Managing your digital life, Comm. of the ACM, vol.58, issue.5, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01068006
Personal data management systems: The security and functionality standpoint, Information Systems, vol.80, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01898705
Security against covert adversaries: Efficient protocols for realistic adversaries, Theory of Cryptography, 2007. ,
Csar: A practical and provable technique to make randomized systems accountable, Network and Distributed System Security Symp, vol.9, 2009. ,
, , 2017.
Your digital home, 2018. ,
Tor: The second-generation onion router, USENIX Security Symposium, 2004. ,
General data protection regulation. Law, 2016. ,
, -have i been pwned? largest and recent breaches, 2018.
, DISPERS demonstration
SEP2P: Secure and efficient P2P personal data processing, EDBT, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01949641
Enclavedb: A secure database using SGX, IEEE Symposium on Security and Privacy, 2018. ,
Processing over encrypted data: between theory and practice, ACM SIGMOD Record, vol.45, issue.3, pp.5-16, 2016. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, 1979. ,
Chord: A scalable peer-to-peer lookup service for internet applications, ACM SIGCOMM Computer Comm. Review, vol.31, issue.4, 2001. ,
Private and scalable execution of sql aggregates on a secure decentralized architecture, ACM Transactions on Database Systems (TODS), vol.41, issue.3, p.16, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01296432
Octopus: A secure and anonymous dht lookup, Distributed Computing Systems (ICDCS), 2012. ,
Separating agreement from execution for byzantine fault tolerant services, ACM Symposium on Operating Systems Principles (SOSP), 2003. ,