S. Abiteboul, B. André, and D. Kaplan, Managing your digital life, Commun. ACM, vol.58, pp.32-35, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01068006

M. Backes, P. Druschel, A. Haeberlen, and D. Unruh, CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable, NDSS, vol.9, pp.341-353, 2009.

C. Cloud, Cozy allow you to control your personal data (pictures, bank statements, bills, health reinbursements) in a secure and private space, 2013.

. Fing, The mesinfos project explores and implements the self data concept in france, vol.3, 2013.

T. Hunt, Have I been pwned? Check if you have an account that has been compromised in a data breach, 2013.

S. Lallali and N. Anciaux, Supporting secure keyword search in the personal cloud, Information Systems, vol.72, pp.1-26, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01660599

F. Mckeen, I. Alexandrovich, A. Berenzon, H. Carlos-v-rozas, V. Shafi et al., Innovative instructions and software model for isolated execution, HASP@ ISCA, vol.10, 2013.

E. Parliament, Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, pp.32016-0679, 2016.

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, vol.31, 2001.

A. Shamir, How to share a secret, Commun. ACM, vol.22, pp.612-613, 1979.

I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, ACM SIGCOMM Computer Communication Review, vol.31, pp.149-160, 2001.