k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
-diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, p.3, 2007. ,
DOI : 10.1145/1217299.1217302
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
DOI : 10.1109/ICDE.2007.367856
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.824
A Privacy Risk Model for Trajectory Data, Journal of Trust Management, vol.2, issue.1, pp.1-23, 2015. ,
DOI : 10.1007/978-3-662-43813-8_9
URL : https://hal.archives-ouvertes.fr/hal-01381683
k-anonymity: Risks and the Reality, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.983-989, 2015. ,
DOI : 10.1109/Trustcom.2015.473
Differential Privacy, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Privacy preserving association rule mining in vertically partitioned data, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, pp.639-644, 2002. ,
DOI : 10.1145/775047.775142
-means clustering over vertically partitioned data, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '03, pp.206-215, 2003. ,
DOI : 10.1145/956750.956776
URL : https://hal.archives-ouvertes.fr/hal-01056666
Privacy preserving mining of association rules, Information Systems, vol.29, issue.4, pp.343-364, 2004. ,
DOI : 10.1016/j.is.2003.09.001
Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data, Knowledge Discovery in Databases: PKDD 2005, pp.651-658, 2005. ,
DOI : 10.1007/11564126_69
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.603-610, 2006. ,
DOI : 10.1145/1141277.1141415
URL : http://cimic.rutgers.edu/~jsvaidya/pub-papers/vaidyaSVM-sac06.pdf
Cryptographically private support vector machines, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, pp.618-624, 2006. ,
DOI : 10.1145/1150402.1150477
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.7425
Privacy Preserving DBSCAN for Vertically Partitioned Data, Intelligence and Security Informatics, pp.141-153, 2006. ,
DOI : 10.1007/11760146_13
Privacy preserving collaborative filtering for SaaS enabling PaaS clouds, Journal of Cloud Computing: Advances, Systems and Applications, vol.1, issue.1, pp.1-14, 2012. ,
DOI : 10.4156/ijact.vol3.issue4.10
URL : http://dx.doi.org/10.1186/2192-113X-1-8
An Anshin Model for the Evaluation of the Sense of Security, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), pp.205-205, 2006. ,
DOI : 10.1109/HICSS.2006.46
Negotiating trust in the Web, IEEE Internet Computing, vol.6, issue.6, pp.30-37, 2002. ,
DOI : 10.1109/MIC.2002.1067734
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation, In: Trust Management III, vol.6, issue.6, pp.176-195, 2009. ,
DOI : 10.1109/MIC.2002.1067734
PPM: Privacy Policy Manager for Personalized Services, Security Engineering and Intelligence Informatics, pp.377-392, 2013. ,
DOI : 10.1007/978-3-642-40588-4_26
oneM2M Architecture Based User Centric IoT Application Development, 2015 3rd International Conference on Future Internet of Things and Cloud, pp.100-107, 2015. ,
DOI : 10.1109/FiCloud.2015.7
URL : https://hal.archives-ouvertes.fr/hal-01206791
Measuring privacy, Journal of Internet Services and Information Security (JISIS), vol.1, issue.4, pp.60-73, 2011. ,
Modeling users mobile app privacy preferences: Restoring usability in a sea of permission settings, Symposium On Usable Privacy and Security, pp.199-212, 2014. ,
???All my mates have got it, so it must be okay???: Constructing a Richer Understanding of Privacy Concerns???An Exploratory Focus Group Study, pp.259-298, 2014. ,
DOI : 10.1007/978-94-007-7540-4_13
Improving the prediction of users disclosure behavior by making them disclose more predictably? In: Symposium on Usable Privacy and Security (SOUPS), 2014. ,
Reflections on Measuring the Trust Empowerment Potential of a Digital Environment, Proceedings of the IFIP WG11.11 International Conference on Trust Management (IFIPTM), 2013. ,
DOI : 10.1007/978-3-642-38323-6_9
URL : https://hal.archives-ouvertes.fr/hal-01468736
The analytic hierarchy process: planning, priority setting, resources allocation, 1980. ,
Optimism and pessimism in trust, Proceedings of the Ibero-American Conference on Artificial Intelligence (IBERAMIA94), 1994. ,