D. 'acquisto, G. Domingo-ferrer, J. Kikiras, P. Torra, V. De-montjoye et al., Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics, 2015.

E. Bertino, G. Ghinita, M. Kantarcioglu, D. Nguyen, J. Park et al., A roadmap for privacy-enhanced secure data provenance, Journal of Intelligent Information Systems, vol.40, issue.9, pp.481-501, 2014.
DOI : 10.1145/1168917.1168861

D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.242, pp.84-88, 1981.
DOI : 10.1007/978-1-4615-0239-5_14

URL : http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf

T. Dalneius, The invasion of privacy problem and statistics production ? an overview, Statistisk tidskrift, pp.213-225, 1974.

T. Dalenius, Towards a methodology for statistical disclosure control, Statistisk Tidskrift, vol.5, pp.429-444, 1977.

D. E. Denning and J. Schlörer, A fast procedure for finding a tracker in a statistical database, ACM Transactions on Database Systems, vol.5, issue.1, pp.88-102, 1980.
DOI : 10.1145/320128.320138

R. Hasan, R. Sion, and M. Winslett, Introducing secure provenance, Proceedings of the 2007 ACM workshop on Storage security and survivability , StorageSS '07, 2007.
DOI : 10.1145/1314313.1314318

R. Hasan, R. Sion, and M. Winslett, The case of the fake Picasso: preventing history forgery with secure provenance, Proc. FAST'09, 2009.

M. Kosinski, D. Stillwell, and T. Graepel, Private traits and attributes are predictable from digital records of human behavior, Proceedings of the National Academy of Sciences, vol.7, issue.3, 2013.
DOI : 10.1111/1467-6494.05008

URL : http://www.pnas.org/content/110/15/5802.full.pdf

P. Mcdaniel, K. Butler, R. Sion, E. Zadok, and M. Winslett, Towards a secure and efficient system for end-to-end provenance, Proc. TAPP, 2010.

J. Reuben, L. A. Martucci, S. Fischer-hübner, H. S. Packer, H. Hedbom et al., Privacy Impact Assessment Template for Provenance, 2016 11th International Conference on Availability, Reliability and Security (ARES), pp.653-660, 2016.
DOI : 10.1109/ARES.2016.95

J. Soria-comas and J. Domingo-ferrer, Big Data Privacy: Challenges to Privacy Principles and Models, Data science and engineering 1, pp.1-21, 2016.
DOI : 10.1007/s41019-015-0001-x

V. Torra and G. Navarro-arribas, Data privacy, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol.155, issue.4, pp.4-269, 2014.
DOI : 10.1007/978-1-4613-0121-9

URL : https://hal.archives-ouvertes.fr/hal-01629153

V. Torra, Data privacy, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol.155, issue.4, 2017.
DOI : 10.1007/978-1-4613-0121-9

URL : https://hal.archives-ouvertes.fr/hal-01629153

V. Torra and G. Navarro-arribas, Integral Privacy, Proc. CANS 2016, pp.661-669, 2016.
DOI : 10.1007/978-3-540-25955-8_17

J. Vaidya, C. W. Clifton, and Y. M. Zhu, Privacy-preserving data mining: why, how, and when, IEEE Security and Privacy Magazine, vol.2, issue.6, 2006.
DOI : 10.1109/MSP.2004.108

J. Zhang, A. Chapman, and K. Lefevre, Do You Know Where Your Data???s Been? ??? Tamper-Evident Database Provenance, Proc. SDM 2009, pp.17-32, 2009.
DOI : 10.1007/11890850_21

URL : http://web.eecs.umich.edu/~klefevre/Publications_files/sec-prov.pdf