Middleware: A Model for Distributed System Services, Commun. ACM, vol.39, issue.2, pp.86-98, 1996. ,
Privacy issues in knowledge discovery and data mining, Proc. of Australian Institute of Computer Ethics Conference (AICEC99, pp.89-99, 1999. ,
Resolution on Privacy by Design, 32nd International Conference of Data Protection and Privacy Commissioners, 2010. ,
DOI : 10.4018/978-1-61350-501-4.ch007
Personal Data: Thinking Inside the Box, 5th decennial Aarhus conferences, 2015. ,
DOI : 10.7146/aahcc.v1i1.21312
Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3, pp.1-2233, 2010. ,
DOI : 10.1145/1805974.1805978
Privacy-preserving data integration and sharing, Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery , DMKD '04, pp.19-26, 2004. ,
DOI : 10.1145/1008694.1008698
The design of AES-the Advanced Encryption Standard. Spring{\-}er-Ver{\-}lag, 2002. ,
Privacy and Data Protection by Design from policy to engineering, European Union Agency for Network and Information Security (ENISA). 1?79 pages, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01097119
openPDS: Protecting the Privacy of Metadata through SafeAnswers, PLoS ONE, vol.43, issue.7, p.98790, 2014. ,
DOI : 10.1371/journal.pone.0098790.g005
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering, vol.18, issue.2, pp.3-32, 2011. ,
DOI : 10.1007/s00766-010-0115-7
Smart Grid Privacy via Anonymization of Smart Metering Data, 2010 First IEEE International Conference on Smart Grid Communications, pp.238-243, 2010. ,
DOI : 10.1109/SMARTGRID.2010.5622050
A Survey of Homomorphic Encryption for Nonspecialists, EURASIP J. Inf. Secur, vol.15, pp.1-15, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00504233
Data Processing and Information Technology, 1996. ,
IoT Security Infographic Privacy, Authenticity, Confidentiality and Integrity of the Sensor Data. The Invisible Asset, 2015. ,
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592
TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks, Ad Hoc Networks, vol.5, issue.7, pp.1073-1089, 2007. ,
DOI : 10.1016/j.adhoc.2006.05.004
Inverse privacy, Communications of the ACM, vol.59, issue.7, 2014. ,
DOI : 10.1145/2838730
Privacy Design Strategies, ICT Systems Security and Privacy Protection IFIP Advances in Information and Communication Technology, pp.446-459, 2014. ,
DOI : 10.1007/978-3-642-55415-5_38
URL : https://hal.archives-ouvertes.fr/hal-01370395
The security development lifecycle: SDL, a process for developing demonstrably more secure software, 2006. ,
Data Retention and Privacy in Electronic Communications, IEEE Security & Privacy Magazine, vol.6, issue.5, pp.46-52, 2008. ,
DOI : 10.1109/MSP.2008.114
Traffic Monitoring and Analysis: Third International Workshop, Proceedings, pp.108-121, 2011. ,
Data gathering algorithms in sensor networks using energy metrics. Parallel and Distributed Systems, IEEE Transactions on, vol.13, issue.9, pp.924-935, 2002. ,
Learning from experience: privacy and the secondary use of data in health research, Journal of Health Services Research & Policy, vol.8, issue.1, pp.2-7, 2003. ,
DOI : 10.1258/135581903766468800
Distributed Clustering-Based Aggregation Algorithm for Spatial Correlated Sensor Networks, IEEE Sensors Journal, vol.11, issue.3, pp.641-648, 2011. ,
DOI : 10.1109/JSEN.2010.2056916
What does granularity mean in the context of a data warehouse and what are the various levels of granularity? information-management, 2002. ,
iPrivacy: A Distributed Approach to Privacy on the Cloud, International Journal on Advances in Security, vol.4, p.3, 2011. ,
The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey, IEEE Transactions on Emerging Topics in Computing, vol.3, issue.4, pp.585-598, 2015. ,
DOI : 10.1109/TETC.2015.2390034
End-to-End Privacy for Open Big Data Markets, IEEE Cloud Computing, vol.2, issue.4, pp.44-53, 2015. ,
DOI : 10.1109/MCC.2015.78
URL : http://arxiv.org/abs/1506.08865
Big Data Privacy in the Internet of Things Era, IT Professional, vol.17, issue.3, pp.32-39, 2015. ,
DOI : 10.1109/MITP.2015.34
Energy-Efficient Location and Activity-Aware On-Demand Mobile Distributed Sensing Platform for Sensing as a Service in IoT Clouds, IEEE Transactions on Computational Social Systems, vol.2, issue.4, pp.171-181, 2015. ,
DOI : 10.1109/TCSS.2016.2515844
Context Aware Computing for The Internet of Things: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.414-454, 2014. ,
DOI : 10.1109/SURV.2013.042313.00197
Preventing Memory Access Pattern Leakage in Searchable Encryption, iConference 2015 Proceedings. iSchools, 2015. ,
Data preparation for data mining, 1999. ,
Data-aggregation techniques in sensor networks: a survey, IEEE Communications Surveys & Tutorials, vol.8, issue.4, pp.48-63, 2006. ,
DOI : 10.1109/COMST.2006.283821
On the features and challenges of security and privacy in distributed internet of things, Computer Networks, vol.57, issue.10, pp.2266-2279, 2013. ,
DOI : 10.1016/j.comnet.2012.12.018
Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.67-82, 2009. ,
DOI : 10.1109/TSE.2008.88
HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities, 2015. ,
Adaptive Determination of Data Granularity for QoS-Constraint Data Gathering in Wireless Sensor Networks, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp.401-405, 2009. ,
DOI : 10.1109/UIC-ATC.2009.35
Privacy Assessments & Certifications Overview. Datasheets, 2016. ,