T. Alves, F. , and D. , Trustzone: Integrated hardware and software security, 2004.

N. Anciaux, L. Bouganim, P. Pucheral, Y. Guo, L. Folgoc et al., MILo-DB: a personal, secure and portable database machine, DAPD, p.2014
DOI : 10.1145/320473.320484

URL : https://hal.archives-ouvertes.fr/hal-00768355

N. Anciaux, S. Lallali, I. S. Popa, and P. Pucheral, A scalable search engine for mass storage smart objects, PVLDB, p.2015
DOI : 10.14778/2777598.2777600

URL : https://hal.archives-ouvertes.fr/hal-01176462

R. Baden, A. Bender, and N. Spring, Persona: an online social network with user-defined privacy, ACM SIGCOMM Comp. Com. Review, vol.39, issue.4, 2009.

E. Bertino, G. Ghinita, and A. Kamra, Access Control for Databases: Concepts and Systems, Foundations and Trends in Databases, vol.3, issue.1-2, 2011.
DOI : 10.1561/1900000014

D. Brickley and L. Miller, FOAF vocabulary specification 0.91, 2007.

B. Carminati, E. Ferrari, and A. Perego, Rule-Based Access Control for Social Networks, On the Move to Meaningful Internet Systems, 2006.
DOI : 10.1007/11915072_80

L. Fang and K. Lefevre, Privacy wizards for social networking sites, Proceedings of the 19th international conference on World wide web, WWW '10, 2010.
DOI : 10.1145/1772690.1772727

R. Geambasu, M. Balazinska, S. D. Gribble, and H. M. Levy, Homeviews, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, 2007.
DOI : 10.1145/1247480.1247508

S. Guha, K. Tang, F. , and P. , NOYB, Proceedings of the first workshop on Online social networks, WOSP '08, 2008.
DOI : 10.1145/1397735.1397747

Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, 2011.
DOI : 10.1145/2068816.2068823

M. L. Mazurek and Y. Liang, Toward strong, usable access control for shared distributed data, USENIX conference on File and Storage Technologies (FAST), 2014.

J. Mori, T. Sugiyama, and Y. Matsuo, Real-world oriented information sharing using social networks, Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work , GROUP '05, 2005.
DOI : 10.1145/1099203.1099215

J. Park and R. Sandhu, The UCON ABC usage control model, In ACM TISSEC, vol.7, issue.1, 2004.

S. Seong, J. Seo, M. Nasielski, and D. Sengupta, PrPl, Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services Social Networks and Beyond, MCS '10, 2010.
DOI : 10.1145/1810931.1810939

A. C. Squicciarini and . Sundareswaran, A3P, Proceedings of the 22nd ACM conference on Hypertext and hypermedia, HT '11, 2011.
DOI : 10.1145/1995966.1996000

D. Thilakanathan, S. Chen, S. Nepal, C. , and R. A. , Secure Data Sharing in the Cloud, Security, Privacy and Trust in Cloud Systems, 2014.
DOI : 10.1007/978-3-642-38586-5_2

A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman, Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, 2009.
DOI : 10.1145/1658939.1658959

M. Van-kleek, D. A. Smith, and N. Shadbolt, and schraefel, m.c. A decentralized architecture for consolidating personal information ecosystems: The WebBox, PIM, 2012.

F. Wang, Cryptographically Enforced Access Control for User Data in Untrusted Clouds, USENIX Symposium on Networked Syst. Design and Implem. (NSDI), 2016.

L. Yuan, Privacy-preserving photo sharing based on a secure JPEG, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2015.
DOI : 10.1109/INFCOMW.2015.7179382

P. Zimmerman, PGP user's guide, 1994.