Secure personal data servers: a vision paper, Proceedings of the VLDB Endowment, vol.3, pp.25-35, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00551875
Chiaroscuro: Transparency and privacy for massive personal time-series clustering, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp.779-794, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01136686
METAP: revisiting Privacy-Preserving Data Publishing using secure devices. Distributed and Parallel Databases, vol.32, pp.191-244, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00934586
Personal Data Management Systems: The security and functionality standpoint, Information Systems, vol.80, pp.13-35, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01898705
MILo-DB: a personal, secure and portable database machine. Distributed and Parallel Databases, vol.32, pp.37-63, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00768355
Secure database-as-a-service with cipherbase, Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, pp.1033-1036, 2013. ,
Security against covert adversaries: Efficient protocols for realistic adversaries, Theory of Cryptography Conference, pp.137-156, 2007. ,
CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable, NDSS, vol.9, pp.341-353, 2009. ,
Find Your Health Data, 2010. ,
Quantifying Differential Privacy under Temporal Correlations, 33rd IEEE International Conference on Data Engineering, pp.821-832, 2017. ,
Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, pp.299-314, 2002. ,
Your digital home, 2013. ,
Privacy at Scale: Local Differential Privacy in Practice, Proceedings of the 2018 International Conference on Management of Data, SIGMOD Conference, pp.1655-1658, 2018. ,
openpds: Protecting the privacy of metadata through safeanswers, PloS one, vol.9, p.98790, 2014. ,
Collecting Telemetry Data Privately, Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems, pp.3574-3583, 2017. ,
The mesinfos project explores the self data concept in france, 2013. ,
Hide & Share: Landmark-based Similarity for Private KNN Computation, Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on. IEEE, pp.263-274, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01171492
A practical hardware-assisted approach to customize trusted boot for mobile devices, International Conference on Information Security, pp.542-554, 2014. ,
Want to scale in centralized systems? Think P2P, J. Internet Services and Applications, vol.6, p.12, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01199734
Supporting secure keyword search in the personal cloud, Information Systems, vol.72, pp.1-26, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01660599
Distributed secure search in the personal cloud, 19th International Conference on Extending Database Technology, pp.652-655, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01293409
Mike Dahlin, and Vitaly Shmatikov. 2013. ? Box: A Platform for Privacy-Preserving Apps, NSDI, pp.501-514 ,
Kademlia: A peer-to-peer information system based on the xor metric, International Workshop on Peer-to-Peer Systems, pp.53-65, 2002. ,
Handbook of Applied Cryptography, 1996. ,
The midata vision of consumer empowerment, 2011. ,
Protecting your data, Retrieved October 12, 2016. ,
General Data Protection Regulation. Law, pp.32016-0679, 2016. ,
Privacy and accountability for location-based aggregate statistics, Proceedings of the 18th ACM conference on Computer and communications security, pp.653-666, 2011. ,
EnclaveDB: A Secure Database using SGX, EnclaveDB: A Secure Database using SGX, p.0, 2018. ,
A scalable content-addressable network, vol.31, 2001. ,
, Processing over encrypted data: between theory and practice, ACM SIGMOD Record, vol.45, pp.5-16, 2016.
How to share a secret, Commun. ACM, vol.22, pp.612-613, 1979. ,
, Solid empowers users and organizations to separate their data from the applications that use it, 2018.
Chord: A scalable peer-to-peer lookup service for internet applications, ACM SIGCOMM Computer Communication Review, vol.31, pp.149-160, 2001. ,
Building a Secure System using TrustZone Technology, 2008. ,
, PAMPAS: Privacy-Aware Mobile Participatory Sensing Using Secure Probes, Proceedings of the 28th International Conference on Scientific and Statistical Database Management, p.4, 2016.
Private and scalable execution of SQL aggregates on a secure decentralized architecture, ACM Transactions on Database Systems (TODS), vol.41, p.16, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01296432
RoSeS: a continuous query processor for large-scale RSS filtering and aggregation, Proceedings of the 20th ACM Conference on Information and Knowledge Management, pp.2549-2552, 2011. ,
A survey of DHT security techniques, ACM Computing Surveys (CSUR), vol.43, p.8, 2011. ,
Octopus: A secure and anonymous DHT lookup, IEEE 32nd International Conference on. IEEE, pp.325-334, 2012. ,