S. Abiteboul, B. André, and D. Kaplan, Managing your digital life, Communications of the ACM, vol.58, issue.5, pp.32-35, 2015.
DOI : 10.1145/2670528

URL : https://hal.archives-ouvertes.fr/hal-01068006

M. Albers, «One Last Away Message.» tumblr.com. 06 Octobre, 2017.

M. Ali, R. Dhamotharan, E. Khan, S. U. Khan, A. V. Vasilakos et al., SeDaSC: Secure Data Sharing in Clouds, IEEE Systems Journal, vol.11, issue.2, pp.395-404, 2017.
DOI : 10.1109/JSYST.2014.2379646

M. Al-kahtani and R. Sandhu, «A model for attribute-based user-role assignment.» Computer Security Applications Conference, pp.353-362, 2002.

T. Alves and . «trustzone, Integrated hardware and software security.» White Paper, 2004.

N. Anciaux, L. Bouganim, B. Nquyen, I. S. Popa, P. Pucheral et al., cells: A sea change for personal data services, 2013.

A. Anderson, A comparison of two privacy policy languages, Proceedings of the 3rd ACM workshop on Secure web services , SWS '06, 2005.
DOI : 10.1145/1180367.1180378

A. Anderson, Core and hierarchical role based access control (RBAC) profile of XACML v2. 0. OASIS Standard, 2005.

. Apple, «iCloud Terms and Conditions.» apple.com. 19 Septembre 2017

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Et-starin, Persona, ACM SIGCOMM Computer Communication Review, vol.39, issue.4, pp.135-146, 2009.
DOI : 10.1145/1594977.1592585

R. Bayer, «Binary B-trees for virtual memory.» SIGFIDET (now SIGMOD) Workshop on Data Description, pp.219-235, 1971.
DOI : 10.1145/1734714.1734731

D. E. Bell and L. J. Et-lapadula, Secure computer systems: Unified exposition and multics interpretation The MITRE Corporation, 1976.

P. Bellavista, C. Giannelli, L. Iannario, L. W. Goix, and C. Et-venezia, Peer-to-Peer Content Sharing Based on Social Identities and Relationships, IEEE Internet Computing, vol.18, issue.3, pp.55-63, 2014.
DOI : 10.1109/MIC.2013.127

E. Bertino and R. Sandhu, Database security - concepts, approaches, and challenges, IEEE Transactions on Dependable and secure computing 2, pp.2-19, 2005.
DOI : 10.1109/TDSC.2005.9

URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2005-99.pdf

E. Bertino, G. Gabriel, and K. Ashish, «Access control for databases: Concepts and systems.» Foundations and Trends® in Databases, pp.1-148, 2011.
DOI : 10.1561/1900000014

E. Bertino, S. Pierangela, and J. Sushil, «Authorizations in relational database management systems.» Computer and communications security, pp.130-139, 1993.

B. H. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970.
DOI : 10.1145/362686.362692

E. Bocchi, I. Drago, and M. Et-mellia, «Personal cloud storage: Usage, performance and impact of terminals.» Cloud Networking (CloudNet), pp.2015-106

N. Borisov, I. Goldberg, and E. Brewer, «Off-the-record communication, or, why not to use PGP.» Privacy in the electronic society, pp.77-84, 2004.

R. Botsman, «Big data meets Big Brother as China moves to rate its citizens.» Wired

L. Bouganim, B. Jónsson, P. Bonnet, and . «uflip, Understanding flash IO patterns, The Biennial Conference on Innovative Data systems Research, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00624058

P. Cain, «Where 1,296 gay Ashley Madison users face prison, flogging, execution.» GlobalNews. 02 Septembre 2015. https://globalnews.ca/news/2186587/where-1296- gay-ashley-madison-users-face-prison-flogging-execution

S. Canard and J. Et-devigne, Highly privacy-protecting data sharing in a tree structure, Future Generation Computer Systems, vol.62, pp.119-127
DOI : 10.1016/j.future.2016.01.019

B. Carminati, E. Ferrari, and . Et-perego, A. «Rule-based access control for social networks.» On the Move to Meaningful Internet Systems, pp.1734-1744, 2006.
URL : https://hal.archives-ouvertes.fr/hal-01629467

A. Cavoukian, «Privacy by design. Take the challenge. .» nformation and privacy commissioner of Ontario, 2009.
DOI : 10.4018/978-1-61350-501-4.ch007

K. Chard, K. Bubendorfer, S. Caton, and O. Et-rana, Social Cloud Computing: A Vision for Socially Motivated Resource Sharing, IEEE Transactions on Services Computing 5, pp.551-563, 2012.
DOI : 10.1109/TSC.2011.39

J. Chelet, . «baidu, . Alibaba, . Tencent, and . Xiaomi, ces incroyables «GAFA» chinois.» Capital.fr. 17 Juin 2016

Y. Cherdantseva and J. Hilton, «A reference model of information assurance & security.» Availability, Reliability and Security (ARES), pp.546-555, 2013.

R. Chirgwin, «Sweden leaked every car owners' details last year, then tried to hush it up.» TheRegister, p.23

W. Christl, «Corporate Surveillance in Everyday Life.» Cracked Labs, 2017.

P. Cohen-grillet, «La CIA appelée au secours par l'antiterrorisme français, » Paris Match, p.7

L. A. Cutillo, R. Molva, and T. Et-strufe, Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, p.12, 2009.
DOI : 10.1109/MCOM.2009.5350374

URL : https://hal.archives-ouvertes.fr/hal-00687143

D. Choudhury, M. Mason, W. A. Hofman, J. M. Watts, and D. J. , Inferring relevant social networks from interpersonal communication, Proceedings of the 19th international conference on World wide web, WWW '10, pp.301-310, 2010.
DOI : 10.1145/1772690.1772722

Y. A. De-montjoye, S. S. Wang, A. Pentland, D. T. Anh, and . Datta, A. «On the Trusted Use of Large-Scale Personal Data, IEEE Data Engineering, vol.35, issue.4, pp.5-8, 2012.

C. Diuk, «The Formation of Love.» facebook. 14 02 2014. https://www.facebook.com/notes/facebook-data-science/the-formation-of- love

M. Eichner, Spring cleaning in Summer, p.3

A. Entous, C. Timberg, and E. Dwoskin, «Russian operatives used Facebook ads to exploit America's racial and religious divisions.» The Washington Post. 25 Septembre 2017. https://www.washingtonpost.com/business/technology/russian-operatives-used- facebook-ads-to-exploit-divisions-over-black-political-activism-and- muslims, pp.4-011242, 2017.

K. Ermoshina, F. Musiani, and H. Halpin, End-to-End Encrypted Messaging Protocols: An Overview, International Conference on Internet Science, pp.244-254, 2016.
DOI : 10.1145/606272.606298

URL : https://hal.archives-ouvertes.fr/hal-01394920

R. Falkvinge, Worst known governmental leak ever is slowly coming to light: Agency moved nation's secret data to ?The Cloud?swedish-transport-agency-worst- known-governmental-leak-ever-is-slowly-coming-to-light, PrivacyNewsOnline. Juillet, vol.21, 2017.

L. Fang and K. Et-lefevre, Privacy wizards for social networking sites, Proceedings of the 19th international conference on World wide web, WWW '10, pp.351-360, 2010.
DOI : 10.1145/1772690.1772727

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Et-chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

T. Fielding, Architectural Styles and the Design of Network-based Software Architectures, 2000.

B. Fitzpatrick, Distributed Identity: Yadis, 2005.

A. Friggeri, «When Love Goes Awry.» facebook. 15 02 2014. https://www.facebook.com/notes/facebook-data-science/when-love-goes- awry

R. Geambasu, M. Balazinska, S. D. Gribble, and H. M. Et-levy, Homeviews, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.235-246, 2007.
DOI : 10.1145/1247480.1247508

B. Gellman, «The FBI's Secret Scrutiny.» Washington Post. 6 Novembre, 2005.

S. Gibbs, «Criminal gang arrested for selling Apple users' private data in China .» The Guardian. 09 Juin, 2017.

S. Gilbert and N. Lynch, «Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services.» Sigact News, pp.51-59, 2002.

. Google, «Bienvenue dans les règles de confidentialité de Google.» google.com, p.18

M. Greeven and W. Wei, «The rise of new technology giants from China

P. P. Griffiths and B. W. Wade, An authorization mechanism for a relational database system, ACM Transactions on Database Systems, vol.1, issue.3, pp.242-255, 1976.
DOI : 10.1145/320473.320482

P. Heim, «Resetting passwords to keep your files safe.» Dropbox. 25 Août 2016

V. Hermann, «Lycos annonce la fermeture de Caramail pour le 15 février.» nextinpact, p.14

A. Hern, «Uber employees 'spied on ex-partners, politicians and Beyoncé' .» The Guardian. 13 Decembre 2016. Uber employees 'spied on ex-partners, politicians and Beyoncé

A. Hough, «Google engineer fired for privacy breach after 'stalking and harrassing teenagers'.» The Telegraph, p.15

M. Hvistendahl, «Inside China's Vast New Experiment in Social Ranking.» Wired, p.17

T. Inkster, H. Story, and B. Et-harbulot, WebID Authentication over TLS, 2017.

A. «investigatory-powers, » United Kingdom Parliament, 2016.

B. Johnson, «Privacy no longer a social norm, says Facebook founder .» The Guardian, p.11

R. Kainda, I. Flechais, and A. W. Roscoe, Security and Usability: Analysis and Evaluation, 2010 International Conference on Availability, Reliability and Security, pp.275-282, 2010.
DOI : 10.1109/ARES.2010.77

URL : http://www.comlab.ox.ac.uk/files/2859/ares_main.pdf

F. Karlitschek, big-changes-i-am-leaving-owncloud-inc- today, 2016.

A. Katsouraki, Sharing and Usage Control of Personal Information, 2016.
URL : https://hal.archives-ouvertes.fr/tel-01425638

J. Katz, A. Sahai, B. Et-waters, J. «katz, A. Sahai et al., Predicate encryption supporting disjunctions, polynomial equations, and inner products, Advances in Cryptology?EUROCRYPT, pp.146-162, 2008.
DOI : 10.1007/s00145-012-9119-4

URL : http://www.cs.umd.edu/~jkatz/papers/ec08.pdf

P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur et al., Tag, you can see it!, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.2012-377
DOI : 10.1145/2207676.2207728

B. Klimt and Y. Et-yang, The Enron Corpus: A New Dataset for Email Classification Research, Machine learning: ECML [Machine learning: ECML], pp.217-226, 2004.
DOI : 10.1007/978-3-540-30115-8_22

J. Knockel, S. Mckune, and A. Senft, «Baidu's and Don'ts.» TheCitizenLab, pp.2-2016

A. D. Kramer, J. E. Guillory, and J. T. Hancock, Experimental evidence of massive-scale emotional contagion through social networks, Proceedings of the National Academy of Sciences, vol.489, issue.7415, pp.24-8788, 2014.
DOI : 10.1038/nature11421

S. Liao, «Google admits it tracked user location data even when the setting was turned off.» The Verge

Y. Liu, K. P. Gummadi, and B. Krishnamurthy, Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.61-70, 2011.
DOI : 10.1145/2068816.2068823

B. Marr and . Data, 20 Mind-Boggling Facts Everyone Must Read.» Forbes, 2015.

V. Martins, Data Replication in P2P Systems, Faculté des Sciences et Techniques, 2007.
URL : https://hal.archives-ouvertes.fr/tel-00481828

C. Mcgoogan, Why your smart TV is the perfect way to spy on you . 8 Mars, 2017.

. Moneycontrol, «WeChat confirms that it makes all private user data available to the Chinese government, » MoneyControl, 2017.

S. Nakamoto, «Bitcoin: A Peer-to-Peer Electronic Cash System, 2008.

G. Navarro, A guided tour to approximate string matching, ACM Computing Surveys, vol.33, issue.1, pp.31-88, 2001.
DOI : 10.1145/375360.375365

. Newcenter, «Challenging the Titans of Technology.» newcenter.org. 2017. http://newcenter.org/ideas-to-re-center-america/challenging-big-tech

L. H. Newman, «Yahoo's 2013 Email Hack Actually Compromised Three Billion Accounts.» Wired. 10 Mars, 2017.

. Oracle, «Porting Guide for Release 6.» docs.oracle.com, 2017.

S. Osborn, R. Sandhu, and Q. Munawer, Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security, vol.3, issue.2, pp.85-106, 2000.
DOI : 10.1145/354876.354878

URL : http://www.csd.uwo.ca/faculty/sylvia/models.ps

J. Park, R. Sandhu, and . Ucon, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

S. Perez, «117 million LinkedIn emails and passwords from a 2012 hack just got posted online.» TechCrunch-million- linkedin-emails-and-passwords-from-a-2012-hack-just-got-posted-online, 2016.

H. Puel and . «microsoft-clôt-le-chapitre-encarta, » 01net.com. 31 Mars, 2009.

D. Recordon and D. Et-reed, OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-16, 2006.
DOI : 10.1145/1179529.1179532

D. Reed and G. Strongin, The Dataweb: An Introduction to XDI, 2004.

G. Rosen and . Newsroom, 27 Novembre 2017. https://newsroom.fb.com/newsgetting- our-community-help-in-real-time, 2017.

C. Rudder, «We Experiment On Human Beings!» OkCupid. 27 Juillet, 2014.

A. Sahai and B. Et-waters, Fuzzy Identity-Based Encryption, » Eurocrypt, pp.457-473, 2005.
DOI : 10.1007/11426639_27

P. Saint-andre, Extensible Messaging and Presence Protocol (XMPP): Core, RFC, vol.6120, 2011.
DOI : 10.17487/rfc6120

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc6120.txt.pdf

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf

R. S. Sandhu, D. Ferraiolo, and R. Et-kuhn, «ANSI Standard -Role Based Access Control, 2004.

R. S. Sandhu and . Munawer, Q. «How to do discretionary access control using roles.» ACM workshop on Role-based access control, pp.47-54, 1998.

R. S. Sandhu and S. Pierangela, Access control: principle and practice, IEEE communications magazine, pp.40-48, 1994.
DOI : 10.1109/35.312842

E. Schmidt, Inside the Mind of Google [02 Decembre, 2009.

B. Schneier, Computer Security, 2000.
DOI : 10.1002/9781119183631.ch8

L. Segall, «Pastor outed on Ashley Madison commits suicide.» CNN. 08 Septembre, 2015.

H. B. Shen and F. Et-hong, An attribute-based access control model for web services.» Parallel and Distributed Computing, Applications and Technologies, pp.74-79, 2006.

S. H. Son, Replicated data management in distributed database systems, ACM SIGMOD Record, vol.17, issue.4, pp.62-69, 1988.
DOI : 10.1145/61733.61738

A. C. Squicciarini, S. Sundareswaran, D. Lin, and J. Et-wede, A3P, Proceedings of the 22nd ACM conference on Hypertext and hypermedia, HT '11
DOI : 10.1145/1995966.1996000

R. Stallman, https://www.gnu.org/philosophy/open-source-misses-the-point, 2016.

S. T. Sun, K. Hawkey, and K. Beznosov, Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures, Computers & Security 31, pp.465-483, 2012.
DOI : 10.1016/j.cose.2012.02.005

P. Sundaresan, Generalized key indexes, p.747, 1999.

P. Szoldra, «This is everything Edward Snowden revealed in one year of unprecedented top- secret leaks.» Business Insider, p.6

P. N. Tan, Introduction to data mining, 2006.

. «the-economist, The world's most valuable resource is no longer oil, but data. 06 05 2017. https://www.economist.com/news/leaders/21721656-data-economy-demands-new- approach-antitrust-rules-worlds-most-valuable-resource

. Thenextweb, MyOpenID to shut down. 2014. https://thenextweb.com/insider, 2013.

V. Thirani and . Gupta, A. «The value of data.» World Economic Forum. 22 Septembre, 2017.

J. Titcomb and C. Mcgoogan, «Wikileaks: What has been revealed and can the CIA hack my TV

A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Et-wolman, «Lockr: better privacy for social networks.» Emerging networking experiments and technologies, pp.169-180, 2009.

P. Tran-van, N. Anciaux, and P. Pucheral, «A New Sharing Paradigm for the Personal Cloud.» Trust and Privacy in Digital Business (TrustBus), pp.180-196, 2017.

?. «swyswyk, A New Sharing Paradigm for the Personal Cloud, International Conference on Advanced Data Mining and Applications (ADMA, pp.839-845, 2017.

. Uber, «Uber's Deleted ?Rides of Glory? Blog Post

B. Van-delft and M. Et-oostdijk, «A security analysis of OpenID.» Policies and Research in Identity Management, pp.73-84, 2010.

E. Van-der-sar, MegaUpload Shut Down by the Feds, Founder Arrested, 2012.

M. Van-kleek, D. A. Smith, and N. Et-shadbolt, « A decentralized architecture for consolidating personal information ecosystems: The WebBox.» PIM, 2012.

A. Weininger, Efficient execution of joins in a star schema, Proceedings of the 2002 ACM SIGMOD international conference on Management of data , SIGMOD '02, pp.542-545, 2002.
DOI : 10.1145/564691.564754

T. Wetzel, «Houston man charged with child porn possession after Google cyber-tip.» Khou, 2014.

E. Wobber, M. Abadi, M. Burrows, and B. Et-lampson, Authentication in the Taos operating system, ACM Transactions on Computer Systems, vol.12, issue.1, pp.3-32, 1994.
DOI : 10.1145/174613.174614

B. M. Wolfe, «Uber's 'God View' is Alive and Well, Say Former Employees.» AppAdvice, p.13

L. Xu, X. Wu, and X. Et-zhang, CL-PRE, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS '12, pp.2012-87
DOI : 10.1145/2414456.2414507

L. Yuan, P. Korshunov, and T. Et-ebrahimi, Privacy-preserving photo sharing based on a secure JPEG, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.185-190, 2015.
DOI : 10.1109/INFCOMW.2015.7179382

P. Zimmermann, «The official PGP user's guide, 1995.