S. Abiteboul, B. André, and D. Kaplan, Managing your digital life, Communications of the ACM, vol.58, issue.5, p.2015
DOI : 10.1145/2670528

URL : https://hal.archives-ouvertes.fr/hal-01068006

M. Ali, R. Dhamotharan, E. Khan, S. U. Khan, A. V. Vasilakos et al., SeDaSC: Secure Data Sharing in Clouds, IEEE Systems Journal, vol.11, issue.2, 2015.
DOI : 10.1109/JSYST.2014.2379646

T. Alves, F. , and D. , Trustzone: Integrated hardware and software security, 2004.

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona: an online social network with user-defined privacy, In ACM SIGCOMM Computer Communication Review, vol.39, issue.4, 2009.

P. Bellavista, C. Giannelli, L. Iannario, L. Goix, and C. Venezia, Peer-to-Peer Content Sharing Based on Social Identities and Relationships, IEEE Internet Computing, p.2013
DOI : 10.1109/MIC.2013.127

E. Bertino, G. Ghinita, and A. Kamra, Access Control for Databases: Concepts and Systems, Foundations and Trends in Databases, vol.3, issue.1-2, 2011.
DOI : 10.1561/1900000014

B. Carminati, E. Ferrari, and A. Perego, Rule-Based Access Control for Social Networks, On the Move to Meaningful Internet Systems, 2006.
DOI : 10.1007/11915072_80

«. Cavoukian, Privacy by design -The 7 foundational Principles » https
DOI : 10.4018/978-1-61350-501-4.ch007

R. Geambasu, M. Balazinska, S. D. Gribble, and H. M. Levy, Homeviews, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, 2007.
DOI : 10.1145/1247480.1247508

S. Guha, K. Tang, F. , and P. Noyb, Privacy in online social networks, 13. H. Clinton email dataset revealed by Wikileaks, 2008.

Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, 2011.
DOI : 10.1145/2068816.2068823

M. L. Mazurek, Y. Liang, W. Melicher, M. Sleeper, L. Bauer et al., Toward strong, usable access control for shared distributed data, USENIX conference on File and Storage Technologies (FAST), 2014.

M. Roth, A. Ben-david, D. Deutscher, G. Flysher, I. Horn et al., Suggesting friends using the implicit social graph, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, pp.233-242, 2010.
DOI : 10.1145/1835804.1835836

D. Thilakanathan, S. Chen, S. Nepal, C. , and R. A. , Secure Data Sharing in the Cloud, Security, Privacy and Trust in Cloud Systems, 2014.
DOI : 10.1007/978-3-642-38586-5_2

M. Van-kleek, D. A. Smith, and N. Shadbolt, and schraefel, m.c. A decentralized architecture for consolidating personal information ecosystems: The WebBox, PIM, 2012.

F. Wang, J. Mickens, N. Zeldovich, and V. Vaikuntanathan, Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds, USENIX Symposium on Networked Syst. Design and Implem. (NSDI), 2016.

L. Yuan, P. Korshunov, and T. Ebrahimi, Privacy-preserving photo sharing based on a secure JPEG, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2015.
DOI : 10.1109/INFCOMW.2015.7179382

P. Zimmerman, PGP user's guide, 1994.