G. Aggarwal, M. Bawa, and P. Ganesan, Two can keep A secret: A distributed architecture for secure database services, CIDR, 2005.

S. D. Di-vimercati, R. F. Erbacher, and S. Foresti, Encryption and fragmentation for data confidentiality in the cloud, FOSAD, 2013.

S. Pearson and M. C. Mont, Sticky Policies: An Approach for Managing Privacy across Multiple Parties, Computer, vol.44, issue.9, 2011.
DOI : 10.1109/MC.2011.225

Y. Chen, P. A. Jamkhedkar, and R. B. Lee, A softwarehardware architecture for self-protecting data, CCS, 2012.

D. J. Weitzner, H. Abelson, and T. Berners-lee, Information accountability, Communications of the ACM, vol.51, issue.6, 2008.
DOI : 10.1145/1349026.1349043

D. Salomon, Data privacy and security: encryption and information hiding, 2003.
DOI : 10.1007/978-0-387-21707-9

J. Reed and B. C. Pierce, Distance makes the types grow stronger: a calculus for differential privacy, ICFP, 2010.

C. Fournet and M. Kohlweiss, ZQL: A compiler for privacypreserving data processing, USENIX Security, 2013.

B. Schneier, Applied cryptography -protocols, algorithms, and source code in C (2, 1996.

M. Naehrig, K. Lauter, and V. Vaikuntanathan, Can homomorphic encryption be practical?, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, 2011.
DOI : 10.1145/2046660.2046682

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.8007

J. W. Backus, Can Programming Be Liberated From the von Neumann Style? A Functional Style and its Algebra of Programs, Commun. ACM, vol.21, issue.8, 1978.

P. Chiusano and R. Bjarnason, Functional Programming in Scala, 2014.

P. Wadler, Comprehending monads, Proceedings of the 1990 ACM conference on LISP and functional programming , LFP '90, 1992.
DOI : 10.1145/91556.91592

B. C. Oliveira, A. Moors, and M. Odersky, Type classes as objects and implicits, OOPSLA, 2010.
DOI : 10.1145/1869459.1869489

URL : http://infoscience.epfl.ch/record/150280

S. D. Tetalli, M. Lesani, and R. Majumdar, MrCrypt: static analysis for secure cloud computations, OOPSLA, 2013.

G. Karjoth, M. Schunter, and M. Waidner, Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data, Privacy Enhancing Technologies, 2002.
DOI : 10.1007/3-540-36467-6_6

E. Yuan, N. Esfahani, and S. Malek, A Systematic Survey of Self-Protecting Software Systems, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4, 2014.
DOI : 10.1145/2555611

J. W. Holford, W. J. Caelli, and A. W. Rhodes, Using selfdefending objects to develop security aware applications in java, ACSC, 2004.