My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data, Proc. of Privacy Technologies and Policy, ser, pp.154-171, 2014. ,
DOI : 10.1007/978-3-319-06749-0_11
C3P: Context-Aware Crowdsourced Cloud Privacy, Proc. of Privacy Enhancing Technologies, ser, pp.102-122, 2014. ,
DOI : 10.1007/978-3-319-08506-7_6
Awareness of behavioral tracking and information privacy concern in facebook and google, Proc. of Symposium on Usable Privacy and Security (SOUPS), 2014. ,
A Survey of Mobile Cloud Computing Application Models, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.393-413, 2014. ,
DOI : 10.1109/SURV.2013.062613.00160
A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case, 2013 IEEE International Congress on Big Data, 2013. ,
DOI : 10.1109/BigData.Congress.2013.13
URL : https://hal.archives-ouvertes.fr/hal-01339203
A survey of the research on future internet architectures, IEEE Communications Magazine, vol.49, issue.7, pp.26-36, 2011. ,
DOI : 10.1109/MCOM.2011.5936152
XIA, Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets '11, 2011. ,
DOI : 10.1145/2070562.2070564
A brief overview of the NEBULA future internet architecture, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, pp.81-86, 2014. ,
DOI : 10.1145/2656877.2656889
Greening the internet with nano data centers, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, 2009. ,
DOI : 10.1145/1658939.1658944
From Microprocessors to Nanostores: Rethinking Data-Centric Systems, Computer, vol.44, issue.1, pp.39-48, 2011. ,
DOI : 10.1109/MC.2011.18
Energy Consumption Comparison of Nano and Centralized Data Centers, Proc. of Greenmetrics, 2014. ,
Beyond The Clouds, How Should Next Generation Utility Computing Infrastructures Be Designed, Cloud Computing: Challenges, Limitations and R&D Solutions, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01067888
Finding your Way in the Fog, ACM SIGCOMM Computer Communication Review, vol.44, issue.5, pp.27-32, 2014. ,
DOI : 10.1145/2677046.2677052
Energy- and Cost-Efficiency Analysis of ARM-Based Clusters, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), 2012. ,
DOI : 10.1109/CCGrid.2012.84
The Glasgow Raspberry Pi Cloud: A Scale Model for Cloud Computing Infrastructures, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, 2013. ,
DOI : 10.1109/ICDCSW.2013.25
MobilityFirst, ACM SIGMOBILE Mobile Computing and Communications Review, vol.16, issue.3, pp.2-13, 2012. ,
DOI : 10.1145/2412096.2412098
Social Cloud: Cloud Computing in Social Networks, 2010 IEEE 3rd International Conference on Cloud Computing, pp.99-106, 2010. ,
DOI : 10.1109/CLOUD.2010.28
Trustworthy Distributed Computing on Social Networks, IEEE Transactions on Services Computing, vol.7, issue.3, pp.333-345, 2014. ,
DOI : 10.1109/TSC.2013.56
Virtual Organization Support within a Grid-Wide Operating System, IEEE Internet Computing, vol.12, issue.2, pp.20-28, 2008. ,
DOI : 10.1109/MIC.2008.47
URL : https://hal.archives-ouvertes.fr/hal-01271144
DepSky, ACM Transactions on Storage, vol.9, issue.4, pp.1-1233, 2013. ,
DOI : 10.1145/2535929
Shredding your garbage: Reducing data lifetime through secure deallocation, Proc. of 14th USENIX Security Symposium, 2005. ,
"Little brothers watching you", Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, 2013. ,
DOI : 10.1145/2501604.2501616
The OAuth 2.0 Authorization Framework, IETF RFC, vol.6749, 2012. ,
DOI : 10.17487/rfc6749
Application Bridging for Federated Access Beyond Web (ABFAB) Architecture, 2014. ,
DOI : 10.17487/RFC7831
Oblivious transfer with access control, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009. ,
DOI : 10.1145/1653662.1653679
Differential Privacy, Proc. of 33rd ICALP conference, ser. LNCS, 2006. ,
DOI : 10.1007/11787006_1
Computing arbitrary functions of encrypted data, Communications of the ACM, vol.53, issue.3, pp.97-105, 2010. ,
DOI : 10.1145/1666420.1666444
Cloud security, Communications of the ACM, vol.57, issue.5, pp.70-79, 2014. ,
DOI : 10.1145/2593686