.. Architecture-des-composants-de-priserv, Auditing Compliance with a Hippocratic Database, Very Large Databases (VLDB), 2004.

P. Rakesh-agrawal, T. Bird, J. Grandison, S. Kiernan, W. Logan et al., Extending Relational Database Systems to Automatically Enforce Privacy Policies, IEEE Conference on Data Engineering (ICDE), 2005.

D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer, SETI@home: an experiment in public-resource computing, Communications of the ACM, vol.45, issue.11, 2002.
DOI : 10.1145/581571.581573

[. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, Very Large Databases (VLDB), 2002.
DOI : 10.1016/B978-155860869-6/50021-4

B. Keith and . Alexander, National Information Assurance (IA) Glossary - CNSS-4009, 2010.

[. Akbarinia, V. Martins, E. Pacitti, and P. Valduriez, Design and Implementation of APPA, Global Data Management

G. Baldoni, F. Cortese, and . Davide, [ANT] The Ants P2P Web Site, 2006.

[. Akbarinia, E. Pacitti, and P. Valduriez, Reducing Network Traffic in Unstructured P2P Systems Using Top-k Queries. Distributed and Parallel Databases, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00416447

D. Ahmed, L. G. Hadaller, H. Sung, M. A. Li, and . Soliman, A Survey of Data Management in Peer-to-Peer Systems, 2006.

J. Byun, E. Bertino, and N. Li, Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, 2005.
DOI : 10.1145/1063979.1063998

[. Blaze, J. Feigenbaum, and J. Lacy, Decentralized Trust Management [BIT] The BitTorrent web site, IEEE Symposium on Security and Privacy, 1996.

[. Bell, J. Leonard, and . Lapadula, Secure Computer Systems: Mathematical Foundations and Model. The MITRE Corporation, pp.74-244, 1973.

J. Byun and N. Li, Purpose based access control for privacy protection in relational database systems, The Very Large Database (VLDB) Journal, 2008.
DOI : 10.1007/s00778-006-0023-0

E. Bloustein, Privacy as an Aspect of Human Dignity, 1964.

H. Ronald, A. Brown, and . Prabhakar, Digital Signature Standard (DSS) Federal Information Processing Standards, 2009.

[. Cuenca-acuna, R. P. Martin, and T. D. Nguyen, Autonomous Replication for High Availability in Unstructured P2P Systems, IEEE Symposium on Reliable Distributed Systems (SRDS), 2003.

P. Castro, A. Druschel, A. Ganesh, D. S. Rowstron, and . Wallach, Secure Routing for Structured Peer-to-Peer Overlay Networks, Operating Systems Design and Implementation (OSDI), 2002.

R. David, J. Choffnes, D. Duch, R. Malmgren, F. E. Guiermà et al., SwarmScreen: Privacy Through Plausible Deniability in P2P Systems, 2009.

[. Cholvi, P. Felber, and E. Biersack, Efficient Search in Unstructured Peer-to-Peer Networks, European Transactions on Telecommunications, vol.15, issue.6, 2004.

L. David and . Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, vol.24, issue.2, 1981.

[. Coppersmith, D. B. Johnson, and S. M. Matyas, A proposed mode for triple-DES encryption, IBM Journal of Research and Development, vol.40, issue.2, 1996.
DOI : 10.1147/rd.402.0253

S. G. Cmh-+-02-]-ian-clarke, T. W. Miller, O. Hong, B. Sandberg, and . Wiley, Protecting Free Expression Online with Freenet, IEEE Internet Computing, vol.6, issue.1, 2002.

M. Ruth and . Davis, The Data Encryption Standard in Perspective, Communications Magazine IEEE, vol.16, issue.6, 1976.

[. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, Managing and sharing servents' reputations in P2P systems, IEEE Transactions on Knowledge and Data Engineering, vol.15, issue.4, 2003.
DOI : 10.1109/TKDE.2003.1209003

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, P. Samarati, and F. Violante, A reputation-based approach for choosing reliable resources in peer-to-peer networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586138

[. Dingledine, M. J. Freedman, and D. Molnar, The Free Haven Project: Distributed Anonymous Storage Service In Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability Open Problems in Data-Sharing Peer-to-Peer Systems, International Conference on Database Theory (ICDT), 2000.

[. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, 1976.
DOI : 10.1109/TIT.1976.1055638

F. Dabek, B. Y. Zhao, P. Druschel, J. Kubiatowicz, and I. Stoica, Towards a Common API for Structured Peer-to-Peer Overlays, International Peer To Peer Systems Workshop (IPTPS), 2003.
DOI : 10.1007/978-3-540-45172-3_3

T. Erl, Service-Oriented Architecture: Concepts, Technology, and Design [FED] Federal Standard 1037C. Telecommunications: Glossary of Telecommunication Terms, 2005.

[. Furtado, Schemas and Queries over P2P, Database and Expert Systems Applications (DEXA), 2005.
DOI : 10.1007/11546924_79

C. M. Benjamin, K. Fung, R. Wang, P. S. Chen, and . Yu, Privacy- Preserving Data Publishing: A Survey of Recent Developments, ACM Computing Surveys, vol.42, issue.4, 2010.

A. Good and . Krekelberg, Usability and privacy, Proceedings of the conference on Human factors in computing systems , CHI '03, 2003.
DOI : 10.1145/642611.642636

T. Grandison and M. Sloman, A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, vol.3, issue.4, 2000.
DOI : 10.1109/COMST.2000.5340804

F. Howell and R. Mcnab, Simjava: a Discrete Event Simulation Library for Java, Society for Computer Simulation (SCS), 1998.

L. J. Hoffman, Modern methods for computer security and privacy, 1977.

S. Hand and T. Roscoe, Mnemosyne: Peer-to-Peer Steganographic Storage, International Peer To Peer Systems Workshop (IPTPS), 2002.
DOI : 10.1007/3-540-45748-8_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.3973

[. Database, HDB) Technology Projects

[. Isdal, M. Piatek, A. Krishnamurthy, and T. Anderson, Privacy-Preserving P2P Data Sharing with OneSwarm, 2009.
DOI : 10.1145/1851182.1851198

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.175.7066

D. Kahn, The Codebreakers -The Story of Secret Writing, 1974.

A. Paul and . Karger, Authentication and Discretionary Access Control in Computer Networks, Computer Networks and ISDN Systems, vol.10, issue.1, 1985.

. Oceanstore, An Architecture for Global-Scale Persistent Storage, Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2000.

[. Kagal, S. Cost, T. Finin, and Y. Peng, A Framework for Distributed Trust Management, Autonomy, Delegation and Control (?CAI), 2001.

J. H. Kaufman, S. Edlund, D. A. Ford, and C. Powers, The Social Contract Core, ACM World Wide Web Conference (WWW), 2002.

[. Kleinberg, C. H. Papadimitriou, and P. Raghavan, On the Value of Private Information, Theoretical Aspects of Rationality and Knowledge (TARK), 2001.

D. Sepandar, M. T. Kamvar, H. Schlosser, and . Garcia-molina, The Eigentrust Algorithm for Reputation Management in P2P Networks, ACM World Wide Web Conference, 2003.

[. Karjoth, M. Schunter, and M. Waidner, Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data, Privacy Enhancing Technologies (PET), 2002.
DOI : 10.1007/3-540-36467-6_6

K. Lefevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu et al., Limiting Disclosure in Hippocratic Databases, Very Large Databases (VLDB), 2004.
DOI : 10.1016/B978-012088469-8.50013-9

M. Langheinrich, A P3P Preference Exchange Language (APPEL1.0) Specification, 2001.

J. Eng-keong-lua, M. Crowcroft, R. Pias, S. Sharma, and . Lim, A survey and comparison of peer-to-peer overlay network schemes, IEEE Communications Surveys & Tutorials, vol.7, issue.2, 2005.
DOI : 10.1109/COMST.2005.1610546

[. Li, J. C. Mitchell, and W. H. Winsborough, Design of a Role-Based Trust-management Framework, IEEE Symposium on Security and Privacy (S&P), 2002.

B. Lucas, Test de PriServ, un Service de Confidentialité de Données pour Environnements Pair-à-Pair, 2010.

J. Michael, Justices of the Peace Act, p.1361

S. Dejan, V. Milojicic, R. Kalogeraki, K. Lukose, J. Nagaraja et al., Peer-to-Peer Computing, 2002.

G. Miklau and D. Suciu, Controlling Access to Published Data Using Cryptography, Very Large Databases, 2003.
DOI : 10.1016/B978-012722442-8/50084-7

[. Oecd, Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 2002.

A. Pfitzmann and M. Hansen, A Terminology for Talking about Privacy by Data Minimization: Anonymity, 2009.

M. Josep, R. Pujol, J. Sangüesa, and . Delgado, Extracting Reputation in Multi-Agent Systems by Means of Social Network Topology, Autonomous Agents and Multi-Agent Systems(AAMAS), 2002.

[. Ryu, K. Butler, P. Traynor, and P. Mcdaniel, Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007.
DOI : 10.1109/AINAW.2007.221

I. T. Antony, P. Rowstron, and . Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peerto-Peer Systems, ACM/IFIP/USENIX Middleware Conference (MIDDLEWARE), 2001.

[. Ratnasamy, P. Francis, S. Shenker, and M. Handley, A Scalable Content-Addressable Network, ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), 2001.

A. Rowstron and G. House, Storage Management and Caching in PAST, a Large-scale, Persistent Peer-to-Peer Storage Utility, Symposium on Operating Systems Principles (SOSP), 2001.

S. Rafaeli and D. Hutchison, A survey of key management for secure group communication, ACM Computing Surveys, vol.35, issue.3, 2003.
DOI : 10.1145/937503.937506

R. L. Rivest, The MD4 Message Digest Algorithm, International Cryptology Conference (CRYPTO), 1990.

R. L. Rivest, The MD5 Message-Digest Algorithm, 1992.
DOI : 10.17487/rfc1321

R. L. Rivest, The RC4 Encryption Algorithm, 1992.

M. Rotenberg, Protecting Human Dignity in the Digital Age, UNESCO, 2000.

M. Rotenberg, Fair Information Practices and the Architecture of Privacy, Stanford Technology Law Review, vol.1, 2001.

R. L. Rivest, A. Shamir, and L. M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, vol.21, issue.2, 1978.
DOI : 10.1145/359340.359342

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588

[. Roncancio, M. D. , P. Villamil, C. Labbé, and P. Serrano-alvarado, Data Sharing in DHT Based P2P Systems, Transactions on Large Scale Data and Knowledge Centered Systems, vol.5740, 2009.
DOI : 10.1007/3-540-45748-8_25

URL : https://hal.archives-ouvertes.fr/hal-00415821

R. Sandhu, Role hierarchies and constraints for lattice-based access controls, European Symposium on Research in Computer Security, 1996.
DOI : 10.1007/3-540-61770-1_28

S. Marti and H. Garcia-molina, Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, 2006.
DOI : 10.1016/j.comnet.2005.07.011

R. Sandhu, D. Ferraiolo, and R. Kuhn, The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2000.
DOI : 10.1145/344287.344301

[. Sherwood, S. Lee, and B. Bhattacharjee, Cooperative peer groups in NICE, Computer Networks, vol.50, issue.4, 2006.
DOI : 10.1016/j.comnet.2005.07.012

R. Stoica, D. R. Morris, M. F. Karger, H. Kaashoek, and . Balakrishnan, Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications, ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), 2001.

[. Samarati and L. Sweeney, Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression, 1998.

A. Stubblefield and D. S. Wallach, Dagster: Censorship-Resistant Publishing without Replication, 2001.

J. Sabater and C. Sierra, Reputation and social network analysis in multi-agent systems, Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 1, AAMAS '02, 2002.
DOI : 10.1145/544741.544854

[. Suryanarayana and R. N. Taylor, A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications, 2004.

R. Steinmetz and K. Wehrle, Peer-to-Peer Systems and Applications, Lecture Notes in Computer Science, vol.3485, 2005.
DOI : 10.1007/11530657

I. Tatarinov, Z. G. Ives, J. Madhavan, A. Y. Halevy, D. Suciu et al., The Piazza peer data management project, ACM SIGMOD Record, vol.32, issue.3, 2003.
DOI : 10.1145/945721.945732

[. V?ayan, P2P Networks a Treasure Trove of Leaked Health Care Data, Study Finds, 2010.

S. Warren and L. Brandeis, The Right to Privacy, Harvard Law Review, vol.4, issue.5, 1890.
DOI : 10.2307/1321160

A. F. Westin, Privacy and Freedom, Atheneum, 1967.

M. Waldman and D. Mazières, Tangler, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, 2001.
DOI : 10.1145/501983.502002

M. Samuel, L. C. Wilson, and . Peterson, The Anthropology of Online Communities, Annual Review of Anthropology, vol.31, issue.1, 2002.

L. Xiong and L. Liu, PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.07, p.16, 2004.
DOI : 10.1109/TKDE.2004.1318566

W. Yao, Fidelis: A Policy-Driven Trust Management Framework, Conference on Trust Management, 2003.
DOI : 10.1007/3-540-44875-6_22

T. Yu, Interoperable strategies in automated trust negotiation, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, 2001.
DOI : 10.1145/501983.502004

J. Joseph and . Kubiatowicz, Tapestry: A Resilient Global-scale Overlay for Service Deployment Appendix A, IEEE Journal on Selected Areas in Communications, vol.22, issue.1, 2004.