Auditing Compliance with a Hippocratic Database Efficient Management of Transitive Relationships in Large Data and Knowledge Bases, VLDB '04: Proceedings of the 13th International Conference on Very Large Data Bases ACM SIGMOD International Conference on Management of Data (SIGMOD '89), pp.516-527, 1989. ,
The Intellectual Challenge of CSCW: the Gap between Social Requirements and Technical Feasibility, Human-Computer Interaction, vol.15, issue.2, 2000. ,
Diversity coding for transparent self-healing and fault-tolerant communication networks, IEEE Transactions on Communications, vol.41, issue.11, p.41, 1993. ,
DOI : 10.1109/26.241748
Brazil Senate Orders Google to Identify Website Pedophiles, 2008. ,
Google Hands Over Data on Suspected Pedophiles to Brazil Available at afp.google.com/article, p.5, 2008. ,
Adaptive Random Fuzzy Cognitive Maps, IBERAMIA 2002: Proceedings of the 8th Ibero-American Conference on AI, 2002. ,
DOI : 10.1007/3-540-36131-6_41
Efficient Implementation of Lattice Operations, ACM Transactions on Programming Languages and Systems, vol.11, issue.1, 1989. ,
Hippocratic Databases, 28th International Conference on Very Large Databases (VLDB), 2002. ,
DOI : 10.1016/B978-155860869-6/50021-4
Coercing Privacy, William and Mary Law Review, vol.40, 1999. ,
Charting Past, Present, and Future Research in Ubiquitous Computing, ACM Transactions on Computer-Human Interaction, vol.7, issue.1, 2000. ,
Routing through the mist: privacy preserving communication in ubiquitous computing environments, Proceedings 22nd International Conference on Distributed Computing Systems, pp.74-83, 2002. ,
DOI : 10.1109/ICDCS.2002.1022244
QoS-based Discovery and Ranking of Web Services, 2007 16th International Conference on Computer Communications and Networks, 2007. ,
DOI : 10.1109/ICCCN.2007.4317873
Security-control Methods for Statistical Databases: a Comparative Study, ACM Computing Surveys, vol.21, issue.4, pp.515-556, 1989. ,
Wireless Mesh Networks: A Survey, Computer Networks and ISDN Systems, vol.47, issue.4, 2005. ,
Structure of Decision: The Cognitive Maps of Political Elites, 1976. ,
Web Services Dynamic Discovery (WS-Discovery) Available at specs.xmlsoap.org/ws, 2005. ,
Towards Knowledge Societies, UNESCO World Report UNESCO, 2005. ,
Monster attack steals user data, 2007. ,
Separation of duties for access control enforcement in workflow environments, IBM Systems Journal, vol.40, issue.3, 2001. ,
DOI : 10.1147/sj.403.0666
A security machanism for statistical database, ACM Transactions on Database Systems, vol.5, issue.3, pp.316-3338, 1980. ,
DOI : 10.1145/320613.320617
The effects of filtered video on awareness and privacy, Proceedings of the 2000 ACM conference on Computer supported cooperative work , CSCW '00, pp.1-10, 2000. ,
DOI : 10.1145/358916.358935
The Panopticon Writings. Verso, 1995. ,
Semantic Middleware for Service-Oriented Pervasive Computing, 2007. ,
URL : https://hal.archives-ouvertes.fr/tel-00469457
Web MIXes: A System for Anonymous and Unobservable Internet Access, International workshop on Designing privacy enhancing technologies, 2001. ,
DOI : 10.1007/3-540-44702-4_7
COCOA : ConversationBased Service Composition for Pervasive Computing Environments, 2006 ACS/IEEE International Conference on Pervasive Services, 2006. ,
DOI : 10.1109/PERSER.2006.1652204
A Face Is Exposed for AOL Searcher No. 4417749. The New York Times, 2006. ,
Towards High-Precision Service Retrieval, ISWC '02: Proceedings of the First International Semantic Web Conference on The Semantic Web, 2002. ,
DOI : 10.1007/3-540-48005-6_9
Efficient Semantic Service Discovery in Pervasive Computing Environments, Proceedings of Middleware'06, 2006. ,
DOI : 10.1007/11751113_10
URL : https://hal.archives-ouvertes.fr/inria-00415115
The Semantic Web, Scientific American, vol.284, issue.5, 2001. ,
DOI : 10.1038/scientificamerican0501-34
Space/Time Trade-offs in Hash Coding with Allowable Errors, Communication of the ACM, vol.13, issue.7, 1970. ,
QoS for Ad hoc Networking Based on Multiple Metrics: Bandwidth and Delay, Mobile and Wireless Communications Networks, 2003. ,
DOI : 10.1142/9789812791146_0004
The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, 1989. ,
DOI : 10.1109/SECPRI.1989.36295
Towards Semi-automated Workflow-Based Aggregation of Web Services, ICSOC 2005: Proceedings of the Third International Conference on Service-Oriented Computing, 2005. ,
DOI : 10.1007/11596141_17
From BPEL Processes to YAWL Workflows, Proceedings of the Third International Workshop on Web Services and Formal Methods, 2006. ,
DOI : 10.1007/11841197_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.1843
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000. ,
Roberto Speicys Cardoso, Aitor Urbieta, and Nikolaos Georgantas. Discovering Social Services in Pervasive Environments with Privacy ? Demonstration Paper, ACM/I- FIP/USENIX 8th International Middleware Conference, 2007. ,
Some Thoughts on the Social Implications of Computers and Privacy, 1967. ,
The Transparent Society Wired Magazine, 1996. ,
The Transparent Society: Will Technology Force us to Choose Between Privacy and Freedom, Basic Books, 1999. ,
Interoperable Semantic & Syntactic Service Matching for Ambient Computing Environments, Proceedings of the 1st International Workshop on Ad-hoc Ambient Computing, 2008. ,
Location privacy in pervasive computing, IEEE Pervasive Computing, vol.2, issue.1, pp.46-55, 2003. ,
DOI : 10.1109/MPRV.2003.1186725
Are Countrywide's Systems Designed Around Need to Know?, 2008. ,
Open letter to P3P developers & replies, Proceedings of the tenth conference on Computers, freedom and privacy challenging the assumptions, CFP '00, pp.157-164, 2000. ,
DOI : 10.1145/332186.332276
Exploiting Reflection in Mobile Computing Middleware. SIG- MOBILE Mobile Comput, Commun. Rev, vol.6, issue.4, pp.34-44, 2002. ,
EVEY, Proceedings of the 8th ACM/IFIP/USENIX international conference on Middleware , Middleware '07, 2007. ,
DOI : 10.1145/1377943.1377965
Exploring Multi-path Communication in Hybrid Wireless Ad Hoc Networks, 1st International Workshop on Ad-hoc Ambient Computing, 2008. ,
Perceptual user interfaces: things that see, Communications of the ACM, vol.43, issue.3, pp.54-64, 2000. ,
DOI : 10.1145/330534.330540
Orchestrating composite Web services under data flow constraints, IEEE International Conference on Web Services (ICWS'05), 2005. ,
DOI : 10.1109/ICWS.2005.88
Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI, IEEE Internet Computing, vol.6, issue.2, 2002. ,
DOI : 10.1109/4236.991449
Adaptive Fuzzy Cognitive Maps for Hyperknowledge Representation in Strategy Formation Process, Proceedings of International Panel Conference on Soft and Intelligent Computing, 1996. ,
Efficient matchmaking and directory services, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003), 2003. ,
DOI : 10.1109/WI.2003.1241176
URL : http://infoscience.epfl.ch/record/52498
Security Conscious Web Service Composition, 2006 IEEE International Conference on Web Services (ICWS'06), 2006. ,
DOI : 10.1109/ICWS.2006.115
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.9228
Trade Secrets Protection and Exploitation, 1998. ,
Private Information Retrieval, FOCS'95: Proceedings of the 36th Annual IEEE Conference on Foundations of Computer Science, 1995. ,
Group Signatures, Eurocrypt '91, pp.257-265, 1991. ,
DOI : 10.1007/3-540-46416-6_22
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981. ,
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing, DIS '04:Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques, pp.233-242, 2004. ,
Architecting Pervasive Computing Systems for Privacy: A Survey, 2007 Working IEEE/IFIP Conference on Software Architecture (WICSA'07), 2007. ,
DOI : 10.1109/WICSA.2007.11
URL : https://hal.archives-ouvertes.fr/inria-00415925
Energy-efficient middleware-layer multi-radio networking: An assessment in the area of service discovery, Computer Networks, vol.52, issue.1, 2008. ,
DOI : 10.1016/j.comnet.2007.09.018
URL : https://hal.archives-ouvertes.fr/inria-00567860
Internet privacy concerns confirm the case for intervention, Communications of the ACM, vol.42, issue.2, pp.60-67, 1999. ,
DOI : 10.1145/293411.293475
A P3P Preference Exchange Language 1.0 (APPEL1.0). W3C Working Draft, 2002. ,
Notes on the Wang et al. 2 63 SHA-1 Differential Path, Cryptology ePrint Archive Report, vol.474, 2007. ,
Redescribing Privacy: Identity, Difference, and the Abortion Controversy, Columbia Journal of Gender and Law, vol.43, issue.3, 1992. ,
Incentives Build Robustness in BitTorrent In First Workshop on Economics of Peer-to-Peer Systems, pp.116-121, 2003. ,
DRM and privacy, Communications of the ACM, vol.46, issue.4, pp.46-49, 2003. ,
DOI : 10.1145/641205.641230
Privacy and Identity Management for Europe -PRIME White Paper V1.0 Available at www.prime-project.eu.org/ public, 2005. ,
Information Theoretic Security, chapter Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary, 2008. ,
DOI : 10.1007/978-3-540-85093-9_15
Web Privacy with P3P, 2002. ,
The Size of a Share Must Be Large, Journal of Cryptology, vol.10, issue.4, 1997. ,
Rule Based Fuzzy Cognitive Maps: Fuzzy Causal Relations. In CIMCA'99: The 1999 International Conference on Computational Intelligence for Modelling, Control and Automation Issues on the Stability of Fuzzy Cognitive Maps and Rule-based Fuzzy Cognitive Maps, Proceedings of the 2002 Annual Meeting of the North American Fuzzy Information Processing Society, 1999. ,
An Architecture for a Secure Service Discovery Service, MobiCom '99: 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, 1999. ,
Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003. ,
DOI : 10.1109/SECPRI.2003.1199323
Perfectly Secure Message Transmission, Journal of the ACM, vol.40, issue.1, 1993. ,
Secure statistical databases with random sample queries, ACM Transactions on Database Systems, vol.5, issue.3, pp.291-315, 1980. ,
DOI : 10.1145/320613.320616
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Virtual Worlds as Fuzzy Cognitive Maps, Proceedings of the IEEE Virtual Reality Annual International Symposium, 1993. ,
A Formal Model of Obfuscation and Negotiation for Location Privacy, Proceedings of PERVASIVE 2005, pp.152-170, 2005. ,
DOI : 10.1007/11428572_10
Tor: The Second-Generation Onion Router, Proceedings of the 13th USENIX, 2004. ,
The Age of Discontinuity: Guidelines to Our Changing Society, 1969. ,
Broadcast Anti-Jamming Systems, ICON '99: Proceedings of the 7th IEEE International Conference on Networks, 1999. ,
Critical Information Infrastructures Security, chapter Revisiting Colored Networks and Privacy Preserving Censorship, 2006. ,
DOI : 10.1007/11962977_12
RFC3174: US Secure Hash Algorithm 1 (SHA1), 2001. ,
Engineering Distributed Objects, 2000. ,
DOI : 10.1007/3-540-45254-0
Software engineering and middleware, Proceedings of the conference on The future of Software engineering , ICSE '00, 2000. ,
DOI : 10.1145/336512.336542
Semantic Annotations for WSDL and XML Schema, W3C Working Draft, 2007. ,
Protecting Privacy in Surveillance Societies, 1989. ,
Tarzan, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.193-206, 2002. ,
DOI : 10.1145/586110.586137
Microsoft Says Credentica Acquisition will Help Users Protect Privacy, Network World, 2008. ,
A Fuzzy Approach to a Belief-Based Trust Computation, Trust, Reputation, and Security: Theories and Practice, 2003. ,
DOI : 10.1007/3-540-36609-1_7
Secure Communication in Minimal Connectivity Models, Journal of Cryptology, vol.13, issue.1, 2000. ,
The Challenges of Mobile Computing, Computer, vol.27, issue.4, 1994. ,
Database Nation: the Death of Privacy in the 21st Century, 2000. ,
Interference of bluetooth and IEEE 802.11, Proceedings of the 4th ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems , MSWIM '01, 2001. ,
DOI : 10.1145/381591.381598
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003. ,
DOI : 10.1145/1066116.1189037
Protecting data privacy in private information retrieval schemes, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.151-160, 1998. ,
DOI : 10.1145/276698.276723
Revisiting the Uniqueness of Simple Demographics in the U.S. Population, WPES '06: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, 2006. ,
Déclaration des Droits de l'Homme et du Citoyen, 1789 ,
world: Experiences with a Pervasive Computing Architecture, IEEE Pervasive Computing, vol.3, issue.3, 2004. ,
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication, 2003. ,
Onion Routing for Anonymous and Private Internet Connections, Communications of the ACM, vol.42, issue.2, 1999. ,
Mixing Email with Babel, SNDSS '96: Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996. ,
Privacy-enhancing technologies for the Internet, Proceedings IEEE COMPCON 97. Digest of Papers, 1997. ,
DOI : 10.1109/CMPCON.1997.584680
Extended Fuzzy Cognitive Maps, IEEE International Conference on Fuzzy Systems, 1992. ,
Media Rights And Intellectual Property, 2005. ,
A Petri Net-based Model for Web Service Composition, ADC '03: Proceedings of the 14th Australasian database conference, 2003. ,
An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.177-189, 2004. ,
DOI : 10.1145/990064.990087
Complete Characterization of Adversaries Tolerable in Secure Multi-party Computation, PODC '97: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, 1997. ,
Privacy risk models for designing privacy-sensitive ubiquitous computing systems, Proceedings of the 2004 conference on Designing interactive systems processes, practices, methods, and techniques, DIS '04, pp.91-100, 2004. ,
DOI : 10.1145/1013115.1013129
Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems, Proceedings of the 1996 ACM conference on Computer supported cooperative work , CSCW '96, pp.248-257, 1996. ,
DOI : 10.1145/240080.240295
Privacy in the Information Age: Stakeholders, Interests and Values, Journal of Business Ethics, vol.22, pp.27-38, 1999. ,
Developing Ambient Intelligence Systems: A Solution based on Web Services, Automated Software Engineering, vol.12, issue.1, 2005. ,
DOI : 10.1023/B:AUSE.0000049210.42738.00
URL : https://hal.archives-ouvertes.fr/inria-00414951
An identifiability-based access control model for privacy protection in open systems, Proceedings of the 2004 ACM workshop on Privacy in the electronic society , WPES '04, 2004. ,
DOI : 10.1145/1029179.1029194
Ad hoc Networking, chapter DSR: the Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, pp.139-172, 2001. ,
Optimized link state routing protocol for ad hoc networks, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century., 2001. ,
DOI : 10.1109/INMIC.2001.995315
URL : https://hal.archives-ouvertes.fr/inria-00471622
UPnP Design by Example, 2003. ,
The case for reflective middleware, Communications of the ACM, vol.45, issue.6, pp.33-38, 2002. ,
DOI : 10.1145/508448.508470
A flexible qos-aware routing protocol for infrastructureless b3g networks, Proceedings of the 24th Annual ACM Symposium on Applied Computing -Mobile Computing and Applications Track, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00413480
On perfectly secure communication over arbitrary networks, Proceedings of the twenty-first annual symposium on Principles of distributed computing , PODC '02, 2002. ,
DOI : 10.1145/571825.571858
Towards Meeting the Privacy Challenge: Adapting DRM, ACM CCS-9 Workshop, pp.118-136, 2003. ,
DOI : 10.1007/978-3-540-44993-5_8
Using fuzzy cognitive map for the relationship management in airline service, Expert Systems with Applications, vol.26, issue.4, 2004. ,
DOI : 10.1016/j.eswa.2003.10.012
Towards a Practical Public-key Cryptosystem, 1978. ,
Fuzzy Cognitive Maps, International Journal of Man-Machine Studies, vol.24, issue.1, 1986. ,
Neural Networks and Fuzzy Systems: A Dynamical Systems Approach to Machine Intelligence, 1991. ,
Secret Sharing Made Short, CRYPTO '93: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, 1994. ,
DOI : 10.1007/3-540-48329-2_12
Modeling and Analyzing Separation of Duties in Workflow Environments, Sec '01: Proceedings of the 16th International Conference on Information Security: Trusted Information, 2001. ,
DOI : 10.1007/0-306-46998-7_14
Near optimal hierarchical encoding of types, ECOOP'97: 11th European Conference on Object Oriented Programming, 1997. ,
DOI : 10.1007/BFb0053377
An anonymous communication technique using dummies for location-based services, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005., pp.88-97, 2005. ,
DOI : 10.1109/PERSER.2005.1506394
A Note on the Confinement Problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
Privacy by Design -Principles of Privacy-Aware Ubiquitous Systems, UbiComp 2001: Proceedings of the 3rd international conference on Ubiquitous Computing, pp.273-291, 2001. ,
A Privacy Awareness System for Ubiquitous Computing Environments, UbiComp 2002: Proceedings of the 4th international conference on Ubiquitous Computing, pp.237-245, 2002. ,
Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity, 2004. ,
Code -version 2.0. Basic Books, 2006. ,
AODV-BR: backup routing in ad hoc networks, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540), 2000. ,
DOI : 10.1109/WCNC.2000.904822
Split multipath routing with maximally disjoint paths in ad hoc networks, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001. ,
DOI : 10.1109/ICC.2001.937262
A software framework for matchmaking based on semantic web technology, Proceedings of the twelfth international conference on World Wide Web , WWW '03, 2004. ,
DOI : 10.1145/775152.775199
Service Allocation in Selfish Mobile Ad hoc Networks Using Vickrey Auction, Current Trends in Database Technology -EDBT 2004 Workshops, pp.385-394, 2004. ,
Enhanced Reputation Mechanism for Mobile Ad Hoc Networks, Proceedings of the Second iTrust International Conference, 2004. ,
DOI : 10.1007/978-3-540-24747-0_5
URL : https://hal.archives-ouvertes.fr/inria-00414803
European Disappearing Computer Privacy Design Guidelines V1.1, 2004. ,
SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks, INFOCOM 2004: Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, 2004. ,
Privacy and trust issues with invisible computers, Communications of the ACM, vol.48, issue.3, 2005. ,
DOI : 10.1145/1047671.1047705
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.325.5906
SLAng: A language for defining service level agreements, The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems, 2003. FTDCS 2003. Proceedings., 2003. ,
DOI : 10.1109/FTDCS.2003.1204317
Information leakage from optical emanations, ACM Transactions on Information and System Security, vol.5, issue.3, 2002. ,
DOI : 10.1145/545186.545189
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.5222
Guest Editor's Introduction: Wearable Computing-Toward Humanistic Intelligence, IEEE Intelligent Systems, vol.16, issue.3, 2001. ,
DOI : 10.1109/5254.940020
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.4991
Murky Conceptual Waters: The Public and the Private, Ethics and Information Technology, vol.3, issue.3, pp.157-169, 2001. ,
Handbook for the Computer Security Certification of Trusted Systems, chapter Covert Channel Analysis, 1995. ,
On-demand Multipath Distance Vector Routing in Ad Hoc Networks, Ninth International Conference on Network Protocols, 2001. ,
pMIX: Untraceability for Small Hiding Groups., Fourth IEEE International Symposium on Network Computing and Applications, pp.29-40, 2005. ,
DOI : 10.1109/NCA.2005.40
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications, NCA '06: Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, pp.163-172, 2006. ,
The Polyadic ?-Calculus: A Tutorial, Logic and Algebra of Specification, 1993. ,
City of Bits: Space, Place, and the Infobahn, 1995. ,
Current solutions for Web service composition, IEEE Internet Computing, vol.8, issue.6, 2004. ,
DOI : 10.1109/MIC.2004.58
CCTV Systems in London -Their Structure and Practices, 2003. ,
EASY: Efficient semAntic Service discoverY in pervasive computing environments with QoS and context support, Journal of Systems and Software, vol.81, issue.5, p.81, 2008. ,
DOI : 10.1016/j.jss.2007.07.030
URL : https://hal.archives-ouvertes.fr/inria-00415930
Dynamical Cognitive Network An Extension of Fuzzy Cognitive Map, ICTAI '99: Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence, 1999. ,
Covert Channel Vulnerabilities in Anonymity Systems, 2007. ,
Vous Avez la Carte Mouchard? L'Hebdo, 2005. ,
The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness, pp.297-314, 2003. ,
DOI : 10.1007/978-3-540-39653-6_24
QoS Support and OLSR Routing in a Mobile ad hoc Network, ICNICONSMCL '06: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ,
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0 Available at docs.oasis-open.org/ security/saml, 2005. ,
Web Services Business Process Execution Language Version 2.0 Available at docs.oasis-open, 2007. ,
No Place to Hide, 2005. ,
Prime Numbers Considered Useful: Ontology Encoding for Efficient Subsumption Testing, 2006. ,
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, INFOCOM '97: Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution, 1997. ,
Fuzzy Cognitive Maps for Policy Analysis, Proceedings of the International Symposium on Technology and Society Technical Expertise and Public Decisions, 1996. ,
Service-Oriented Computing, Communications of the ACM, vol.46, issue.10, 2003. ,
Distributed usage control, Communications of the ACM, vol.49, issue.9, 2006. ,
DOI : 10.1145/1151030.1151053
Semantic Matching of Web Services Capabilities, ISWC '02: First International Semantic Web Conference, 2002. ,
DOI : 10.1007/3-540-48005-6_26
Ad-hoc On-Demand Distance Vector Routing, WMCSA '99: Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999. ,
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary, CANS 2007: Proceedings of the 6th International Conference on Cryptology and Network Security, 2007. ,
DOI : 10.1007/978-3-540-76969-9_6
Unsupervised Learning Techniques for Fine-tuning Fuzzy Cognitive Map Causal Links, International Journal of Human-Computer Studies, vol.64, issue.8, pp.727-743, 2006. ,
Service-Oriented Computing: State of the Art and Research Challenges, Computer, issue.11, p.40, 2007. ,
Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance, Journal of the ACM, vol.36, issue.2, 1989. ,
Scalability Study of the MUS- DAC Platform for Service Discovery in B3G Networks, WWRF-17: Proceedings of Wireless World Research Forum Meeting, 2006. ,
Trustworthy Pervasive Computing: the Hard Security Problems, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. ,
The platform for privacy preferences, Communications of the ACM, vol.42, issue.2, pp.48-55, 1999. ,
DOI : 10.1145/293411.293455
Mobility management in B3G networks, International workshop on Engineering of software services for pervasive environments in conjunction with the 6th ESEC/FSE joint meeting, ESSPE '07, 2007. ,
DOI : 10.1145/1294904.1294910
URL : https://hal.archives-ouvertes.fr/inria-00415918
A middleware infrastructure for active spaces, IEEE Pervasive Computing, vol.1, issue.4, 2002. ,
DOI : 10.1109/MPRV.2002.1158281
Reflective Middleware: From Your Desk to Your Hand, IEEE Distributed Systems Online, vol.2, issue.5, 2001. ,
Introducing MorphMix, Proceeding of the ACM workshop on Privacy in the Electronic Society , WPES '02, 2002. ,
DOI : 10.1145/644527.644537
Software Engineering for Mobility: a Roadmap, ICSE '00: Proceedings of the Conference on The Future of Software Engineering, 2000. ,
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
DOI : 10.1145/290163.290168
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.864
Efficient Context-aware Service Discovery in Multi-Protocol Pervasive Environments, 7th International Conference on Mobile Data Management (MDM'06), 2006. ,
DOI : 10.1109/MDM.2006.78
URL : https://hal.archives-ouvertes.fr/inria-00415112
A Method for Obtaining Digital Signatures and Public-key Cryptosystems, Communications of the ACM, vol.21, issue.2, 1978. ,
Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, 1998. ,
DOI : 10.1109/49.668972
How to Leak a Secret, Proceedings of ASIACRYPT '01, pp.552-565, 2001. ,
DOI : 10.1007/3-540-45682-1_32
Pervasive Computing: Vision and Challenges, IEEE Personal Communications, vol.8, issue.4, 2001. ,
Magistrate Fined for Keeping Lost Rolex. Telegraph Available at www.telegraph.co.uk/news/main. jhtml?xml=/news, 2005. ,
P5: A Protocol for Scalable Anonymous Communication, SP '02: Proceedings of IEEE Security and Privacy Symposium, 2002. ,
Ambient Intelligence: Impact on Embedded System Design, chapter The Butt of the Iceberg: Hidden Security Problems of Ubiquitous Systems, 2003. ,
On the Practicality of Private Information Retrieval, NDSS'07: Proceedings of the 14th Annual Network & Distributed System Security Symposium, 2007. ,
Applied Cryptography, 1996. ,
The Myth of the 'Transparent Society'. Wired Commentary -Security Matters Available at www.wired.com/ politics/security/commentary/securitymatters, 2008. ,
Fuzzy Cognitive Maps: A Model for Intelligent Supervisory Control Systems, Computers in Industry, vol.39, issue.3, pp.229-238, 1999. ,
Fuzzy Cognitive Maps in Modeling Supervisory Control Systems, Journal of Intelligent and Fuzzy Systems, vol.8, issue.2, 2000. ,
The Use of Fuzzy Cognitive Maps in Modeling Systems, Proceedings of the 5th IEEE Mediterranean Conference on Control and Systems, 1997. ,
Service-Oriented Computing -Semantics, Processes, Agents, 2005. ,
A Mathematical Theory of Communication. The Bell System Technical Journal, 1948. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, 1979. ,
DOI : 10.1145/359168.359176
Semi-automatic Composition of Web Services Using Semantic Descriptions, Web Services: Modeling, Architecture and Infrastructure Workshop in conjunction with ICEIS 2003, 2003. ,
Scalable Service Discovery for MANET, Third IEEE International Conference on Pervasive Computing and Communications, 2005. ,
DOI : 10.1109/PERCOM.2005.36
URL : https://hal.archives-ouvertes.fr/inria-00414946
Asynchronous Secure Communication Tolerating Mixed Adversaries, ASI- ACRYPT '02: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, 2002. ,
DOI : 10.1007/3-540-36178-2_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.3989
Fireman Attempted to Set Fire to House, Charges Say. The Seattle Times Available at seattletimes. nwsource.com/html/localnews, 2004. ,
The Protection of Information in Computing Systems, SOSP '73: Proceedings of the Fourth ACM Symposium on Operating Systems Principles, pp.1278-1308, 1973. ,
Passive-Attack Analysis for Connectionbased Anonymity Systems, International Journal of Information Security, vol.4, issue.3, 2005. ,
A Social Networks Theory of Privacy The Law School -The University of Chicago, 2004. ,
Uniqueness of Simple Demographics in the U.S. Population, 2000. ,
Matchmaking among Heterogeneous Agents on the Internet, AAAI Spring Symposium on Intelligent Agents in Cyberspace, 1999. ,
A Semantic Web Approach to Service Description for Matchmaking of Services, SWWS '01: Proceedings of the International Semantic Web Working Symposium, 2001. ,
The statistical security of a statistical database, ACM Transactions on Database Systems, vol.9, issue.4, pp.672-679, 1984. ,
DOI : 10.1145/1994.383392
Where is is middleware, YAWL: Yet Another Workflow Language. Information Systems, 2002. ,
DOI : 10.1109/4236.991448
The Jini architecture for network-centric computing, Communications of the ACM, vol.42, issue.7, pp.76-82, 1999. ,
DOI : 10.1145/306549.306582
Military Secrets for Sale at Afghan Bazaar Available at articles.latimes.com, Los Angeles Times, issue.10, 2006. ,
The Right to Privacy, Harvard Law Review, vol.4, issue.5, p.1890 ,
DOI : 10.2307/1321160
Perfectly Secure Message Transmission Revisited, EUROCRYPT '02: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, 2002. ,
DOI : 10.1109/TIT.2008.921676
The Computer for the 21st Century, Scientific American, vol.265, issue.3, 1991. ,
Some Computer Science Issues in Ubiquitous Computing, Communications of the ACM, vol.36, issue.7, 1993. ,
Privacy and Freedom, 1967. ,
Databanks in a free society, ACM SIGCAS Computers and Society, vol.4, issue.1, 1972. ,
DOI : 10.1145/958616.958619
The origins of ubiquitous computing research at PARC in the late 1980s, IBM Systems Journal, vol.38, issue.4, 1999. ,
DOI : 10.1147/sj.384.0693
Performance Comparison of Public-Key Cryptosystems, RSA Laboratories' CryptoBytes, 1998. ,
Smart Dust: communicating with a cubic-millimeter computer, Computer, vol.34, issue.1, 2001. ,
DOI : 10.1109/2.895117
Usable PIR, NDSS'08: Proceedings of the 15th Annual Network & Distributed System Security Symposium, 2008. ,
Mobile Computing, chapter The Parctab Ubiquitous Computing Experiment. The Springer International Series in Engineering and Computer Science, 1996. ,
Multipath Source Routing in Wireless Ad hoc Networks, Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2000. ,
Understanding Mashup Development, IEEE Internet Computing, vol.12, issue.5, 2008. ,
DOI : 10.1109/MIC.2008.114
QoS-Aware Middleware for Web Services Composition, IEEE Transactions on Software Engineering, vol.30, issue.5, 2004. ,
Securing Ad Hoc Networks, IEEE Network, vol.13, issue.6, 1999. ,
Testimony of Philip R. Zimmermann to the Subcommittee on Science, Technology, and Space of the US Senate Committee on Commerce, Science, and Transportation, 1996. ,
PrudentExposure: A Private and User-centric Service Discovery Protocol, PERCOM '04: 2nd IEEE International Conference on Pervasive Computing and Communications, 2004. ,
Service Discovery in Pervasive Computing Environments, IEEE Pervasive Computing, vol.4, issue.4, pp.81-90, 2005. ,
Evaluating image filtering based techniques in media space applications, Proceedings of the 1998 ACM conference on Computer supported cooperative work , CSCW '98, pp.11-18, 1998. ,
DOI : 10.1145/289444.289450
Specification Matching of Software Components, ACM Transactions on Software Engineering and Methodology, vol.6, issue.4, 1997. ,
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments, PERCOM '05: 3rd IEEE International Conference on Pervasive Computing and Communications, 2005. ,