R. Agrawal, R. Bayardo, C. Faloutsos, J. Kiernan, R. Rantzau et al., Auditing Compliance with a Hippocratic Database Efficient Management of Transitive Relationships in Large Data and Knowledge Bases, VLDB '04: Proceedings of the 13th International Conference on Very Large Data Bases ACM SIGMOD International Conference on Management of Data (SIGMOD '89), pp.516-527, 1989.

S. Mark and . Ackerman, The Intellectual Challenge of CSCW: the Gap between Social Requirements and Technical Feasibility, Human-Computer Interaction, vol.15, issue.2, 2000.

I. [. Ayanoglu, R. D. Chih-lin, J. E. Gitlin, and . Mazo, Diversity coding for transparent self-healing and fault-tolerant communication networks, IEEE Transactions on Communications, vol.41, issue.11, p.41, 1993.
DOI : 10.1109/26.241748

A. France-presse, Brazil Senate Orders Google to Identify Website Pedophiles, 2008.

A. France-presse, Google Hands Over Data on Suspected Pedophiles to Brazil Available at afp.google.com/article, p.5, 2008.

J. Aguilar, Adaptive Random Fuzzy Cognitive Maps, IBERAMIA 2002: Proceedings of the 8th Ibero-American Conference on AI, 2002.
DOI : 10.1007/3-540-36131-6_41

R. [. A¨?ta¨?t-kaci, P. Boyer, R. Lincoln, and . Nasr, Efficient Implementation of Lattice Operations, ACM Transactions on Programming Languages and Systems, vol.11, issue.1, 1989.

J. [. Agrawal, R. Kiernan, Y. Srikant, and . Xu, Hippocratic Databases, 28th International Conference on Very Large Databases (VLDB), 2002.
DOI : 10.1016/B978-155860869-6/50021-4

A. L. Allen, Coercing Privacy, William and Mary Law Review, vol.40, 1999.

D. Gregory, E. D. Abowd, and . Mynatt, Charting Past, Present, and Future Research in Ubiquitous Computing, ACM Transactions on Computer-Human Interaction, vol.7, issue.1, 2000.

R. J. Al-muhtadi, A. Campbell, M. D. Kapadia, S. Mickunas, and . Yi, Routing through the mist: privacy preserving communication in ubiquitous computing environments, Proceedings 22nd International Conference on Distributed Computing Systems, pp.74-83, 2002.
DOI : 10.1109/ICDCS.2002.1022244

[. Al-masri and Q. H. Mahmoud, QoS-based Discovery and Ranking of Web Services, 2007 16th International Conference on Computer Communications and Networks, 2007.
DOI : 10.1109/ICCCN.2007.4317873

R. Nabil, J. C. Adam, and . Worthmann, Security-control Methods for Statistical Databases: a Comparative Study, ACM Computing Surveys, vol.21, issue.4, pp.515-556, 1989.

I. F. Akyildiz, X. Wang, and W. Wang, Wireless Mesh Networks: A Survey, Computer Networks and ISDN Systems, vol.47, issue.4, 2005.

]. R. Axe76 and . Axelrod, Structure of Decision: The Cognitive Maps of Political Elites, 1976.

. [. Beatty, Web Services Dynamic Discovery (WS-Discovery) Available at specs.xmlsoap.org/ws, 2005.

J. Bindé, Towards Knowledge Societies, UNESCO World Report UNESCO, 2005.

[. Bbc, Monster attack steals user data, 2007.

J. [. Botha and . Eloff, Separation of duties for access control enforcement in workflow environments, IBM Systems Journal, vol.40, issue.3, 2001.
DOI : 10.1147/sj.403.0666

L. L. Beck, A security machanism for statistical database, ACM Transactions on Database Systems, vol.5, issue.3, pp.316-3338, 1980.
DOI : 10.1145/320613.320617

C. [. Boyle, S. Edwards, and . Greenberg, The effects of filtered video on awareness and privacy, Proceedings of the 2000 ACM conference on Computer supported cooperative work , CSCW '00, pp.1-10, 2000.
DOI : 10.1145/358916.358935

J. Bentham, The Panopticon Writings. Verso, 1995.

[. Ben-mokhtar, Semantic Middleware for Service-Oriented Pervasive Computing, 2007.
URL : https://hal.archives-ouvertes.fr/tel-00469457

[. Berthold, H. Federrath, and S. Köpsell, Web MIXes: A System for Anonymous and Unobservable Internet Access, International workshop on Designing privacy enhancing technologies, 2001.
DOI : 10.1007/3-540-44702-4_7

[. Mokhtar, N. Georgantas, and V. Issarny, COCOA : ConversationBased Service Composition for Pervasive Computing Environments, 2006 ACS/IEEE International Conference on Pervasive Services, 2006.
DOI : 10.1109/PERSER.2006.1652204

T. [. Barbaro and . Zeller-jr, A Face Is Exposed for AOL Searcher No. 4417749. The New York Times, 2006.

A. Bernstein and M. Klein, Towards High-Precision Service Retrieval, ISWC '02: Proceedings of the First International Semantic Web Conference on The Semantic Web, 2002.
DOI : 10.1007/3-540-48005-6_9

[. Mokhtar, A. Kaul, N. Georgantas, and V. Issarny, Efficient Semantic Service Discovery in Pervasive Computing Environments, Proceedings of Middleware'06, 2006.
DOI : 10.1007/11751113_10

URL : https://hal.archives-ouvertes.fr/inria-00415115

J. [. Berners-lee, O. Hendler, and . Lassila, The Semantic Web, Scientific American, vol.284, issue.5, 2001.
DOI : 10.1038/scientificamerican0501-34

]. B. Blo70 and . Bloom, Space/Time Trade-offs in Hash Coding with Allowable Errors, Communication of the ACM, vol.13, issue.7, 1970.

A. [. Badis, K. A. Munaretto, G. Agha, and . Pujolle, QoS for Ad hoc Networking Based on Multiple Metrics: Bandwidth and Delay, Mobile and Wireless Communications Networks, 2003.
DOI : 10.1142/9789812791146_0004

M. [. Brewer and . Nash, The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, 1989.
DOI : 10.1109/SECPRI.1989.36295

A. Brogi and R. Popescu, Towards Semi-automated Workflow-Based Aggregation of Web Services, ICSOC 2005: Proceedings of the Third International Conference on Service-Oriented Computing, 2005.
DOI : 10.1007/11596141_17

A. Brogi and R. Popescu, From BPEL Processes to YAWL Workflows, Proceedings of the Third International Workshop on Web Services and Formal Methods, 2006.
DOI : 10.1007/11841197_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.1843

]. S. Bra00 and . Brands, Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000.

P. Brc-+-07-]-sonia-ben-mokhtar and . Raverdy, Roberto Speicys Cardoso, Aitor Urbieta, and Nikolaos Georgantas. Discovering Social Services in Pervasive Environments with Privacy ? Demonstration Paper, ACM/I- FIP/USENIX 8th International Middleware Conference, 2007.

]. R. Bri67 and . Brictson, Some Thoughts on the Social Implications of Computers and Privacy, 1967.

D. Brin, The Transparent Society Wired Magazine, 1996.

D. Brin, The Transparent Society: Will Technology Force us to Choose Between Privacy and Freedom, Basic Books, 1999.

S. Ben-mokhtar, P. Raverdy, A. Urbieta, and R. S. Cardoso, Interoperable Semantic & Syntactic Service Matching for Ambient Computing Environments, Proceedings of the 1st International Workshop on Ad-hoc Ambient Computing, 2008.

F. [. Beresford and . Stajano, Location privacy in pervasive computing, IEEE Pervasive Computing, vol.2, issue.1, pp.46-55, 2003.
DOI : 10.1109/MPRV.2003.1186725

K. Cameron, Are Countrywide's Systems Designed Around Need to Know?, 2008.

J. Catlett, Open letter to P3P developers & replies, Proceedings of the tenth conference on Computers, freedom and privacy challenging the assumptions, CFP '00, pp.157-164, 2000.
DOI : 10.1145/332186.332276

G. S. Capra, C. Blair, W. Mascolo, P. Emmerich, and . Grace, Exploiting Reflection in Mobile Computing Middleware. SIG- MOBILE Mobile Comput, Commun. Rev, vol.6, issue.4, pp.34-44, 2002.

[. Cardoso, S. Ben-mokhtar, A. Urbieta, and V. Issarny, EVEY, Proceedings of the 8th ACM/IFIP/USENIX international conference on Middleware , Middleware '07, 2007.
DOI : 10.1145/1377943.1377965

[. Cardoso and M. Caporuscio, Exploring Multi-path Communication in Hybrid Wireless Ad Hoc Networks, 1st International Workshop on Ad-hoc Ambient Computing, 2008.

J. [. Crowley, F. Coutaz, and . Bérard, Perceptual user interfaces: things that see, Communications of the ACM, vol.43, issue.3, pp.54-64, 2000.
DOI : 10.1145/330534.330540

G. Chafle, S. Chandra, V. Mann, and M. G. Nanda, Orchestrating composite Web services under data flow constraints, IEEE International Conference on Web Services (ICWS'05), 2005.
DOI : 10.1109/ICWS.2005.88

F. Curbera, M. Duftler, R. Khalaf, W. Nagy, N. Mukhi et al., Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI, IEEE Internet Computing, vol.6, issue.2, 2002.
DOI : 10.1109/4236.991449

R. [. Carlsson and . Fullér, Adaptive Fuzzy Cognitive Maps for Hyperknowledge Representation in Strategy Formation Process, Proceedings of International Panel Conference on Soft and Intelligent Computing, 1996.

B. [. Constantinescu and . Faltings, Efficient matchmaking and directory services, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003), 2003.
DOI : 10.1109/WI.2003.1241176

URL : http://infoscience.epfl.ch/record/52498

[. Carminati, E. Ferrari, and P. C. Hung, Security Conscious Web Service Composition, 2006 IEEE International Conference on Web Services (ICWS'06), 2006.
DOI : 10.1109/ICWS.2006.115

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.9228

A. [. Cohen and . Gutterman, Trade Secrets Protection and Exploitation, 1998.

O. [. Chor, E. Goldreich, M. Kushilevitz, and . Sudan, Private Information Retrieval, FOCS'95: Proceedings of the 36th Annual IEEE Conference on Foundations of Computer Science, 1995.

E. [. Chaum and . Van-heyst, Group Signatures, Eurocrypt '91, pp.257-265, 1991.
DOI : 10.1007/3-540-46416-6_22

]. D. Cha81 and . Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.

]. D. Cha88 and . Chaum, The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988.

. Liu, Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing, DIS '04:Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques, pp.233-242, 2004.

V. [. Cardoso and . Issarny, Architecting Pervasive Computing Systems for Privacy: A Survey, 2007 Working IEEE/IFIP Conference on Software Architecture (WICSA'07), 2007.
DOI : 10.1109/WICSA.2007.11

URL : https://hal.archives-ouvertes.fr/inria-00415925

[. Charlet, V. Issarny, and R. Chibout, Energy-efficient middleware-layer multi-radio networking: An assessment in the area of service discovery, Computer Networks, vol.52, issue.1, 2008.
DOI : 10.1016/j.comnet.2007.09.018

URL : https://hal.archives-ouvertes.fr/inria-00567860

R. Clarke, Internet privacy concerns confirm the case for intervention, Communications of the ACM, vol.42, issue.2, pp.60-67, 1999.
DOI : 10.1145/293411.293475

L. Cranor, M. Langheinrich, and M. Marchiori, A P3P Preference Exchange Language 1.0 (APPEL1.0). W3C Working Draft, 2002.

M. Cochran, Notes on the Wang et al. 2 63 SHA-1 Differential Path, Cryptology ePrint Archive Report, vol.474, 2007.

]. J. Coh92 and . Cohen, Redescribing Privacy: Identity, Difference, and the Abortion Controversy, Columbia Journal of Gender and Law, vol.43, issue.3, 1992.

B. Cohen, Incentives Build Robustness in BitTorrent In First Workshop on Economics of Peer-to-Peer Systems, pp.116-121, 2003.

J. E. Cohen and P. Drm, DRM and privacy, Communications of the ACM, vol.46, issue.4, pp.46-49, 2003.
DOI : 10.1145/641205.641230

[. Consortium, Privacy and Identity Management for Europe -PRIME White Paper V1.0 Available at www.prime-project.eu.org/ public, 2005.

A. Choudhary, A. Patra, B. V. Ashwinkumar, K. Srinathan, and C. Pandu-rangan, Information Theoretic Security, chapter Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary, 2008.
DOI : 10.1007/978-3-540-85093-9_15

[. Cranor, Web Privacy with P3P, 2002.

[. Csirmaz, The Size of a Share Must Be Large, Journal of Cryptology, vol.10, issue.4, 1997.

J. [. Carvalho, . [. Tomé, J. A. Carvalho, and . Tomé, Rule Based Fuzzy Cognitive Maps: Fuzzy Causal Relations. In CIMCA'99: The 1999 International Conference on Computational Intelligence for Modelling, Control and Automation Issues on the Stability of Fuzzy Cognitive Maps and Rule-based Fuzzy Cognitive Maps, Proceedings of the 2002 Annual Meeting of the North American Fuzzy Information Processing Society, 1999.

. E. Czh-+-99-]-s, B. Y. Czerwinski, T. D. Zhao, A. D. Hodes, R. H. Joseph et al., An Architecture for a Secure Service Discovery Service, MobiCom '99: 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, 1999.

G. Danezis, R. Dingledine, and N. Mathewson, Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003.
DOI : 10.1109/SECPRI.2003.1199323

D. Dolev, C. Dwork, O. Waarts, and M. Yung, Perfectly Secure Message Transmission, Journal of the ACM, vol.40, issue.1, 1993.

D. E. Denning, Secure statistical databases with random sample queries, ACM Transactions on Database Systems, vol.5, issue.3, pp.291-315, 1980.
DOI : 10.1145/320613.320616

M. [. Diffie and . Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

B. [. Dickerson and . Kosko, Virtual Worlds as Fuzzy Cognitive Maps, Proceedings of the IEEE Virtual Reality Annual International Symposium, 1993.

L. [. Duckham and . Kulik, A Formal Model of Obfuscation and Negotiation for Location Privacy, Proceedings of PERVASIVE 2005, pp.152-170, 2005.
DOI : 10.1007/11428572_10

N. [. Dingledine, P. Mathewson, and . Syverson, Tor: The Second-Generation Onion Router, Proceedings of the 13th USENIX, 2004.

F. Peter and . Drucker, The Age of Discontinuity: Guidelines to Our Changing Society, 1969.

. Dsnw-+-99-]-y, R. Desmedt, H. Safavi-naini, C. Wang, J. Charnes et al., Broadcast Anti-Jamming Systems, ICON '99: Proceedings of the 7th IEEE International Conference on Networks, 1999.

[. Desmedt, Y. Wang, and M. Burmester, Critical Information Infrastructures Security, chapter Revisiting Colored Networks and Privacy Preserving Censorship, 2006.
DOI : 10.1007/11962977_12

P. [. Eastlake and . Jones, RFC3174: US Secure Hash Algorithm 1 (SHA1), 2001.

W. Emmerich, Engineering Distributed Objects, 2000.
DOI : 10.1007/3-540-45254-0

[. Emmerich, Software engineering and middleware, Proceedings of the conference on The future of Software engineering , ICSE '00, 2000.
DOI : 10.1145/336512.336542

H. [. Farrell and . Lausen, Semantic Annotations for WSDL and XML Schema, W3C Working Draft, 2007.

]. D. Fla89 and . Flaherty, Protecting Privacy in Surveillance Societies, 1989.

R. [. Freedman and . Morris, Tarzan, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.193-206, 2002.
DOI : 10.1145/586110.586137

J. Fontana, Microsoft Says Credentica Acquisition will Help Users Protect Privacy, Network World, 2008.

G. [. Falcone, C. Pezzulo, and . Castelfranchi, A Fuzzy Approach to a Belief-Based Trust Computation, Trust, Reputation, and Security: Theories and Practice, 2003.
DOI : 10.1007/3-540-36609-1_7

[. Franklin and R. N. Wright, Secure Communication in Minimal Connectivity Models, Journal of Cryptology, vol.13, issue.1, 2000.

H. George, J. Forman, and . Zahorjan, The Challenges of Mobile Computing, Computer, vol.27, issue.4, 1994.

S. Garfinkel, Database Nation: the Death of Privacy in the 21st Century, 2000.

R. [. Golmie, A. Van-dyck, and . Soltanian, Interference of bluetooth and IEEE 802.11, Proceedings of the 4th ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems , MSWIM '01, 2001.
DOI : 10.1145/381591.381598

D. [. Gruteser and . Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003.
DOI : 10.1145/1066116.1189037

Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, Protecting data privacy in private information retrieval schemes, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.151-160, 1998.
DOI : 10.1145/276698.276723

]. P. Gol06 and . Golle, Revisiting the Uniqueness of Simple Demographics in the U.S. Population, WPES '06: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, 2006.

. Gouvernement-de-la-france, Déclaration des Droits de l'Homme et du Citoyen, 1789

R. Grimm and . One, world: Experiences with a Pervasive Computing Architecture, IEEE Pervasive Computing, vol.3, issue.3, 2004.

[. Goel, M. Robson, M. Polte, and E. Sirer, Herbivore: A Scalable and Efficient Protocol for Anonymous Communication, 2003.

[. Goldschlag, M. Reed, and P. Syverson, Onion Routing for Anonymous and Private Internet Connections, Communications of the ACM, vol.42, issue.2, 1999.

C. Gulcu and G. Tsudik, Mixing Email with Babel, SNDSS '96: Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996.

D. [. Goldberg, E. Wagner, and . Brewer, Privacy-enhancing technologies for the Internet, Proceedings IEEE COMPCON 97. Digest of Papers, 1997.
DOI : 10.1109/CMPCON.1997.584680

]. M. Hag92 and . Hagiwara, Extended Fuzzy Cognitive Maps, IEEE International Conference on Fuzzy Systems, 1992.

R. Haynes, Media Rights And Intellectual Property, 2005.

[. Hamadi and B. Benatallah, A Petri Net-based Model for Web Service Composition, ADC '03: Proceedings of the 14th Australasian database conference, 2003.

J. [. Hong and . Landay, An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.177-189, 2004.
DOI : 10.1145/990064.990087

M. Hirt and U. Maurer, Complete Characterization of Adversaries Tolerable in Secure Multi-party Computation, PODC '97: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, 1997.

J. I. Hong, J. D. Ng, S. Lederer, and J. A. Landay, Privacy risk models for designing privacy-sensitive ubiquitous computing systems, Proceedings of the 2004 conference on Designing interactive systems processes, practices, methods, and techniques, DIS '04, pp.91-100, 2004.
DOI : 10.1145/1013115.1013129

I. [. Hudson and . Smith, Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems, Proceedings of the 1996 ACM conference on Computer supported cooperative work , CSCW '96, pp.248-257, 1996.
DOI : 10.1145/240080.240295

D. Lucas, A. Introna, and . Pouloudi, Privacy in the Information Age: Stakeholders, Interests and Values, Journal of Business Ethics, vol.22, pp.27-38, 1999.

D. Issarny, F. Sacchetti, F. Tartanoglu, R. Sailhan, N. Chibout et al., Developing Ambient Intelligence Systems: A Solution based on Web Services, Automated Software Engineering, vol.12, issue.1, 2005.
DOI : 10.1023/B:AUSE.0000049210.42738.00

URL : https://hal.archives-ouvertes.fr/inria-00414951

T. [. Irwin and . Yu, An identifiability-based access control model for privacy protection in open systems, Proceedings of the 2004 ACM workshop on Privacy in the electronic society , WPES '04, 2004.
DOI : 10.1145/1029179.1029194

D. B. Johnson, D. A. Maltz, and J. Broch, Ad hoc Networking, chapter DSR: the Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, pp.139-172, 2001.

P. P. Jacquet, T. Muhlethaler, A. Clausen, A. Laouiti, L. Qayyum et al., Optimized link state routing protocol for ad hoc networks, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century., 2001.
DOI : 10.1109/INMIC.2001.995315

URL : https://hal.archives-ouvertes.fr/inria-00471622

J. [. Jeronimo and . Weast, UPnP Design by Example, 2003.

[. Kon, F. Costa, G. Blair, and R. H. Campbell, The case for reflective middleware, Communications of the ACM, vol.45, issue.6, pp.33-38, 2002.
DOI : 10.1145/508448.508470

[. Kokash, R. S. Cardoso, P. Raverdy, and V. Issarny, A flexible qos-aware routing protocol for infrastructureless b3g networks, Proceedings of the 24th Annual ACM Symposium on Applied Computing -Mobile Computing and Applications Track, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00413480

[. Kumar, P. R. Goundan, C. Srinathan, and . Pandu-rangan, On perfectly secure communication over arbitrary networks, Proceedings of the twenty-first annual symposium on Principles of distributed computing , PODC '02, 2002.
DOI : 10.1145/571825.571858

S. [. Korba and . Kenny, Towards Meeting the Privacy Challenge: Adapting DRM, ACM CCS-9 Workshop, pp.118-136, 2003.
DOI : 10.1007/978-3-540-44993-5_8

S. [. Kang, J. Lee, and . Choi, Using fuzzy cognitive map for the relationship management in airline service, Expert Systems with Applications, vol.26, issue.4, 2004.
DOI : 10.1016/j.eswa.2003.10.012

L. M. Kohnfelder, Towards a Practical Public-key Cryptosystem, 1978.

]. B. Kos86 and . Kosko, Fuzzy Cognitive Maps, International Journal of Man-Machine Studies, vol.24, issue.1, 1986.

]. B. Kos91 and . Kosko, Neural Networks and Fuzzy Systems: A Dynamical Systems Approach to Machine Intelligence, 1991.

H. Krawczyk, Secret Sharing Made Short, CRYPTO '93: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, 1994.
DOI : 10.1007/3-540-48329-2_12

H. [. Knorr and . Stormer, Modeling and Analyzing Separation of Duties in Workflow Environments, Sec '01: Proceedings of the 16th International Conference on Information Security: Trusted Information, 2001.
DOI : 10.1007/0-306-46998-7_14

J. [. Krall, N. Vitek, and . Horspool, Near optimal hierarchical encoding of types, ECOOP'97: 11th European Conference on Object Oriented Programming, 1997.
DOI : 10.1007/BFb0053377

Y. [. Kido, T. Yanagisawa, and . Satoh, An anonymous communication technique using dummies for location-based services, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005., pp.88-97, 2005.
DOI : 10.1109/PERSER.2005.1506394

]. B. Lam73 and . Lampson, A Note on the Confinement Problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.

]. M. Lan01 and . Langheinrich, Privacy by Design -Principles of Privacy-Aware Ubiquitous Systems, UbiComp 2001: Proceedings of the 3rd international conference on Ubiquitous Computing, pp.273-291, 2001.

]. M. Lan02 and . Langheinrich, A Privacy Awareness System for Ubiquitous Computing Environments, UbiComp 2002: Proceedings of the 4th international conference on Ubiquitous Computing, pp.237-245, 2002.

L. Lessig, Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity, 2004.

]. L. Les06 and . Lessig, Code -version 2.0. Basic Books, 2006.

[. Lee and M. Gerla, AODV-BR: backup routing in ad hoc networks, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540), 2000.
DOI : 10.1109/WCNC.2000.904822

[. Lee and M. Gerla, Split multipath routing with maximally disjoint paths in ad hoc networks, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001.
DOI : 10.1109/ICC.2001.937262

L. Li and I. Horrocks, A software framework for matchmaking based on semantic web technology, Proceedings of the twelfth international conference on World Wide Web , WWW '03, 2004.
DOI : 10.1145/775152.775199

]. J. Li04a, V. Liu, and . Issarny, Service Allocation in Selfish Mobile Ad hoc Networks Using Vickrey Auction, Current Trends in Database Technology -EDBT 2004 Workshops, pp.385-394, 2004.

J. Liu and V. Issarny, Enhanced Reputation Mechanism for Mobile Ad Hoc Networks, Proceedings of the Second iTrust International Conference, 2004.
DOI : 10.1007/978-3-540-24747-0_5

URL : https://hal.archives-ouvertes.fr/inria-00414803

F. [. Lahlou and . Jegou, European Disappearing Computer Privacy Design Guidelines V1.1, 2004.

[. Lou, W. Liu, and Y. Fang, SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks, INFOCOM 2004: Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, 2004.

S. Lahlou, M. Langheinrich, C. Röcker, and W. , Privacy and trust issues with invisible computers, Communications of the ACM, vol.48, issue.3, 2005.
DOI : 10.1145/1047671.1047705

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.325.5906

[. Lamanna, J. Skene, and W. Emmerich, SLAng: A language for defining service level agreements, The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems, 2003. FTDCS 2003. Proceedings., 2003.
DOI : 10.1109/FTDCS.2003.1204317

J. Loughry and D. A. Umphress, Information leakage from optical emanations, ACM Transactions on Information and System Security, vol.5, issue.3, 2002.
DOI : 10.1145/545186.545189

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.5222

S. Mann, Guest Editor's Introduction: Wearable Computing-Toward Humanistic Intelligence, IEEE Intelligent Systems, vol.16, issue.3, 2001.
DOI : 10.1109/5254.940020

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.4991

T. Gary and . Marx, Murky Conceptual Waters: The Public and the Private, Ethics and Information Technology, vol.3, issue.3, pp.157-169, 2001.

J. Mchugh, Handbook for the Computer Security Certification of Trusted Systems, chapter Covert Channel Analysis, 1995.

K. Mahesh, S. R. Marina, and . Das, On-demand Multipath Distance Vector Routing in Ad Hoc Networks, Ninth International Conference on Network Protocols, 2001.

[. Melchor and Y. Deswarte, pMIX: Untraceability for Small Hiding Groups., Fourth IEEE International Symposium on Network Computing and Applications, pp.29-40, 2005.
DOI : 10.1109/NCA.2005.40

[. Melchor and Y. Deswarte, From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications, NCA '06: Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, pp.163-172, 2006.

]. R. Mil93 and . Milner, The Polyadic ?-Calculus: A Tutorial, Logic and Algebra of Specification, 1993.

W. J. Mitchell, City of Bits: Space, Place, and the Infobahn, 1995.

[. Milanovic and M. Malek, Current solutions for Web service composition, IEEE Internet Computing, vol.8, issue.6, 2004.
DOI : 10.1109/MIC.2004.58

C. [. Mccahill and . Norris, CCTV Systems in London -Their Structure and Practices, 2003.

S. Ben-mokhtar, D. Preuveneers, N. Georgantas, V. Issarny, and Y. Berbers, EASY: Efficient semAntic Service discoverY in pervasive computing environments with QoS and context support, Journal of Systems and Software, vol.81, issue.5, p.81, 2008.
DOI : 10.1016/j.jss.2007.07.030

URL : https://hal.archives-ouvertes.fr/inria-00415930

Y. Miao, C. Siew, Z. Liu, and S. Li, Dynamical Cognitive Network An Extension of Fuzzy Cognitive Map, ICTAI '99: Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence, 1999.

J. Steven and . Murdoch, Covert Channel Vulnerabilities in Anonymity Systems, 2007.

P. Nebel, Vous Avez la Carte Mouchard? L'Hebdo, 2005.

S. [. Neustaedter and . Greenberg, The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness, pp.297-314, 2003.
DOI : 10.1007/978-3-540-39653-6_24

[. Nguyen and P. Minet, QoS Support and OLSR Routing in a Mobile ad hoc Network, ICNICONSMCL '06: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006.

]. Oas05b and . Oasis, Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0 Available at docs.oasis-open.org/ security/saml, 2005.

. Oas07 and . Oasis, Web Services Business Process Execution Language Version 2.0 Available at docs.oasis-open, 2007.

. [. O-'harrow and . Jr, No Place to Hide, 2005.

Y. [. Preuveneers and . Berbers, Prime Numbers Considered Useful: Ontology Encoding for Efficient Subsumption Testing, 2006.

D. Vincent, M. S. Park, and . Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, INFOCOM '97: Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution, 1997.

]. K. Per96 and . Perusich, Fuzzy Cognitive Maps for Policy Analysis, Proceedings of the International Symposium on Technology and Society Technical Expertise and Public Decisions, 1996.

D. [. Papazoglou and . Georgakopoulos, Service-Oriented Computing, Communications of the ACM, vol.46, issue.10, 2003.

[. Pretschner, M. Hilty, and D. Basin, Distributed usage control, Communications of the ACM, vol.49, issue.9, 2006.
DOI : 10.1145/1151030.1151053

T. [. Paolucci, T. R. Kawamura, K. P. Payne, and . Sycara, Semantic Matching of Web Services Capabilities, ISWC '02: First International Semantic Web Conference, 2002.
DOI : 10.1007/3-540-48005-6_26

E. Charles, E. M. Perkins, and . Royer, Ad-hoc On-Demand Distance Vector Routing, WMCSA '99: Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999.

B. Patra, A. Shankar, K. Choudhary, C. Srinathan, and . Pandu-rangan, Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary, CANS 2007: Proceedings of the 6th International Conference on Cryptology and Network Security, 2007.
DOI : 10.1007/978-3-540-76969-9_6

I. Elpiniki, C. Papageorgiou, P. P. Stylios, and . Groumpos, Unsupervised Learning Techniques for Fine-tuning Fuzzy Cognitive Map Causal Links, International Journal of Human-Computer Studies, vol.64, issue.8, pp.727-743, 2006.

P. Michael, P. Papazoglou, S. Traverso, F. Dustdar, and . Leymann, Service-Oriented Computing: State of the Art and Research Challenges, Computer, issue.11, p.40, 2007.

O. Michael and . Rabin, Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance, Journal of the ACM, vol.36, issue.2, 1989.

[. Raverdy, S. Armand, and V. Issarny, Scalability Study of the MUS- DAC Platform for Service Discovery in B3G Networks, WWRF-17: Proceedings of Wireless World Research Forum Meeting, 2006.

]. K. Ran04 and . Ranganathan, Trustworthy Pervasive Computing: the Hard Security Problems, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004.

L. [. Reagle and . Cranor, The platform for privacy preferences, Communications of the ACM, vol.42, issue.2, pp.48-55, 1999.
DOI : 10.1145/293411.293455

M. [. Rong, V. Fredj, N. Issarny, and . Georgantas, Mobility management in B3G networks, International workshop on Engineering of software services for pervasive environments in conjunction with the 6th ESEC/FSE joint meeting, ESSPE '07, 2007.
DOI : 10.1145/1294904.1294910

URL : https://hal.archives-ouvertes.fr/inria-00415918

M. Román, C. Hess, R. Cerqueira, A. Ranganathan, R. H. Campbell et al., A middleware infrastructure for active spaces, IEEE Pervasive Computing, vol.1, issue.4, 2002.
DOI : 10.1109/MPRV.2002.1158281

M. Roman, F. Kon, and R. H. Campbell, Reflective Middleware: From Your Desk to Your Hand, IEEE Distributed Systems Online, vol.2, issue.5, 2001.

M. Rennhard and B. Plattner, Introducing MorphMix, Proceeding of the ACM workshop on Privacy in the Electronic Society , WPES '02, 2002.
DOI : 10.1145/644527.644537

G. P. Gruia-catalin-roman, A. L. Picco, and . Murphy, Software Engineering for Mobility: a Roadmap, ICSE '00: Proceedings of the Conference on The Future of Software Engineering, 2000.

A. [. Reiter and . Rubin, Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998.
DOI : 10.1145/290163.290168

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.864

O. Raverdy, A. Riva, R. De-la-chapelle, V. Chibout, and . Issarny, Efficient Context-aware Service Discovery in Multi-Protocol Pervasive Environments, 7th International Conference on Mobile Data Management (MDM'06), 2006.
DOI : 10.1109/MDM.2006.78

URL : https://hal.archives-ouvertes.fr/inria-00415112

A. [. Rivest, L. Shamir, and . Adleman, A Method for Obtaining Digital Signatures and Public-key Cryptosystems, Communications of the ACM, vol.21, issue.2, 1978.

P. [. Reed, D. M. Syverson, and . Goldschlag, Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, 1998.
DOI : 10.1109/49.668972

A. [. Rivest and Y. Tauman, How to Leak a Secret, Proceedings of ASIACRYPT '01, pp.552-565, 2001.
DOI : 10.1007/3-540-45682-1_32

]. M. Sat01 and . Satyanarayanan, Pervasive Computing: Vision and Challenges, IEEE Personal Communications, vol.8, issue.4, 2001.

[. Savill, Magistrate Fined for Keeping Lost Rolex. Telegraph Available at www.telegraph.co.uk/news/main. jhtml?xml=/news, 2005.

B. [. Sherwood, A. Bhattacharjee, and . Srinivasan, P5: A Protocol for Scalable Anonymous Communication, SP '02: Proceedings of IEEE Security and Privacy Symposium, 2002.

F. Stajano and J. Crowcroft, Ambient Intelligence: Impact on Embedded System Design, chapter The Butt of the Iceberg: Hidden Security Problems of Ubiquitous Systems, 2003.

[. Sion and B. Carbunar, On the Practicality of Private Information Retrieval, NDSS'07: Proceedings of the 14th Annual Network & Distributed System Security Symposium, 2007.

B. Schneier, Applied Cryptography, 1996.

B. Schneier, The Myth of the 'Transparent Society'. Wired Commentary -Security Matters Available at www.wired.com/ politics/security/commentary/securitymatters, 2008.

D. Sg99-]-chrysostomos, P. P. Stylios, and . Groumpos, Fuzzy Cognitive Maps: A Model for Intelligent Supervisory Control Systems, Computers in Industry, vol.39, issue.3, pp.229-238, 1999.

P. [. Stylios and . Groumpos, Fuzzy Cognitive Maps in Modeling Supervisory Control Systems, Journal of Intelligent and Fuzzy Systems, vol.8, issue.2, 2000.

D. Sgg97-]-chrysostomos, . Stylios, C. Voula, P. P. Georgopoulos, and . Groumpos, The Use of Fuzzy Cognitive Maps in Modeling Systems, Proceedings of the 5th IEEE Mediterranean Conference on Control and Systems, 1997.

M. [. Singh and . Huhns, Service-Oriented Computing -Semantics, Processes, Agents, 2005.

]. C. Sha48 and . Shannon, A Mathematical Theory of Communication. The Bell System Technical Journal, 1948.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, 1979.
DOI : 10.1145/359168.359176

J. [. Sirin, B. Hendler, and . Parsia, Semi-automatic Composition of Web Services Using Semantic Descriptions, Web Services: Modeling, Architecture and Infrastructure Workshop in conjunction with ICEIS 2003, 2003.

V. [. Sailhan and . Issarny, Scalable Service Discovery for MANET, Third IEEE International Conference on Pervasive Computing and Communications, 2005.
DOI : 10.1109/PERCOM.2005.36

URL : https://hal.archives-ouvertes.fr/inria-00414946

M. [. Srinathan, C. Kumar, and . Pandu-rangan, Asynchronous Secure Communication Tolerating Mixed Adversaries, ASI- ACRYPT '02: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, 2002.
DOI : 10.1007/3-540-36178-2_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.3989

[. Sprague, Fireman Attempted to Set Fire to House, Charges Say. The Seattle Times Available at seattletimes. nwsource.com/html/localnews, 2004.

H. Jerome, M. D. Saltzer, and . Schroeder, The Protection of Information in Computing Systems, SOSP '73: Proceedings of the Fourth ACM Symposium on Operating Systems Principles, pp.1278-1308, 1973.

A. Serjantov and P. Sewell, Passive-Attack Analysis for Connectionbased Anonymity Systems, International Journal of Information Security, vol.4, issue.3, 2005.

[. Strahilevitz, A Social Networks Theory of Privacy The Law School -The University of Chicago, 2004.

]. L. Swe00 and . Sweeney, Uniqueness of Simple Demographics in the U.S. Population, 2000.

K. Sycara, J. Lu, Y. , M. Klusch, and S. Wido, Matchmaking among Heterogeneous Agents on the Internet, AAAI Spring Symposium on Intelligent Agents in Cyberspace, 1999.

[. Trastour, C. Bartolini, and J. Gonzalez-castillo, A Semantic Web Approach to Service Description for Matchmaking of Services, SWWS '01: Proceedings of the International Semantic Web Working Symposium, 2001.

J. F. Traub, Y. Yemini, and H. Wo´zniakowskiwo´zniakowski, The statistical security of a statistical database, ACM Transactions on Database Systems, vol.9, issue.4, pp.672-679, 1984.
DOI : 10.1145/1994.383392

S. Vinoski, Where is is middleware, YAWL: Yet Another Workflow Language. Information Systems, 2002.
DOI : 10.1109/4236.991448

J. Waldo, The Jini architecture for network-centric computing, Communications of the ACM, vol.42, issue.7, pp.76-82, 1999.
DOI : 10.1145/306549.306582

P. Watson and .. U. , Military Secrets for Sale at Afghan Bazaar Available at articles.latimes.com, Los Angeles Times, issue.10, 2006.

L. [. Warren and . Brandeis, The Right to Privacy, Harvard Law Review, vol.4, issue.5, p.1890
DOI : 10.2307/1321160

Y. Wang and Y. Desmedt, Perfectly Secure Message Transmission Revisited, EUROCRYPT '02: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, 2002.
DOI : 10.1109/TIT.2008.921676

[. Weiser, The Computer for the 21st Century, Scientific American, vol.265, issue.3, 1991.

[. Weiser, Some Computer Science Issues in Ubiquitous Computing, Communications of the ACM, vol.36, issue.7, 1993.

A. F. Westin, Privacy and Freedom, 1967.

A. F. Westin, Databanks in a free society, ACM SIGCAS Computers and Society, vol.4, issue.1, 1972.
DOI : 10.1145/958616.958619

R. [. Weiser, J. S. Gold, and . Brown, The origins of ubiquitous computing research at PARC in the late 1980s, IBM Systems Journal, vol.38, issue.4, 1999.
DOI : 10.1147/sj.384.0693

]. M. Wie98 and . Wiener, Performance Comparison of Public-Key Cryptosystems, RSA Laboratories' CryptoBytes, 1998.

B. Warneke, M. Last, B. Liebowitz, and K. S. Pister, Smart Dust: communicating with a cubic-millimeter computer, Computer, vol.34, issue.1, 2001.
DOI : 10.1109/2.895117

[. Williams and R. Sion, Usable PIR, NDSS'08: Proceedings of the 15th Annual Network & Distributed System Security Symposium, 2008.

R. Want, B. N. Schilit, N. I. Adams, R. Gold, K. Petersen et al., Mobile Computing, chapter The Parctab Ubiquitous Computing Experiment. The Springer International Series in Engineering and Computer Science, 1996.

L. Wang, L. Zhang, Y. Shu, and M. Dong, Multipath Source Routing in Wireless Ad hoc Networks, Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2000.

J. Yu, B. Benatallah, F. Casati, and F. Daniel, Understanding Mashup Development, IEEE Internet Computing, vol.12, issue.5, 2008.
DOI : 10.1109/MIC.2008.114

B. Zeng, A. H. Benatallah, M. Ngu, J. Dumas, H. Kalagnanam et al., QoS-Aware Middleware for Web Services Composition, IEEE Transactions on Software Engineering, vol.30, issue.5, 2004.

L. Zhou and Z. J. Haas, Securing Ad Hoc Networks, IEEE Network, vol.13, issue.6, 1999.

P. Zimmermann, Testimony of Philip R. Zimmermann to the Subcommittee on Science, Technology, and Space of the US Senate Committee on Commerce, Science, and Transportation, 1996.

M. [. Zhu, L. Mutka, and . Ni, PrudentExposure: A Private and User-centric Service Discovery Protocol, PERCOM '04: 2nd IEEE International Conference on Pervasive Computing and Communications, 2004.

[. Zhu, M. W. Mutka, and L. M. Ni, Service Discovery in Pervasive Computing Environments, IEEE Pervasive Computing, vol.4, issue.4, pp.81-90, 2005.

J. [. Zhao and . Stasko, Evaluating image filtering based techniques in media space applications, Proceedings of the 1998 ACM conference on Computer supported cooperative work , CSCW '98, pp.11-18, 1998.
DOI : 10.1145/289444.289450

A. Moormann, Z. , and J. M. Wing, Specification Matching of Software Components, ACM Transactions on Software Engineering and Methodology, vol.6, issue.4, 1997.

W. [. Zhu, M. W. Zhu, L. Mutka, and . Ni, Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments, PERCOM '05: 3rd IEEE International Conference on Pervasive Computing and Communications, 2005.