L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, p.3, 2007.
DOI : 10.1145/1217299.1217302

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.
DOI : 10.1109/ICDE.2007.367856

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.824

A. Basu, A. Monreale, R. Trasarti, J. C. Corena, F. Giannotti et al., A Privacy Risk Model for Trajectory Data, Journal of Trust Management, vol.2, issue.1, pp.1-23, 2015.
DOI : 10.1007/978-3-662-43813-8_9

URL : https://hal.archives-ouvertes.fr/hal-01381683

A. Basu, T. Nakamura, S. Hidano, and S. Kiyomoto, k-anonymity: Risks and the Reality, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.983-989, 2015.
DOI : 10.1109/Trustcom.2015.473

C. Dwork, Differential Privacy, pp.1-12, 2006.
DOI : 10.1007/11787006_1

J. Vaidya and C. Clifton, Privacy preserving association rule mining in vertically partitioned data, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, pp.639-644, 2002.
DOI : 10.1145/775047.775142

J. Vaidya and C. Clifton, -means clustering over vertically partitioned data, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '03, pp.206-215, 2003.
DOI : 10.1145/956750.956776

URL : https://hal.archives-ouvertes.fr/hal-01056666

A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy preserving mining of association rules, Information Systems, vol.29, issue.4, pp.343-364, 2004.
DOI : 10.1016/j.is.2003.09.001

H. Polat and W. Du, Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data, Knowledge Discovery in Databases: PKDD 2005, pp.651-658, 2005.
DOI : 10.1007/11564126_69

H. Yu, X. Jiang, and J. Vaidya, Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.603-610, 2006.
DOI : 10.1145/1141277.1141415

URL : http://cimic.rutgers.edu/~jsvaidya/pub-papers/vaidyaSVM-sac06.pdf

S. Laur, H. Lipmaa, and T. Mielikäinen, Cryptographically private support vector machines, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, pp.618-624, 2006.
DOI : 10.1145/1150402.1150477

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.7425

A. Amirbekyan and V. Estivill-castro, Privacy Preserving DBSCAN for Vertically Partitioned Data, Intelligence and Security Informatics, pp.141-153, 2006.
DOI : 10.1007/11760146_13

A. Basu, J. Vaidya, H. Kikuchi, T. Dimitrakos, and S. K. Nair, Privacy preserving collaborative filtering for SaaS enabling PaaS clouds, Journal of Cloud Computing: Advances, Systems and Applications, vol.1, issue.1, pp.1-14, 2012.
DOI : 10.4156/ijact.vol3.issue4.10

URL : http://dx.doi.org/10.1186/2192-113X-1-8

Y. Murayama, N. Hikage, C. Hauser, B. Chakraborty, and N. Segawa, An Anshin Model for the Evaluation of the Sense of Security, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), pp.205-205, 2006.
DOI : 10.1109/HICSS.2006.46

M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson et al., Negotiating trust in the Web, IEEE Internet Computing, vol.6, issue.6, pp.30-37, 2002.
DOI : 10.1109/MIC.2002.1067734

A. J. Lee, M. Winslett, and K. J. Perano, TrustBuilder2: A Reconfigurable Framework for Trust Negotiation, In: Trust Management III, vol.6, issue.6, pp.176-195, 2009.
DOI : 10.1109/MIC.2002.1067734

S. Kiyomoto, T. Nakamura, H. Takasaki, R. Watanabe, and Y. Miyake, PPM: Privacy Policy Manager for Personalized Services, Security Engineering and Intelligence Informatics, pp.377-392, 2013.
DOI : 10.1007/978-3-642-40588-4_26

S. K. Datta, A. Gyrard, C. Bonnet, and K. Boudaoud, oneM2M Architecture Based User Centric IoT Application Development, 2015 3rd International Conference on Future Internet of Things and Cloud, pp.100-107, 2015.
DOI : 10.1109/FiCloud.2015.7

URL : https://hal.archives-ouvertes.fr/hal-01206791

T. A. Kosa, K. Ei-khatib, and S. Marsh, Measuring privacy, Journal of Internet Services and Information Security (JISIS), vol.1, issue.4, pp.60-73, 2011.

J. Lin, B. Liu, N. Sadeh, and J. I. Hong, Modeling users mobile app privacy preferences: Restoring usability in a sea of permission settings, Symposium On Usable Privacy and Security, pp.199-212, 2014.

A. Morton, ???All my mates have got it, so it must be okay???: Constructing a Richer Understanding of Privacy Concerns???An Exploratory Focus Group Study, pp.259-298, 2014.
DOI : 10.1007/978-94-007-7540-4_13

H. Wu, B. P. Knijnenburg, and A. Kobsa, Improving the prediction of users disclosure behavior by making them disclose more predictably? In: Symposium on Usable Privacy and Security (SOUPS), 2014.

N. Dwyer, A. Basu, and S. Marsh, Reflections on Measuring the Trust Empowerment Potential of a Digital Environment, Proceedings of the IFIP WG11.11 International Conference on Trust Management (IFIPTM), 2013.
DOI : 10.1007/978-3-642-38323-6_9

URL : https://hal.archives-ouvertes.fr/hal-01468736

T. L. Saaty, The analytic hierarchy process: planning, priority setting, resources allocation, 1980.

S. Marsh, Optimism and pessimism in trust, Proceedings of the Ibero-American Conference on Artificial Intelligence (IBERAMIA94), 1994.