Theory and Practice, pp.8-14, 2004.
DOI : 10.1007/978-3-540-28645-5_50

[. Esteva, B. Rosell, J. Antonio-rodríguez-aguilar, and J. Arcos, Ameli : An agent-based middleware for electronic institutions, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'04), pp.236-243, 2004.

M. Esteva, W. Vasconcelos, C. Sierra, and J. , Norm Consistency in Electronic Institutions, Proceedings of the XVII Brazilian Symposium on Artificial Intelligence, pp.494-505, 2004.
DOI : 10.1007/978-3-540-28645-5_50

J. Ferber, Les systèmes multi-agents, vers une intelligence collective. Inter- Editions, 1995.

J. Ferber and O. Gutknecht, A meta-model for the analysis and design of organizations in multi-agent systems, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160), 1998.
DOI : 10.1109/ICMAS.1998.699041

D. Ferraiolo and R. Kuhn, Role-based access controls, Proceedings of 15th NIST-NCSC National Computer Security Conference, pp.554-563, 1992.

J. Michael, R. Freedman, and . Morris, Tarzan : A peer-to-peer anonymizing network layer, Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02), pp.193-206, 2002.

[. Galliers, The positive role of conflict in cooperative multi-agents systems, Decentralized A.I., Proceedings of the first international workshop on Modeling Agents in a Multi-Agent World (MAMAW'89), pp.33-46, 1990.

[. García-camino, P. Noriega, and J. , Implementing norms in electronic institutions, Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems , AAMAS '05, pp.667-673, 2005.
DOI : 10.1145/1082473.1082575

P. Michael, A. L. Georgeff, and . Lansky, Reactive reasoning and planning, Proceedings of the Sixth National Conference on Artificial Intelligence (AAAI'87), 1987.

J. I. Glasgow, G. H. Macewen, and P. Panangaden, A logic for reasoning about security, Computer security foundations workshop, pp.2-13, 1990.
DOI : 10.1145/146937.146940

T. Grandison and M. Sloman, Specifying and Analysing Trust for Internet Applications, Proceedings of the Second IFIP Conference on e-Commerce, e- Business and e-Government, 2002.
DOI : 10.1007/978-0-387-35617-4_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.7819

S. Gauch, M. Speretta, A. Chandramouli, and A. Micarelli, User profiles for personalized information access. The Adaptive Web, LNCS, vol.4321, pp.54-89, 2007.
DOI : 10.1007/978-3-540-72079-9_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.458.465

[. Gutknecht, Propositions d'un modèle organisationnel générique de systèmes multi-agents Semantics for more plausible deontic logics, DEON'02, 2001.

J. Fred-hübner, J. Sim-ao-sichman, and O. Boissier, Moise+ : towards a structural, functional, and deontic model for mas organization, Proceedings of the first international joint conference on Autonomous agents and multiagent systems : part 1, pp.501-502, 2002.

F. John, N. D. Horty, and J. Belnap, The deliberative stit : a study of action, omission, ability, and obligation, Journal of Philosophical Logic, vol.24, pp.583-644, 1995.

[. Haradji, N. Ferrand, and H. Li, Systèmes Multi-Agents, chapter Relationsàlationsà l'Utilisateur et Nouveaux Usages, pp.215-260, 2004.

J. Hintikka, Knowledge and Belief, 1962.

A. Herzig and D. Longin, C&L intention revisited, Proceedings of the Ninth International Conference on Principles of Knowledge Representation and Reasoning, pp.527-535, 2004.

F. John and . Horty, An alternative stit operator, 1989.

[. Ioannidis and G. Koutrika, Personalized systems : models and methods from an IR and DB perspective, Proceedings of the 31st international conference on Very large data bases (VLDB '05), pp.1365-1365, 2005.

[. Iec, Information technology -security techniques -evaluation criteria for it security, part 2 : Security functional requirements, International Organization for Standardization, 1999.

[. Jiang and J. A. Landay, Modeling privacy control in context-aware systems, IEEE Pervasive Computing, vol.1, issue.3, pp.59-63, 2002.
DOI : 10.1109/MPRV.2002.1037723

J. I. Andrew, M. J. Jones, and . Sergot, Formal specifications of security requirements using the theory of normative positions, European Symposium on Research in Computer Security (ESORICS 92), number 648 in LNCS, pp.103-121, 1992.

J. I. Andrew, M. J. Jones, and . Sergot, Deontic Logic in Computer Science : Normative System Specification., chapter On the Characterisation of Law and Computer Systems : The Normative Systems Perspective, pp.275-307, 1993.

S. Kanger, Provability in Logic, Almqvist & Wiksell, 1957.

S. Kanger, Deontic Logic, chapter New foundations for ethical theory, pp.36-58, 1971.
DOI : 10.1007/978-94-010-3146-2_2

A. Kobsa, Privacy-enhanced personalization, Communications of the ACM, vol.50, issue.8, pp.24-33, 2007.
DOI : 10.1145/1278201.1278202

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.664.8113

G. K. Kraetzschmar, Distributed Reason Maintenance for Multiagent Systems, LNCS, vol.1229, 1997.
DOI : 10.1007/3-540-63606-4

. Saul-aaron-kripke, A completeness theorem in modal logic, The Journal of Symbolic Logic, vol.XIV, issue.01, pp.1-14, 1959.
DOI : 10.2307/2964568

. Saul-aaron-kripke, Semantic analysis of modal logic I, normal propositional calculi, Zeitshcrift für mathemathische Logik und Grundlagen der Mathematik, pp.67-96, 1963.

. Saul-aaron-kripke, Semantical considerations on modal logic, Acta Philosophica Fennica, vol.16, pp.83-94, 1963.

A. Robert, M. J. Kowalski, and . Sergot, A logic-based calculus of events, New Generation Computing, vol.4, pp.67-95, 1986.

G. Karjoth and M. Schunter, A privacy policy model for enterprises, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 2002.
DOI : 10.1109/CSFW.2002.1021821

M. J. Kollingbaum, W. W. Vasconcelos, N. Timothy, J. García-camino, and A. , Conflict Resolution in Norm-Regulated Environments Via Unification and Constraints, Declarative Agent Language and Technologies number 4897, 2007.
DOI : 10.1007/978-3-540-77564-5_10

E. J. Lemmon, Moral Dilemmas, The Philosophical Review, vol.71, issue.2, pp.139-158, 1962.
DOI : 10.2307/2182983

Y. Li and Y. Yao, User Profile Model: A View from Artificial Intelligence, Proceedings of the Third International Conference on Rough Sets and Current Trends in Computing (TSCTC '02), pp.493-496, 2002.
DOI : 10.1007/3-540-45813-1_65

[. Ribas, Towards legal programming : Some legal problems of agent-based mobile commerce (legal issues of e-commerce oriented intelligent agents) European Project Grocer

[. Ribas, Systèmes multi-agents et loi, OFTA -groupe Systèmes Multi-Agents, 2003.

V. Drew and . Mcdermott, A temporal logic for reasoning about processes and plans, Cognitive Science, vol.6, pp.101-155, 1982.

M. John, P. J. Mccarthy, and . Hayes, Some philosophical problems from the standpoint of artificial intelligence, Machine Intelligence, vol.4, pp.463-502, 1969.

B. Montaner, J. Lopez, and R. Lluis-de-la, A taxonomy of recommender agents on the internet, Artificial Intelligence Review, vol.19, issue.4, pp.285-330, 2003.
DOI : 10.1023/A:1022850703159

P. Morris and J. A. Mcdermid, Database Security, VI : Status and Prospects , chapter Formalising and Validating Complex Security Requirements, pp.113-124, 1992.

[. Manna and A. Pnueli, Verification of concurrent programs: Temporal proof principles, Proceedings of the Workshop on Logics of Programs, number 131 in LNCS, pp.200-252, 1981.
DOI : 10.1007/BFb0025785

J. Meyer and R. J. Wieringa, Deontic logic in computer science : normative system specification, 1993.

G. Müller, Introduction of privacy and security in highly dynamic systems, Communications of the ACM, vol.49, issue.9, pp.1013-1022, 2006.

[. Nguyen, N. Denos, and C. Berrut, Cartes de communautés pour l'adaptation interactive de profils dans un système de filtrage d'information, Actes du XXIIIème Congrès INFORSID, pp.253-268, 2005.

D. Nute, Defeasible Deontic Logic : Essays in Nonmonotonic Normative Reasoning , chapter Apparent obligation, pp.287-316, 1997.
DOI : 10.1007/978-94-015-8851-5

D. Nute, Defeasible Logic, Web Knowledge Management and Decision Support : 14th International Conference on Applications of Prolog number 2543 in LNCS, pp.151-169, 2001.
DOI : 10.1007/3-540-36524-9_13

N. Oren, M. Luck, S. Miles, and T. J. Norman, An argumentation inspired heuristic for resolving normative conflict, Fifth Workshop on Coordination , Organizations, Institutions and Norms in Agent Systems (COIN'08), 2008.

R. Ortalo, Using deontic logic for security policy specification, LAAS report LAAS-CNRS, vol.96380, 1996.

G. Piolle and Y. Demazeau, Addressing temporal aspects of privacyrelated norms, 18th European Conference on Artificial Intelligence (ECAI'08), 2008.
URL : https://hal.archives-ouvertes.fr/inria-00423802

G. Piolle and Y. Demazeau, Obligations with Deadlines and Maintained Interdictions in Privacy Regulation Frameworks, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp.162-168, 2008.
DOI : 10.1109/WIIAT.2008.168

URL : https://hal.archives-ouvertes.fr/inria-00423807

G. Piolle and Y. Demazeau, Une logique pour raisonner sur la protection des données personnelles, 16e congrès francophone AFRIF-AFIA sur la Reconnaissance de Formes et l'Intelligence Artificielle (RFIA'08), 2008.

G. Piolle, Y. Demazeau, and J. Caelen, Privacy management in usercentred multi-agent systems, Proceedings of the 7th Annual International Workshop on Engineering Societies in the Agents World (ESAW'06), pp.354-367, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00423731

S. Pearson, Trusted agents that enhance user privacy by self-profiling, AAMAS-02 Workshop on Deception, Fraud and Trust in Agent Societies, pp.113-121, 2002.

S. Pearson, Trusted Computing Platforms : TCPA Technology in Context, 2002.

S. Pearson, Trusted computing platforms, the next security solution, 2002.

S. Pearson, Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy, Proceedings of the Third International Conference on Trust Management, pp.305-320, 2005.
DOI : 10.1007/11429760_21

G. Piolle, Les systèmes multi-agents normatifs : organisations, institutions et normes, Colloque pluridisciplinaire Ordre et Désordre, 2008.

A. Pnueli, The temporal logic of programs, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.46-57, 1977.
DOI : 10.1109/SFCS.1977.32

A. Norman and P. , Time and modality, 1957.

A. Priest and K. Tanaka, Past, present and future Paraconsistent logic, 1967.

S. Anand and . Rao, AgentSpeak(L) : BDI agents speak out in a logical computable language, Seventh European Workshop on Modelling Autonomous Agents in a Multi-Agent World, 1996.

S. Riché and G. Brebner, Storing and Accessing User Context, 4th International Conference on Mobile Data Management, pp.1-12, 2003.
DOI : 10.1007/3-540-36389-0_1

S. Riché, G. Brebner, and M. Gittler, Client-side profile storage The complexity of the temporal logic with until over general linear time, NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing, pp.127-133393, 2002.

R. Linn-rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Trusted computing : Concepts [Rya06b] Mark Dermot Ryan. Trusted computing : Tcg proposals Loi numéro 78-17 du 6 janvier 1978 relativè a l'informatique, aux fichiers et aux libertés, Code civil, 1803. [Ré78] République française Journal Officiel de la République Française Journal Officiel de la République Française, pp.120-126, 1978.

N. Silvia, A. Schiaffino, and . Amandi, User profiling with case-based reasoning and bayesian networks, Open Discussion Track Proceedings of the International Joint Conference, 7th Ibero-American Conference on AI, 15th Brazilian Symposium on AI (IBERAMIA- SBIA 2000), pp.12-21, 2000.

H. Sahlqvist, Completeness and Correspondence in the First and Second Order Semantics for Modal Logic, Proceedings of the Third Scandinavian Logic Symposium, 1975.
DOI : 10.1016/S0049-237X(08)70728-6

M. [. Subirana and . Bain, Legal programming, Communications of the ACM, vol.49, issue.9, 2005.
DOI : 10.1145/1151030.1151056

[. Segerberg, Some Meinong/Chisholm thesis. Logic, Law, Morality. A festrichft in honor of LennartÅqvistLennartÅqvist, pp.67-77, 2003.

A. Seilles, Modèles et outils de raisonnement argumentatif dans les communautés et organisations virtuelles, 2007.

Y. Shoham, Agent-oriented programming, Artificial Intelligence, vol.60, issue.1, pp.51-92, 1993.
DOI : 10.1016/0004-3702(93)90034-9

S. Shearin and H. Lieberman, Intelligent profiling by example, Proceedings of the 6th international conference on Intelligent user interfaces , IUI '01, pp.145-151, 2001.
DOI : 10.1145/359784.360325

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.9962

[. Sierra and P. Noriega, Institucions electròniques, Primer Congrès Cataì a d'Intelligència Artificial, 1998.

[. Smyth, M. D. Ryan, and L. Chen, Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators, Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS'07), pp.218-231, 2007.
DOI : 10.1007/978-3-540-73275-4_16

[. Stratulat, Systèmes d'agents normatifs : concepts et outils logiques, 2002.

L. Tamine and W. Bahsoun, Définition d'un profil multidimensionnel de l'utilisateur : vers une technique basée sur l'interaction entre dimensions, COnférence en Rechercherche d'Information et Applications (CORIA), pp.225-236, 2006.

J. J. Thomson, The right to privacy, Philosophy and Public Affairs, vol.4, pp.295-314, 1975.
DOI : 10.1017/CBO9780511625138.012

R. Tuomela, The Importance of Us : A Philosophical Study of Basic Social Norms, 1995.

W. N. Leendert and . Van-der-torre, Violated obligations in a defeasible deontic logic, Proceedings of the 11th European Conference on Artificial Intelligence, pp.371-3751, 1951.

D. Samuel, L. D. Warren, and . Brandeis, Privacy Rights, Harvard Law Review, vol.4, pp.193-195, 1890.
DOI : 10.4135/9781412952446.n484

D. Wagner and D. Dean, Intrusion detection via static analysis, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.156-168, 2001.
DOI : 10.1109/SECPRI.2001.924296

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.5910

A. F. Westin, Privacy and freedom, 1967.

[. Sahlqvist, In Wikimedia Foundation, Inc., editor, Wikipédia, l'encyclopédie libre, 2007.

. Sémantique-de-kripke, In Wikimedia Foundation, Inc., editor, Wikipédia, l'encyclopédie libre, 2007.

M. Wooldridge, Introduction to Multiagent Systems, chapter Logics for Multiagent Systems, pp.267-302, 2001.

M. Wooldridge, Introduction to Multiagent Systems, chapter Reaching agreements, pp.129-162, 2001.

M. Yung, Trusted Computing Platforms: The Good, the Bad, and the Ugly
DOI : 10.1007/978-3-540-45126-6_18