Auditing Compliance with a Hippocratic Database, Very Large Databases (VLDB), 2004. ,
Extending Relational Database Systems to Automatically Enforce Privacy Policies, IEEE Conference on Data Engineering (ICDE), 2005. ,
SETI@home: an experiment in public-resource computing, Communications of the ACM, vol.45, issue.11, 2002. ,
DOI : 10.1145/581571.581573
Hippocratic Databases, Very Large Databases (VLDB), 2002. ,
DOI : 10.1016/B978-155860869-6/50021-4
National Information Assurance (IA) Glossary - CNSS-4009, 2010. ,
Design and Implementation of APPA, Global Data Management ,
[ANT] The Ants P2P Web Site, 2006. ,
Reducing Network Traffic in Unstructured P2P Systems Using Top-k Queries. Distributed and Parallel Databases, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00416447
A Survey of Data Management in Peer-to-Peer Systems, 2006. ,
Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, 2005. ,
DOI : 10.1145/1063979.1063998
Decentralized Trust Management [BIT] The BitTorrent web site, IEEE Symposium on Security and Privacy, 1996. ,
Secure Computer Systems: Mathematical Foundations and Model. The MITRE Corporation, pp.74-244, 1973. ,
Purpose based access control for privacy protection in relational database systems, The Very Large Database (VLDB) Journal, 2008. ,
DOI : 10.1007/s00778-006-0023-0
Privacy as an Aspect of Human Dignity, 1964. ,
Digital Signature Standard (DSS) Federal Information Processing Standards, 2009. ,
Autonomous Replication for High Availability in Unstructured P2P Systems, IEEE Symposium on Reliable Distributed Systems (SRDS), 2003. ,
Secure Routing for Structured Peer-to-Peer Overlay Networks, Operating Systems Design and Implementation (OSDI), 2002. ,
SwarmScreen: Privacy Through Plausible Deniability in P2P Systems, 2009. ,
Efficient Search in Unstructured Peer-to-Peer Networks, European Transactions on Telecommunications, vol.15, issue.6, 2004. ,
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, vol.24, issue.2, 1981. ,
A proposed mode for triple-DES encryption, IBM Journal of Research and Development, vol.40, issue.2, 1996. ,
DOI : 10.1147/rd.402.0253
Protecting Free Expression Online with Freenet, IEEE Internet Computing, vol.6, issue.1, 2002. ,
The Data Encryption Standard in Perspective, Communications Magazine IEEE, vol.16, issue.6, 1976. ,
Managing and sharing servents' reputations in P2P systems, IEEE Transactions on Knowledge and Data Engineering, vol.15, issue.4, 2003. ,
DOI : 10.1109/TKDE.2003.1209003
A reputation-based approach for choosing reliable resources in peer-to-peer networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586138
The Free Haven Project: Distributed Anonymous Storage Service In Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability Open Problems in Data-Sharing Peer-to-Peer Systems, International Conference on Database Theory (ICDT), 2000. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Towards a Common API for Structured Peer-to-Peer Overlays, International Peer To Peer Systems Workshop (IPTPS), 2003. ,
DOI : 10.1007/978-3-540-45172-3_3
Service-Oriented Architecture: Concepts, Technology, and Design [FED] Federal Standard 1037C. Telecommunications: Glossary of Telecommunication Terms, 2005. ,
Schemas and Queries over P2P, Database and Expert Systems Applications (DEXA), 2005. ,
DOI : 10.1007/11546924_79
Privacy- Preserving Data Publishing: A Survey of Recent Developments, ACM Computing Surveys, vol.42, issue.4, 2010. ,
Usability and privacy, Proceedings of the conference on Human factors in computing systems , CHI '03, 2003. ,
DOI : 10.1145/642611.642636
A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, vol.3, issue.4, 2000. ,
DOI : 10.1109/COMST.2000.5340804
Simjava: a Discrete Event Simulation Library for Java, Society for Computer Simulation (SCS), 1998. ,
Modern methods for computer security and privacy, 1977. ,
Mnemosyne: Peer-to-Peer Steganographic Storage, International Peer To Peer Systems Workshop (IPTPS), 2002. ,
DOI : 10.1007/3-540-45748-8_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.3973
HDB) Technology Projects ,
Privacy-Preserving P2P Data Sharing with OneSwarm, 2009. ,
DOI : 10.1145/1851182.1851198
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.175.7066
The Codebreakers -The Story of Secret Writing, 1974. ,
Authentication and Discretionary Access Control in Computer Networks, Computer Networks and ISDN Systems, vol.10, issue.1, 1985. ,
An Architecture for Global-Scale Persistent Storage, Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2000. ,
A Framework for Distributed Trust Management, Autonomy, Delegation and Control (?CAI), 2001. ,
The Social Contract Core, ACM World Wide Web Conference (WWW), 2002. ,
On the Value of Private Information, Theoretical Aspects of Rationality and Knowledge (TARK), 2001. ,
The Eigentrust Algorithm for Reputation Management in P2P Networks, ACM World Wide Web Conference, 2003. ,
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data, Privacy Enhancing Technologies (PET), 2002. ,
DOI : 10.1007/3-540-36467-6_6
Limiting Disclosure in Hippocratic Databases, Very Large Databases (VLDB), 2004. ,
DOI : 10.1016/B978-012088469-8.50013-9
A P3P Preference Exchange Language (APPEL1.0) Specification, 2001. ,
A survey and comparison of peer-to-peer overlay network schemes, IEEE Communications Surveys & Tutorials, vol.7, issue.2, 2005. ,
DOI : 10.1109/COMST.2005.1610546
Design of a Role-Based Trust-management Framework, IEEE Symposium on Security and Privacy (S&P), 2002. ,
Test de PriServ, un Service de Confidentialité de Données pour Environnements Pair-à-Pair, 2010. ,
Justices of the Peace Act, p.1361 ,
Peer-to-Peer Computing, 2002. ,
Controlling Access to Published Data Using Cryptography, Very Large Databases, 2003. ,
DOI : 10.1016/B978-012722442-8/50084-7
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 2002. ,
A Terminology for Talking about Privacy by Data Minimization: Anonymity, 2009. ,
Extracting Reputation in Multi-Agent Systems by Means of Social Network Topology, Autonomous Agents and Multi-Agent Systems(AAMAS), 2002. ,
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007. ,
DOI : 10.1109/AINAW.2007.221
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peerto-Peer Systems, ACM/IFIP/USENIX Middleware Conference (MIDDLEWARE), 2001. ,
A Scalable Content-Addressable Network, ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), 2001. ,
Storage Management and Caching in PAST, a Large-scale, Persistent Peer-to-Peer Storage Utility, Symposium on Operating Systems Principles (SOSP), 2001. ,
A survey of key management for secure group communication, ACM Computing Surveys, vol.35, issue.3, 2003. ,
DOI : 10.1145/937503.937506
The MD4 Message Digest Algorithm, International Cryptology Conference (CRYPTO), 1990. ,
The MD5 Message-Digest Algorithm, 1992. ,
DOI : 10.17487/rfc1321
The RC4 Encryption Algorithm, 1992. ,
Protecting Human Dignity in the Digital Age, UNESCO, 2000. ,
Fair Information Practices and the Architecture of Privacy, Stanford Technology Law Review, vol.1, 2001. ,
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, vol.21, issue.2, 1978. ,
DOI : 10.1145/359340.359342
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588
Data Sharing in DHT Based P2P Systems, Transactions on Large Scale Data and Knowledge Centered Systems, vol.5740, 2009. ,
DOI : 10.1007/3-540-45748-8_25
URL : https://hal.archives-ouvertes.fr/hal-00415821
Role hierarchies and constraints for lattice-based access controls, European Symposium on Research in Computer Security, 1996. ,
DOI : 10.1007/3-540-61770-1_28
Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, 2006. ,
DOI : 10.1016/j.comnet.2005.07.011
The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2000. ,
DOI : 10.1145/344287.344301
Cooperative peer groups in NICE, Computer Networks, vol.50, issue.4, 2006. ,
DOI : 10.1016/j.comnet.2005.07.012
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications, ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), 2001. ,
Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression, 1998. ,
Dagster: Censorship-Resistant Publishing without Replication, 2001. ,
Reputation and social network analysis in multi-agent systems, Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 1, AAMAS '02, 2002. ,
DOI : 10.1145/544741.544854
A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications, 2004. ,
Peer-to-Peer Systems and Applications, Lecture Notes in Computer Science, vol.3485, 2005. ,
DOI : 10.1007/11530657
The Piazza peer data management project, ACM SIGMOD Record, vol.32, issue.3, 2003. ,
DOI : 10.1145/945721.945732
P2P Networks a Treasure Trove of Leaked Health Care Data, Study Finds, 2010. ,
The Right to Privacy, Harvard Law Review, vol.4, issue.5, 1890. ,
DOI : 10.2307/1321160
Privacy and Freedom, Atheneum, 1967. ,
Tangler, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, 2001. ,
DOI : 10.1145/501983.502002
The Anthropology of Online Communities, Annual Review of Anthropology, vol.31, issue.1, 2002. ,
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.07, p.16, 2004. ,
DOI : 10.1109/TKDE.2004.1318566
Fidelis: A Policy-Driven Trust Management Framework, Conference on Trust Management, 2003. ,
DOI : 10.1007/3-540-44875-6_22
Interoperable strategies in automated trust negotiation, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, 2001. ,
DOI : 10.1145/501983.502004
Tapestry: A Resilient Global-scale Overlay for Service Deployment Appendix A, IEEE Journal on Selected Areas in Communications, vol.22, issue.1, 2004. ,