O. Abul, F. Bonchi, and M. Et-nanni, Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, 2008 IEEE 24th International Conference on Data Engineering, pp.376-385, 2008.
DOI : 10.1109/ICDE.2008.4497446

A. Allan and P. Et-warden, Got an iphone or 3g ipad ? apple is recording your moves, 2011.

L. O. Alvares, V. Bogorny, B. Kuijpers, J. A. De-macedo, B. Moelans et al., A model for enriching trajectories with semantic geographical information, Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems , GIS '07, pp.1-22, 2007.
DOI : 10.1145/1341012.1341041

P. Andras and B. Et-charlton, Self-Aware Software?Will It Become a Reality ? Self-star Properties in Complex Information Systems, pp.229-259, 2005.

M. Armstrong, G. Rushton, and D. Zimmerman, Geographically masking health data to preserve confidentiality, Statistics in Medicine, vol.37, issue.5, pp.497-525, 1999.
DOI : 10.1002/(SICI)1097-0258(19990315)18:5<497::AID-SIM45>3.0.CO;2-#

C. Artigues, Y. Deswarte, J. Guiochet, M. Huguet, M. Killijian et al., AMORES, Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience, ARMOR '12, 2012.
DOI : 10.1145/2222436.2222443

URL : https://hal.archives-ouvertes.fr/hal-00736020

C. Basile, Z. Kalbarczyk, and R. Et-iyer, A preemptive deterministic scheduling algorithm for multithreaded replicas, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., p.149, 2003.
DOI : 10.1109/DSN.2003.1209926

M. T. Bennani, Tolérance aux fautes dans les systèmes répartis à base d'intergiciels réflexifs standards, Thèse de doctorat, Institut National des Sciences Appliquées, p.146, 2005.

T. Bennani, L. Blain, L. Courtès, J. Fabre, M. Killijian et al., Implementing simple replication protocols using CORBA portable interceptors and Java serialization, International Conference on Dependable Systems and Networks, 2004, pp.549-554, 2004.
DOI : 10.1109/DSN.2004.1311924

A. Beresford and F. Et-stajano, Location privacy in pervasive computing. Pervasive Computing, IEEE, vol.2, issue.1, pp.46-55, 2003.

C. Bettini, S. Mascetti, X. Wang, D. Freni, and S. Et-jajodia, Anonymity and historical-anonymity in location-based services. Privacy in Location-Based Applications, pp.1-30, 2009.

W. J. Bolosky, J. R. Douceur, D. Ely, and M. Et-theimer, Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs, ACM SIGMETRICS Performance Evaluation Review, vol.28, issue.1, pp.34-43, 2000.
DOI : 10.1145/345063.339345

S. Bouchenak, F. Boyer, N. De-palma, and D. Et-hagimont, Can aspects be injected ? experience with replication and protection. On The Move to Meaningful Internet Systems, pp.1402-1420, 2003.

L. Buttyán, T. Holczer, and I. Et-vajda, On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs, Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, pp.129-141, 2007.
DOI : 10.1007/978-3-540-73275-4_10

C. Cachin, S. Micali, and M. Et-stadler, Computationally Private Information Retrieval with Polylogarithmic Communication, Advances in Cryptology -EURO- CRYPT'99, pp.402-414, 1999.
DOI : 10.1007/3-540-48910-X_28

J. Cala, Migration in CORBA Component Model. Dans Distributed applications and interoperable systems : 7th IFIP WG 6.1 international conference, DAIS, p.139, 2007.

J. Carlson and R. R. Murphy, How UGVs physically fail in the field, IEEE Transactions on Robotics, vol.21, issue.3, pp.423-437, 2005.
DOI : 10.1109/TRO.2004.838027

C. Cassa, S. Wieland, and K. Et-mandl, Re-identification of home addresses from spatial locations anonymized by Gaussian skew, International Journal of Health Geographics, vol.7, issue.1, p.45, 2008.
DOI : 10.1186/1476-072X-7-45

C. Castelluccia, Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, pp.1-9, 2007.
DOI : 10.1109/MOBHOC.2007.4428625

D. Cavin, Y. Sasson, and A. Et-schiper, On the accuracy of MANET simulators, Proceedings of the second ACM international workshop on Principles of mobile computing , POMC '02, pp.38-43, 2002.
DOI : 10.1145/584490.584499

T. Chandra and S. Et-toueg, Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.2, pp.225-267, 1996.
DOI : 10.1145/226643.226647

N. Chandran, V. Goyal, R. Moriarty, and R. Et-ostrovsky, Position based cryptography Advances in Cryptology-CRYPTO, pp.391-407, 2009.

D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.
DOI : 10.1145/358549.358563

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210

R. Cheng, Y. Zhang, E. Bertino, and S. Et-prabhakar, Preserving User Location Privacy in Mobile Data Management Infrastructures, Privacy Enhancing Technologies, pp.393-412, 2006.
DOI : 10.1007/11957454_23

S. Chiba, A metaobject protocol for c++, pp.285-299, 1995.

B. Chor, O. Goldreich, E. Kushilevitz, and M. Et-sudan, Private information retrieval, Proceedings., 36th Annual Symposium on, pp.41-50, 1995.

C. Chu, S. Kim, Y. Lin, Y. Yu, G. Bradski et al., Mapreduce for machine learning on multicore Advances in neural information processing systems, p.281, 2007.

H. Chu, Test and Evaluation of the Robustness of the Functional Layer of an Autonomous Robot, Thèse de doctorat, Institut National Polytechnique, p.119, 2011.
URL : https://hal.archives-ouvertes.fr/tel-00627225

H. Chu, J. Arlat, M. Killijian, B. Lussier, and D. Et-powell, Robustness Testing of Robot Controller Software, Proceedings of the 12th European Workshop on Dependable Computing, EWDC 2009, edité par H. WAESE- LYNCK, p. 2 pages, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00381686

N. Cohen, A. Purakayastha, J. Turek, L. Wong, and D. Et-yeh, Challenges in flexible aggregation of pervasive data, IBM Research Report RC, pp.21942-98646, 2001.

C. Cottrill, Location privacy : Who protects ? URISA Journal-Urban and Regional InformationSystems Association, p.49, 2011.

L. Courtès, Sauvegarde coopérative de données pour dispositifs mobiles, Thèse de doctorat, Institut National Polytechnique, p.149, 2007.

L. Courtès, O. Hamouda, M. Kaaniche, M. Killijian, and D. Et-powell, Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices, 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007), pp.139-146, 2007.
DOI : 10.1109/PRDC.2007.21

L. Courtès, M. Killijian, and D. Et-powell, Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices, 2006 Sixth European Dependable Computing Conference, pp.129-138, 2006.
DOI : 10.1109/EDCC.2006.26

L. Courtès, M. Killijian, and D. Et-powell, Security Rationale for a Cooperative Backup Service for Mobile Devices, Proceedings of the Latin-American Symposium on Dependable Computing (LADC), pp.212-230, 2007.
DOI : 10.1007/978-3-540-75294-3_16

L. P. Cox, C. D. Murray, and B. D. Et-noble, Pastiche, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.285-298, 2002.
DOI : 10.1145/844128.844155

S. R. Das, R. Castañeda, and J. Et-yan, Simulation-based performance evaluation of routing protocols for mobile ad hoc networks, Mobile Networks and Applications, vol.5, issue.3, pp.179-189, 2000.
DOI : 10.1023/A:1019108612308

D. Mulder, Y. Danezis, G. Batina, L. Et-preneel, and B. , Identification via locationprofiling in gsm networks, Proceedings of the 7th ACM workshop on Privacy in the electronic society, WPES '08, pp.23-32, 2008.

M. Duckham, L. Kulik, and A. Et-birtley, A Spatiotemporal Model of Strategies and Counter Strategies for Location Privacy Protection, Geographic Information Science, pp.47-64, 2006.
DOI : 10.1007/11863939_4

N. Eagle and A. Pentland, Reality mining: sensing complex social systems, Personal and Ubiquitous Computing, vol.10, issue.2, pp.255-268, 2006.
DOI : 10.1007/s00779-005-0046-3

V. Etter, M. Kafsi, and E. Et-kazemi, Been There, Done That : What Your Mobility Traces Reveal about Your Behavior, Mobile Data Challenge by Nokia Workshop, in conjunction with Int. Conf. on Pervasive Computing, 2012.

J. Fabre, M. Killijian, and T. Et-pareaud, Towards On-line Adaptation of Fault Tolerance Mechanisms, 2010 European Dependable Computing Conference, pp.45-54, 2010.
DOI : 10.1109/EDCC.2010.15

J. Fabre, M. Killijian, and F. Et-taiani, Robustness of automotive applications using reflective computing, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.230-235, 2011.
DOI : 10.1145/1982185.1982237

S. Farrell and V. Et-cahill, Delay-and disruption-tolerant networking. Artech House telecommunications library, 2006.

D. Freni, C. Ruiz-vicente, S. Mascetti, C. Bettini, and C. S. Et-jensen, Preserving location and absence privacy in geo-social networks, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pp.309-318, 2010.
DOI : 10.1145/1871437.1871480

J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J. Et-hubaux, Mixzones for location privacy in vehicular networks, Proceedings of the 1st International Workshop on Wireless Networking for Intelligent Transportation Systems, 2007.

S. Gambs, M. Killijian, and M. R. Traore, Locanyms, Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience, ARMOR '12, 2012.
DOI : 10.1145/2222436.2222437

URL : https://hal.archives-ouvertes.fr/hal-00765530

S. Gambs, M. Killijian, P. Cortez, and M. N. , GEPETO: A GEoPrivacy-Enhancing TOolkit, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp.1071-1076, 2010.
DOI : 10.1109/WAINA.2010.170

URL : https://hal.archives-ouvertes.fr/inria-00556835

S. Gambs, M. Killijian, P. Cortez, and M. N. , Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.34-41, 2010.
DOI : 10.1145/1868470.1868479

URL : https://hal.archives-ouvertes.fr/inria-00556833

S. Gambs, M. Killijian, P. Cortez, and M. N. , Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011.
DOI : 10.1145/1868470.1868479

URL : https://hal.archives-ouvertes.fr/inria-00556833

S. Gambs, M. Killijian, P. Cortez, and M. N. , Towards temporal mobility markov chains, Proceedings of the 1st International Workshop on Dynamicity collocated with OPODIS, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00675544

S. Gambs, M. Killijian, P. Cortez, and M. N. , Next place prediction using mobility Markov chains, Proceedings of the First Workshop on Measurement, Privacy, and Mobility, MPM '12, 2012.
DOI : 10.1145/2181196.2181199

URL : https://hal.archives-ouvertes.fr/hal-00736947

S. Gambs, M. Killijian, and M. Et-nunez-del-prado-cortez, Deanonymization attack on geolocated datasets. Rapport technique, LAAS-CNRS, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00765525

B. Gedik and L. Et-liu, Mobieyes : Distributed processing of continuously moving queries on moving objects in a mobile system Advances in Database Technology- EDBT, pp.523-524, 2004.

F. Giannotti, G. Giannotti, and D. Et-pedreschi, Mobility, data mining, and privacy : geographic knowledge discovery, 2008.
DOI : 10.1007/978-3-540-75177-9

P. Golle and K. Et-partridge, On the Anonymity of Home/Work Location Pairs, Proceedings of the 7th International Conference on Pervasive Computing, Pervasive '09, pp.390-397978, 2009.
DOI : 10.1007/978-3-642-01516-8_26

M. C. Gonzalez, C. A. Hidalgo, and A. Et-barabasi, Understanding individual human mobility patterns, Nature, issue.7196, pp.453-779, 2008.

M. Gruteser and D. Et-grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003.
DOI : 10.1145/1066116.1189037

E. B. Hamida, G. Chelius, and J. M. Et-gorce, On the complexity of an accurate and precise performance evaluation of wireless networks using simulations, Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems, MSWiM '08, 2008.
DOI : 10.1145/1454503.1454570

URL : https://hal.archives-ouvertes.fr/inria-00384082

R. Hariharan and K. Et-toyama, Project Lachesis: Parsing and Modeling Location Histories, Geographic Information Science, pp.106-124, 2004.
DOI : 10.1007/978-3-540-30231-5_8

M. Hericko, M. Juric, I. Rozman, S. Beloglavec, and A. Et-zivkovic, Object serialization analysis and comparison in Java and .NET, ACM SIGPLAN Notices, vol.38, issue.8, pp.44-54, 2003.
DOI : 10.1145/944579.944589

J. Hightower and G. Et-borriello, A survey and taxonomy of location systems for ubiquitous computing, 2001.

L. Jedrzejczyk, B. Price, A. Bandara, and B. Et-nuseibeh, I know what you did last summer : risks of location data leakage in mobile and social computing, 2009.

R. Jimenez-peris, M. Patio-martinez, and S. Et-aravalo, Deterministic scheduling for transactional multithreaded replicas. Reliable Distributed Systems, IEEE Symposium, p.164, 2000.

J. H. Kang, B. Stewarta, G. Borriello, and W. Et-welbourne, Extracting places from traces of locations, Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, pp.110-118, 2004.

M. Killijian, Tolérance aux fautes sur Corba par protocole à métaobjets et langages réflexifs, Thèse de doctorat, 2000.

M. Killijian, R. Cunningham, R. Meier, L. Mazare, and V. Et-cahill, Towards group communication for mobile participants, Proceedings of Principles of Mobile Computing (POMC), pp.75-82, 2001.

M. Killijian and J. Et-fabre, Implementing a reflective fault-tolerant CORBA system, Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000, pp.154-163, 2000.
DOI : 10.1109/RELDI.2000.885403

M. Killijian and J. Et-fabre, Adaptive fault tolerant systems: reflective design and validation, Proceedings International Parallel and Distributed Processing Symposium, p.212, 2003.
DOI : 10.1109/IPDPS.2003.1213387

M. Killijian, J. Fabre, J. Ruiz-garcia, and S. Et-chiba, A metaobject protocol for fault-tolerant CORBA applications, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281), pp.127-134, 1998.
DOI : 10.1109/RELDIS.1998.740483

M. Killijian, D. Powell, M. Banâtre, P. Couderc, and Y. Et-roudier, Collaborative backup for dependable mobile applications, Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing -, pp.146-149, 2004.
DOI : 10.1145/1028509.1028517

M. Killijian, D. Powell, M. Roy, and G. Et-severac, Experimental evaluation of ubiquitous systems. Dans Fast abstract at DEBS'08, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00140129

M. Killijian, N. Rivière, and M. Et-roy, Experimental evaluation of resilience for ubiquitous mobile systems, Proc. of UbiComp, Workshop on Ubiquitous Systems Evaluation (USE), pp.283-287, 2007.

M. Killijian and M. Et-roy, Brief announcement : a platform for experimenting with mobile algorithms in a laboratory, PODC, edité par S. Tirthapura et L. Alvisi, pp.316-317, 2009.

M. Killijian and M. Et-roy, Data Backup for Mobile Nodes: A Cooperative Middleware and an Experimentation Platform, Architecting Dependable Systems VII, edité par A. Casimiro, R. de Lemos, et C. Gacek, tome 6420 de Lecture Notes in Computer Science, pp.53-73, 2010.
DOI : 10.1007/978-3-642-17245-8_3

M. Killijian, M. Roy, and G. Et-séverac, ARUM: A cooperative middleware and an experimentation platform for mobile systems, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, p.8, 2010.
DOI : 10.1109/WIMOB.2010.5645030

M. Killijian, M. Roy, and G. Et-séverac, The ARUM Experimentation Platform: An Open Tool to Evaluate Mobile Systems Applications, Proc. of Amire'11, 2011.
DOI : 10.1007/978-3-642-27482-4_22

URL : https://hal.archives-ouvertes.fr/hal-00667832

M. Killijian, M. Roy, G. Severac, and C. Et-zanon, Data Backup for Mobile Nodes: A Cooperative Middleware and an Experimentation Platform, Proc. of the Workshop on Architecting Dependable Systems of the IEEE International Conference on Dependable Systems and Networks (DSN-2009), 2009.
DOI : 10.1007/978-3-642-17245-8_3

M. Killijian, M. Roy, and G. Et-trédan, Beyond san francisco cabs : building a *-lity mining dataset, Proceedings of Workshop on the Analysis of Mobile Phone Networks (NetMob). Sattelite of NetSci 2010, 2010.

M. Killijian, J. Ruiz-garcia, and J. Et-fabre, Using Compile-Time Reflection for Objects???State Capture, edité par P. Cointe, tome 1616 de Lecture Notes in Computer Science, pp.150-152, 1999.
DOI : 10.1007/3-540-48443-4_15

M. Killijian, J. Ruiz-garcia, and J. Et-fabre, Portable serialization of corba objects : a reflective approach, pp.68-82, 2002.

J. Krumm, Inference Attacks on Location Tracks, Proceedings of the 5th international conference on Pervasive computing, PERVASIVE'07, pp.127-143, 2007.
DOI : 10.1007/978-3-540-72037-9_8

J. Krumm, A survey of computational location privacy, Personal and Ubiquitous Computing, vol.10, issue.5, pp.391-399, 2009.
DOI : 10.1007/s00779-008-0212-5

E. Kushilevitz and R. Et-ostrovsky, Replication is not needed: single database, computationally-private information retrieval, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.364-373, 1997.
DOI : 10.1109/SFCS.1997.646125

M. Kwan, W. Cartwright, C. G. Et-arrowsmith, F. Gartner, W. Ortag et al., Tracking movements with mobile phone billing data : A case study with publicly-available data. Dans Advances in Location-Based Services, Lecture Notes in Geoinformation and Cartography, pp.109-117, 2012.

M. Kwan, I. Casas, and B. Et-schmitz, Protection of geoprivacy and accuracy of spatial information : How effective are geographical masks ? Cartographica : The International Journal for Geographic Information and Geovisualization, pp.15-28, 2004.

L. Lamport, On interprocess communication, Distributed Computing, vol.21, issue.2, pp.77-101, 1986.
DOI : 10.1007/BF01786227

J. K. Laurila, D. Gatica-perez, I. Aad, J. Blom, O. Bornet et al., The mobile data challenge : Big data for mobile computing research, Mobile Data Challenge by Nokia Workshop, in conjunction with Int. Conf. on Pervasive Computing, 2012.

M. Leitner and A. Curtis, A first step towards a framework for presenting the location of confidential point data on maps???results of an empirical perceptual study, International Journal of Geographical Information Science, vol.49, issue.7, pp.813-822, 2006.
DOI : 10.1080/136588198241680

L. Liao, D. Fox, and H. Et-kautz, Location-based activity recognition using relational markov networks, Proceedings of the Nineteenth International Conference on Artificial Intelligence, IJCAI'05, 2005.

H. Lipmaa, An oblivious transfer protocol with log-squared communication. Information Security, pp.314-328, 2005.

C. Lu, Robustesse du logiciel embarqué multicouche par une approche réflexive : application à l'automobile, Thèse de doctorat, Institut National des Sciences Appliquées, p.142, 2009.

C. Lu, J. Fabre, and M. Et-killijian, An approach for improving faulttolerance in automotive modular embedded software, 17th International Conference on Real-Time Systems (RTNS 2009), pp.26-27, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00442000

C. Lu, J. Fabre, and M. Et-killijian, Robustness of modular multi-layered software in the automotive domain: a wrapping-based approach, 2009 IEEE Conference on Emerging Technologies & Factory Automation, 2009.
DOI : 10.1109/ETFA.2009.5347121

B. Lussier, Tolérance aux fautes dans les systèmes autonomes, Thèse de doctorat , Institut National Polytechnique, p.131, 2007.

B. Lussier, R. Chatila, F. Ingrand, M. O. Killijian, and D. Et-powell, On fault tolerance and robustness in autonomous systems, Proc. of 3rd IARP/IEEE-RAS Joint Workshop on Technical Challenge for Dependable Robots in Human Environments, 2004.

B. Lussier, M. Gallien, J. Guiochet, F. Ingrand, M. Killijian et al., Fault Tolerant Planning for Critical Robots, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), pp.144-153, 2007.
DOI : 10.1109/DSN.2007.50

URL : https://hal.archives-ouvertes.fr/hal-01292653

B. Lussier, M. Gallien, J. Guiochet, F. Ingrand, M. Killijian et al., Planning with diversified models for fault-tolerant robots, ICAPS, edité par M. S. Boddy, M. Fox, et S. Thiébaux, pp.216-223, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01292650

B. Lussier, A. Lampe, R. Chatila, J. Guiochet, F. Ingrand et al., Fault tolerance in autonomous systems : How and how much, Proc. of 4th IARP/IEEE-RAS Joint Workshop on Technical Challenge for Dependable Robots in Human Environments, 2005.
URL : https://hal.archives-ouvertes.fr/hal-01292930

C. Y. Ma, D. K. Yau, N. K. Yip, and N. S. Et-rao, Privacy vulnerability of published anonymous mobility traces, Proceedings of the sixteenth annual international conference on Mobile computing and networking, pp.185-196, 2010.

J. Napper, L. Alvisi, and H. Et-vin, A fault-tolerant java virtual machine, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., p.425, 2003.
DOI : 10.1109/DSN.2003.1209953

P. Narasimhan, L. Moser, and P. Et-melliar-smith, Enforcing determinism for the consistent replication of multithreaded corba applications. Reliable Distributed Systems, IEEE Symposium, p.263, 1999.

M. Nergiz, M. Atzori, and Y. Et-saygin, Towards trajectory anonymization, Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL '08, pp.52-61, 2006.
DOI : 10.1145/1503402.1503413

P. Ohm, Broken promises of privacy : Responding to the surprising failure of anonymization, UCLA Law Review, 2009.

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -EUROCRYPT'99, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

T. Pareaud, Adaptation en ligne de mécanismes de tolérance aux fautes par une approche à composants ouverts, Thèse de doctorat, Institut National Polytechnique, p.166, 2009.

T. Pareaud, J. Fabre, and M. Et-killijian, Componentization of Fault Tolerance Software for Fine-Grain Adaptation, 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, pp.248-255, 2008.
DOI : 10.1109/PRDC.2008.48

T. Pérennou, Une architecture à métaobjets pour systèmes répartis tolérant les fautes, Thèse de doctorat, Institut National Polytechnique, p.168, 1997.

L. Petcana, GeoPrivacy Risk Assessment -Application to a Carpooling System, 2011.

A. Pfitzmann and M. Et-hansen, A terminology for talking about privacy by data minimization : Anonymity, unlinkability, undetectability, unobservability , pseudonymity, and identity management, 2010.

M. Piorkowski, N. Sarafijanovic-djukic, and M. Et-grossglauser, CRAW- DAD data set epfl/mobility (v. 2009-02-24) Downloaded from http, 2009.

D. Powell, J. Arlat, H. N. Chu, F. Ingrand, and M. Et-killijian, Testing the Input Timing Robustness of Real-Time Control Software for Autonomous Systems, 2012 Ninth European Dependable Computing Conference, pp.73-83, 2012.
DOI : 10.1109/EDCC.2012.16

S. Reiter and G. Et-rigoll, Multimodal Meeting Analysis by Segmentation and Classification of Meeting Events based on a Higher Level Semantic Approach, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., pp.161-164, 2005.
DOI : 10.1109/ICASSP.2005.1415366

. Geo-registers, An abstraction for spatial-based distributed computing, Conf. On Principles Of DIStributed computing (OPODIS), pp.534-537

. Geo-registers, An Abstraction for Spatial-Based Distributed Computing. Rapport technique 09190

M. Roy, M. Killijian, L. Querzoni, F. Bonnet, S. T. Piergiovanni et al., Fada : Formalisms and algorithms for resilient services design in ambient systems. Dans Fast abstract at DEBS'08, 2008.

M. Roy, M. Killijian, L. Querzoni, F. Bonnet, S. T. Piergiovanni et al., FADA : Formalisms and Algorithms for Resilient Services Design in Ambient Systems, Proceedings of the 7th European Dependable Computing Conference (EDCC) -Fast Abstracts, 2008.

J. Ruiz-garcia, M. Killijian, J. Fabre, and P. Et-thévenod-fosse, Reflective fault-tolerant systems: from experience to challenges, IEEE Transactions on Computers, vol.52, issue.2, pp.237-254, 2003.
DOI : 10.1109/TC.2003.1176989

J. Sifakis, Component-Based Construction of Real-Time Systems in BIP, pp.33-34, 2009.
DOI : 10.1007/978-3-642-02658-4_4

C. Song, Z. Qu, N. Blumm, and A. Et-barabasi, Limits of Predictability in Human Mobility, Science, vol.327, issue.5968, pp.327-1018, 2010.
DOI : 10.1126/science.1177170

S. Spaccapietra, C. Parent, M. L. Damiani, J. A. De-macedo, F. Porto et al., A conceptual view on trajectories, Data & Knowledge Engineering, vol.65, issue.1, pp.126-146, 2008.
DOI : 10.1016/j.datak.2007.10.008

G. Stoneburner, A. Goguen, and A. Et-feringa, Risk management guide for information technology systems, Nist special publication, vol.800, issue.30, pp.800-830, 2002.
DOI : 10.6028/NIST.SP.800-30

L. Sweeney, Uniqueness of simple demographics in the us population. LIDAP- WP4, 2000.

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

F. Taïani, La réflexivité dans les architectures multi-niveaux : application aux systèmes tolérant les fautes, Thèse de doctorat, p.155, 2004.

F. Taïani, J. Fabre, and M. Et-killijian, Principles of multi-level reflection for fault tolerant architectures, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings., pp.59-66, 2002.
DOI : 10.1109/PRDC.2002.1185619

F. Taïani, J. Fabre, and M. Et-killijian, Towards implementing multi-layer reflection for fault-tolerance, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., pp.435-444, 2003.
DOI : 10.1109/DSN.2003.1209954

F. Taïani, J. Fabre, and M. Et-killijian, A Multi-Level Meta-Object Protocol for Fault-Tolerance in Complex Architectures, 2005 International Conference on Dependable Systems and Networks (DSN'05), pp.270-279, 2005.
DOI : 10.1109/DSN.2005.10

F. Taïani, M. Killijian, and J. Et-fabre, Intergiciels pour la tol??rance aux fautes, Techniques et sciences informatiques, vol.25, issue.5, pp.599-630, 2006.
DOI : 10.3166/tsi.25.599-630

F. Taïani, M. Killijian, and J. Et-fabre, Cosmopen : dynamic reverse engineering on a budget. how cheap observation techniques can be used to reconstruct complex multi-level behaviour, Softw., Pract. Exper, issue.18, pp.39-1467, 2009.

M. Tatsubori, S. Chiba, K. Itano, M. Et-killijian, R. J. Cazzola et al., Openjava : A classbased macro system for java. Dans Reflection and Software Engineering, pp.117-133, 1999.

M. Terrovitis and N. Et-mamoulis, Privacy preservation in the publication of trajectories . Dans Mobile Data Management, MDM'08. 9th International Conference on, pp.65-72, 2008.

N. Tomatis, G. Terrien, R. Piguet, D. Burnier, S. Bouabdallah et al., Designing a secure and robust mobile interacting robot for the long term, 2003 IEEE International Conference on Robotics and Automation (Cat. No.03CH37422), pp.4246-4251, 2003.
DOI : 10.1109/ROBOT.2003.1242256

L. Veiga, N. Santos, R. Lebre, and P. Et-ferreira, Loosely-coupled, mobile replication of objects with transactions, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004., pp.675-682, 2004.
DOI : 10.1109/ICPADS.2004.1316154

T. You, W. Peng, and W. Et-lee, Protecting moving trajectories with dummies. Dans Mobile Data Management, International Conference on, pp.278-282, 2007.

Y. Zheng, Q. Li, Y. Chen, X. Xie, and W. Et-ma, Understanding mobility based on GPS data, Proceedings of the 10th international conference on Ubiquitous computing, UbiComp '08, pp.312-321, 2008.
DOI : 10.1145/1409635.1409677

C. Zhou, D. Frankowski, P. Ludford, S. Shekhar, and L. Et-terveen, Discovering personal gazetteers, Proceedings of the 12th annual ACM international workshop on Geographic information systems , GIS '04, pp.266-273, 2004.
DOI : 10.1145/1032222.1032261