Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics, 2015. ,
A roadmap for privacy-enhanced secure data provenance, Journal of Intelligent Information Systems, vol.40, issue.9, pp.481-501, 2014. ,
DOI : 10.1145/1168917.1168861
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.242, pp.84-88, 1981. ,
DOI : 10.1007/978-1-4615-0239-5_14
URL : http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf
The invasion of privacy problem and statistics production ? an overview, Statistisk tidskrift, pp.213-225, 1974. ,
Towards a methodology for statistical disclosure control, Statistisk Tidskrift, vol.5, pp.429-444, 1977. ,
A fast procedure for finding a tracker in a statistical database, ACM Transactions on Database Systems, vol.5, issue.1, pp.88-102, 1980. ,
DOI : 10.1145/320128.320138
Introducing secure provenance, Proceedings of the 2007 ACM workshop on Storage security and survivability , StorageSS '07, 2007. ,
DOI : 10.1145/1314313.1314318
The case of the fake Picasso: preventing history forgery with secure provenance, Proc. FAST'09, 2009. ,
Private traits and attributes are predictable from digital records of human behavior, Proceedings of the National Academy of Sciences, vol.7, issue.3, 2013. ,
DOI : 10.1111/1467-6494.05008
URL : http://www.pnas.org/content/110/15/5802.full.pdf
Towards a secure and efficient system for end-to-end provenance, Proc. TAPP, 2010. ,
Privacy Impact Assessment Template for Provenance, 2016 11th International Conference on Availability, Reliability and Security (ARES), pp.653-660, 2016. ,
DOI : 10.1109/ARES.2016.95
Big Data Privacy: Challenges to Privacy Principles and Models, Data science and engineering 1, pp.1-21, 2016. ,
DOI : 10.1007/s41019-015-0001-x
Data privacy, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol.155, issue.4, pp.4-269, 2014. ,
DOI : 10.1007/978-1-4613-0121-9
URL : https://hal.archives-ouvertes.fr/hal-01629153
Data privacy, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol.155, issue.4, 2017. ,
DOI : 10.1007/978-1-4613-0121-9
URL : https://hal.archives-ouvertes.fr/hal-01629153
Integral Privacy, Proc. CANS 2016, pp.661-669, 2016. ,
DOI : 10.1007/978-3-540-25955-8_17
Privacy-preserving data mining: why, how, and when, IEEE Security and Privacy Magazine, vol.2, issue.6, 2006. ,
DOI : 10.1109/MSP.2004.108
Do You Know Where Your Data???s Been? ??? Tamper-Evident Database Provenance, Proc. SDM 2009, pp.17-32, 2009. ,
DOI : 10.1007/11890850_21
URL : http://web.eecs.umich.edu/~klefevre/Publications_files/sec-prov.pdf