S. Abiteboul, B. André, and D. Kaplan, Managing your digital life, Comm. of the ACM, vol.58, issue.5, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01068006

N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, P. Pucheral et al., Personal data management systems: The security and functionality standpoint, Information Systems, vol.80, 2019.
URL : https://hal.archives-ouvertes.fr/hal-01898705

Y. Aumann and Y. Lindell, Security against covert adversaries: Efficient protocols for realistic adversaries, Theory of Cryptography, 2007.

M. Backes, P. Druschel, A. Haeberlen, and D. Unruh, Csar: A practical and provable technique to make randomized systems accountable, Network and Distributed System Security Symp, vol.9, 2009.

B. Button, , 2017.

C. Cloud, Your digital home, 2018.

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The second-generation onion router, USENIX Security Symposium, 2004.

E. Parliament, General data protection regulation. Law, 2016.

T. Hunt, -have i been pwned? largest and recent breaches, 2018.

J. Loudet, I. Sandu-popa, and L. Bouganim, DISPERS demonstration

J. Loudet, I. Sandu-popa, and L. Bouganim, SEP2P: Secure and efficient P2P personal data processing, EDBT, 2019.
URL : https://hal.archives-ouvertes.fr/hal-01949641

C. Priebe, K. Vaswani, and M. Costa, Enclavedb: A secure database using SGX, IEEE Symposium on Security and Privacy, 2018.

E. Saleh, A. Alsa'deh, A. Kayed, and C. Meinel, Processing over encrypted data: between theory and practice, ACM SIGMOD Record, vol.45, issue.3, pp.5-16, 2016.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, 1979.

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, ACM SIGCOMM Computer Comm. Review, vol.31, issue.4, 2001.

Q. To, B. Nguyen, and P. Pucheral, Private and scalable execution of sql aggregates on a secure decentralized architecture, ACM Transactions on Database Systems (TODS), vol.41, issue.3, p.16, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01296432

Q. Wang and N. Borisov, Octopus: A secure and anonymous dht lookup, Distributed Computing Systems (ICDCS), 2012.

J. Yin, J. Martin, A. Venkataramani, L. Alvisi, and M. Dahlin, Separating agreement from execution for byzantine fault tolerant services, ACM Symposium on Operating Systems Principles (SOSP), 2003.