C. Jensen, C. Potts, and C. Jensen, Privacy practices of Internet users: Self-reports versus observed behavior, International Journal of Human-Computer Studies, vol.63, issue.1-2, pp.203-227, 2005.
DOI : 10.1016/j.ijhcs.2005.04.019

L. F. Cranor, P. Guduru, and M. Arjula, User interfaces for privacy agents, ACM Transactions on Computer-Human Interaction, vol.13, issue.2, pp.135-178, 2006.
DOI : 10.1145/1165734.1165735

J. Camenisch, A. Shelat, D. Sommer, S. Fischer-hübner, M. Hansen et al., Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005.
DOI : 10.1145/1102486.1102491

S. E. Levy and C. Gutwin, Improving understanding of website privacy policies with fine-grained policy anchors, Proceedings of the 14th international conference on World Wide Web , WWW '05, pp.480-488, 2005.
DOI : 10.1145/1060745.1060816

I. A. Tøndel, ?. A. Nyre, and K. Bernsmed, Learning Privacy Preferences, 2011 Sixth International Conference on Availability, Reliability and Security, 2011.
DOI : 10.1109/ARES.2011.96

B. Berendt, O. Günther, and S. Spiekermann, Privacy in e-commerce, Communications of the ACM, vol.48, issue.4, pp.101-106, 2005.
DOI : 10.1145/1053291.1053295

S. A. Bagüés, L. A. Surutusa, M. Arias, C. Fernández-valdivelso, and I. R. Matías, Personal privacy management for common users, International Journal of Smart Home, vol.3, issue.2, pp.89-106, 2009.

S. Trabelsi, Second release of the policy engine Prime Life, OASIS eXtensible Access Control Markup Language (XACML), 2010.

J. L. Kolodner, An introduction to case-based reasoning, Artificial Intelligence Review, vol.13, issue.4, pp.3-34, 1992.
DOI : 10.1007/BF00155578

A. Aamodt and E. Plaza, Case-based reasoning: Foundational issues, methodological variations, and system approaches, AI Communications, vol.7, issue.1, pp.39-59, 1994.

T. Bozkaya and M. Ozsoyoglu, Distance-based indexing for high-dimensional metric spaces, ACM SIGMOD Record, vol.26, issue.2, pp.357-368, 1997.
DOI : 10.1145/253262.253345

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.1037

D. C. Hankerson, G. Hoffman, D. A. Leonard, C. C. Lindner, K. T. Phelps et al., Coding Theory and Cryptography: The Essentials, 2000.

A. Arasu, V. Ganti, and R. Kaushik, Efficient exact set-similarity joins, Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB)

A. Bernstein, E. Kaufmann, C. Bürki, and M. Klein, How Similar Is It? Towards Personalized Similarity Measures in Ontologies, pp.1347-1366, 2005.
DOI : 10.1007/3-7908-1624-8_71

A. I. Anton, J. B. Earp, and J. D. Young, How internet users' privacy concerns have evolved since 2002, IEEE Security & Privacy Magazine, vol.8, issue.1, pp.21-27, 2010.
DOI : 10.1109/MSP.2010.38

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.585.7127

S. Fischer-hübner, E. Wästlund, and H. Zwingelberg, Ui prototypes: Policy administration and presentation version 1, Prime Life, 2009.