S. Abiteboul and J. Stoyanovich, Plaidoyer pour une analyse " responsable " des données, Le Monde, 2015.

Y. Amsterdamer, Putting lipstick on pig, Proceedings of the VLDB Endowment, vol.5, issue.4, 2011.
DOI : 10.14778/2095686.2095693

V. Cortier and S. Kremer, Formal Models and Techniques for Analyzing Security Protocols: A Tutorial, Foundations and Trends?? in Programming Languages, vol.1, issue.3, p.2014
DOI : 10.1561/2500000001

URL : https://hal.archives-ouvertes.fr/hal-01090874

A. Datta, Abstract, Proceedings on Privacy Enhancing Technologies, vol.2015, issue.1, 2014.
DOI : 10.1515/popets-2015-0007

D. Deutch, Provenance-based analysis of data-centric processes, The VLDB Journal, vol.33, issue.3, p.2015
DOI : 10.1007/s00778-015-0390-5

C. Dwork, A firm foundation for privacy, CACM, 2011.

C. Dwork, Rank aggregation methods for the Web, Proceedings of the tenth international conference on World Wide Web , WWW '01, 2001.
DOI : 10.1145/371920.372165

C. Dwork, Fairness through awareness, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on, ITCS '12, 2012.
DOI : 10.1145/2090236.2090255

C. Dwork and A. Roth, The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science, 2014.

R. Fagin, Optimal aggregation algorithms for middleware, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '01, 2001.
DOI : 10.1145/375551.375567

M. Feldman, Certifying and Removing Disparate Impact, Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '15, 2015.
DOI : 10.1145/2783258.2783311

B. Friedman and H. Nissenbaum, Bias in computer systems, ACM Transactions on Information Systems, vol.14, issue.3, 1996.
DOI : 10.1145/230538.230561

S. Goldwasser, The knowledge complexity of interactive proof systems, SIAM J. Comput, vol.18, issue.1, 1989.

T. J. Green, Provenance semirings, Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '07, 2007.
DOI : 10.1145/1265530.1265535

T. J. Green, Provenance in ORCHESTRA, IEEE Data Eng. Bull, vol.33, issue.3, 2010.

M. Jacob, A system for management and analysis of preference data, Proceedings of the VLDB Endowment, vol.7, issue.12, p.2014
DOI : 10.14778/2732977.2732998

F. Kamiran, Discrimination Aware Decision Tree Learning, 2010 IEEE International Conference on Data Mining, 2010.
DOI : 10.1109/ICDM.2010.50

M. Lécuyer, XRay: Enhancing the web's transparency with differential correlation, USENIX, 2014.

J. Lerman, Big Data and Its Exclusions, SSRN Electronic Journal, vol.66, 2013.
DOI : 10.2139/ssrn.2293765

D. Pedreschi, Discrimination-aware data mining, Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 08, 2008.
DOI : 10.1145/1401890.1401959

J. Stoyanovich, Making interval-based clustering rank-aware, Proceedings of the 14th International Conference on Extending Database Technology, EDBT/ICDT '11, 2011.
DOI : 10.1145/1951365.1951417

L. Sweeney, Discrimination in online ad delivery, ACM Queue, vol.11, issue.3, p.2013