M. Gagan-aggarwal, P. Bawa, H. Ganesan, K. Garcia-molina, R. Kenthapadi et al., Two can keep A secret: A distributed architecture for secure database services, CIDR, pp.186-199, 2005.

J. W. Backus, Can programming be liberated from the von Neumann style?: a functional style and its algebra of programs, Communications of the ACM, vol.21, issue.8, pp.613-641, 1978.
DOI : 10.1145/359576.359579

P. Chiusano and R. Bjarnason, Functional Programming in Scala, 2014.

[. Chen, P. A. Jamkhedkar, and R. B. Lee, A software-hardware architecture for self-protecting data, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.14-27, 2012.
DOI : 10.1145/2382196.2382201

C. D. Bruno, A. Oliveira, M. Moors, and . Odersky, Type classes as objects and implicits, Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2010, pp.341-360, 2010.

S. De-capitani-di-vimercati, R. F. Erbacher, S. Foresti, S. Jajodia, G. Livraga et al., Encryption and Fragmentation for Data Confidentiality in the Cloud, Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp.212-243, 2013.
DOI : 10.1007/978-3-319-06320-1_4

C. Fournet, M. Kohlweiss, G. Danezis, and Z. Luo, Zql: A compiler for privacy-preserving data processing, USENIX Security, pp.163-178, 2013.

J. W. Holford, W. J. Caelli, and A. W. Rhodes, Using self-defending objects to develop security aware applications in java, ACSC, pp.341-349, 2004.

[. Karjoth, M. Schunter, and M. Waidner, Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data, Privacy Enhancing Technologies, pp.69-84, 2002.
DOI : 10.1007/3-540-36467-6_6

[. Nilsson, ScalaCheck: Property-based testing for Scala, 2007.

[. Naehrig, K. Lauter, and V. Vaikuntanathan, Can homomorphic encryption be practical?, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.113-124, 2011.
DOI : 10.1145/2046660.2046682

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.8007

M. Odersky, L. Spoon, and B. Venners, Programming in scala, Artima Inc, 2008.

S. Pearson and M. C. Mont, Sticky Policies: An Approach for Managing Privacy across Multiple Parties, Computer, vol.44, issue.9, pp.60-68, 2011.
DOI : 10.1109/MC.2011.225

J. Reed and B. C. Pierce, Distance makes the types grow stronger: a calculus for differential privacy, ICFP, pp.157-168, 2010.

D. Salomon, Data privacy and security: encryption and information hiding, 2003.
DOI : 10.1007/978-0-387-21707-9

M. Sai-deep-tetali, R. Lesani, T. Majumdar, and . Millstein, MrCrypt: static analysis for secure cloud computations, Proceedings of the 2013 ACM SIG- PLAN international conference on Object oriented programming systems languages & applications OOPSLA, pp.271-286, 2013.

J. Daniel, H. Weitzner, T. Abelson, J. Berners-lee, J. A. Feigenbaum et al., Information accountability, Commun. ACM, vol.51, issue.6, pp.82-87, 2008.

P. Wadler, Comprehending monads, Proceedings of the 1990 ACM conference on LISP and functional programming , LFP '90, pp.461-493, 1992.
DOI : 10.1145/91556.91592

P. Wadler, The essence of functional programming, Proceedings of the 19th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '92, pp.1-14, 1992.
DOI : 10.1145/143165.143169

[. Yuan, N. Esfahani, and S. Malek, A Systematic Survey of Self-Protecting Software Systems, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4, p.17, 2014.
DOI : 10.1145/2555611