Managing your digital life, Communications of the ACM, vol.58, issue.5, pp.32-35, 2015. ,
DOI : 10.1145/2670528
URL : https://hal.archives-ouvertes.fr/hal-01068006
«One Last Away Message.» tumblr.com. 06 Octobre, 2017. ,
SeDaSC: Secure Data Sharing in Clouds, IEEE Systems Journal, vol.11, issue.2, pp.395-404, 2017. ,
DOI : 10.1109/JSYST.2014.2379646
«A model for attribute-based user-role assignment.» Computer Security Applications Conference, pp.353-362, 2002. ,
Integrated hardware and software security.» White Paper, 2004. ,
cells: A sea change for personal data services, 2013. ,
A comparison of two privacy policy languages, Proceedings of the 3rd ACM workshop on Secure web services , SWS '06, 2005. ,
DOI : 10.1145/1180367.1180378
Core and hierarchical role based access control (RBAC) profile of XACML v2. 0. OASIS Standard, 2005. ,
«iCloud Terms and Conditions.» apple.com. 19 Septembre 2017 ,
Persona, ACM SIGCOMM Computer Communication Review, vol.39, issue.4, pp.135-146, 2009. ,
DOI : 10.1145/1594977.1592585
«Binary B-trees for virtual memory.» SIGFIDET (now SIGMOD) Workshop on Data Description, pp.219-235, 1971. ,
DOI : 10.1145/1734714.1734731
Secure computer systems: Unified exposition and multics interpretation The MITRE Corporation, 1976. ,
Peer-to-Peer Content Sharing Based on Social Identities and Relationships, IEEE Internet Computing, vol.18, issue.3, pp.55-63, 2014. ,
DOI : 10.1109/MIC.2013.127
Database security - concepts, approaches, and challenges, IEEE Transactions on Dependable and secure computing 2, pp.2-19, 2005. ,
DOI : 10.1109/TDSC.2005.9
URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2005-99.pdf
«Access control for databases: Concepts and systems.» Foundations and Trends® in Databases, pp.1-148, 2011. ,
DOI : 10.1561/1900000014
«Authorizations in relational database management systems.» Computer and communications security, pp.130-139, 1993. ,
Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970. ,
DOI : 10.1145/362686.362692
«Personal cloud storage: Usage, performance and impact of terminals.» Cloud Networking (CloudNet), pp.2015-106 ,
«Off-the-record communication, or, why not to use PGP.» Privacy in the electronic society, pp.77-84, 2004. ,
«Big data meets Big Brother as China moves to rate its citizens.» Wired ,
Understanding flash IO patterns, The Biennial Conference on Innovative Data systems Research, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00624058
«Where 1,296 gay Ashley Madison users face prison, flogging, execution.» GlobalNews. 02 Septembre 2015. https://globalnews.ca/news/2186587/where-1296- gay-ashley-madison-users-face-prison-flogging-execution ,
Highly privacy-protecting data sharing in a tree structure, Future Generation Computer Systems, vol.62, pp.119-127 ,
DOI : 10.1016/j.future.2016.01.019
A. «Rule-based access control for social networks.» On the Move to Meaningful Internet Systems, pp.1734-1744, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-01629467
«Privacy by design. Take the challenge. .» nformation and privacy commissioner of Ontario, 2009. ,
DOI : 10.4018/978-1-61350-501-4.ch007
Social Cloud Computing: A Vision for Socially Motivated Resource Sharing, IEEE Transactions on Services Computing 5, pp.551-563, 2012. ,
DOI : 10.1109/TSC.2011.39
ces incroyables «GAFA» chinois.» Capital.fr. 17 Juin 2016 ,
«A reference model of information assurance & security.» Availability, Reliability and Security (ARES), pp.546-555, 2013. ,
«Sweden leaked every car owners' details last year, then tried to hush it up.» TheRegister, p.23 ,
«Corporate Surveillance in Everyday Life.» Cracked Labs, 2017. ,
«La CIA appelée au secours par l'antiterrorisme français, » Paris Match, p.7 ,
Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, p.12, 2009. ,
DOI : 10.1109/MCOM.2009.5350374
URL : https://hal.archives-ouvertes.fr/hal-00687143
Inferring relevant social networks from interpersonal communication, Proceedings of the 19th international conference on World wide web, WWW '10, pp.301-310, 2010. ,
DOI : 10.1145/1772690.1772722
A. «On the Trusted Use of Large-Scale Personal Data, IEEE Data Engineering, vol.35, issue.4, pp.5-8, 2012. ,
«The Formation of Love.» facebook. 14 02 2014. https://www.facebook.com/notes/facebook-data-science/the-formation-of- love ,
Spring cleaning in Summer, p.3 ,
«Russian operatives used Facebook ads to exploit America's racial and religious divisions.» The Washington Post. 25 Septembre 2017. https://www.washingtonpost.com/business/technology/russian-operatives-used- facebook-ads-to-exploit-divisions-over-black-political-activism-and- muslims, pp.4-011242, 2017. ,
End-to-End Encrypted Messaging Protocols: An Overview, International Conference on Internet Science, pp.244-254, 2016. ,
DOI : 10.1145/606272.606298
URL : https://hal.archives-ouvertes.fr/hal-01394920
Worst known governmental leak ever is slowly coming to light: Agency moved nation's secret data to ?The Cloud?swedish-transport-agency-worst- known-governmental-leak-ever-is-slowly-coming-to-light, PrivacyNewsOnline. Juillet, vol.21, 2017. ,
Privacy wizards for social networking sites, Proceedings of the 19th international conference on World wide web, WWW '10, pp.351-360, 2010. ,
DOI : 10.1145/1772690.1772727
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
Architectural Styles and the Design of Network-based Software Architectures, 2000. ,
Distributed Identity: Yadis, 2005. ,
«When Love Goes Awry.» facebook. 15 02 2014. https://www.facebook.com/notes/facebook-data-science/when-love-goes- awry ,
Homeviews, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.235-246, 2007. ,
DOI : 10.1145/1247480.1247508
«The FBI's Secret Scrutiny.» Washington Post. 6 Novembre, 2005. ,
«Criminal gang arrested for selling Apple users' private data in China .» The Guardian. 09 Juin, 2017. ,
«Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services.» Sigact News, pp.51-59, 2002. ,
«Bienvenue dans les règles de confidentialité de Google.» google.com, p.18 ,
«The rise of new technology giants from China ,
An authorization mechanism for a relational database system, ACM Transactions on Database Systems, vol.1, issue.3, pp.242-255, 1976. ,
DOI : 10.1145/320473.320482
«Resetting passwords to keep your files safe.» Dropbox. 25 Août 2016 ,
«Lycos annonce la fermeture de Caramail pour le 15 février.» nextinpact, p.14 ,
«Uber employees 'spied on ex-partners, politicians and Beyoncé' .» The Guardian. 13 Decembre 2016. Uber employees 'spied on ex-partners, politicians and Beyoncé ,
«Google engineer fired for privacy breach after 'stalking and harrassing teenagers'.» The Telegraph, p.15 ,
«Inside China's Vast New Experiment in Social Ranking.» Wired, p.17 ,
WebID Authentication over TLS, 2017. ,
» United Kingdom Parliament, 2016. ,
«Privacy no longer a social norm, says Facebook founder .» The Guardian, p.11 ,
Security and Usability: Analysis and Evaluation, 2010 International Conference on Availability, Reliability and Security, pp.275-282, 2010. ,
DOI : 10.1109/ARES.2010.77
URL : http://www.comlab.ox.ac.uk/files/2859/ares_main.pdf
big-changes-i-am-leaving-owncloud-inc- today, 2016. ,
Sharing and Usage Control of Personal Information, 2016. ,
URL : https://hal.archives-ouvertes.fr/tel-01425638
Predicate encryption supporting disjunctions, polynomial equations, and inner products, Advances in Cryptology?EUROCRYPT, pp.146-162, 2008. ,
DOI : 10.1007/s00145-012-9119-4
URL : http://www.cs.umd.edu/~jkatz/papers/ec08.pdf
Tag, you can see it!, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.2012-377 ,
DOI : 10.1145/2207676.2207728
The Enron Corpus: A New Dataset for Email Classification Research, Machine learning: ECML [Machine learning: ECML], pp.217-226, 2004. ,
DOI : 10.1007/978-3-540-30115-8_22
«Baidu's and Don'ts.» TheCitizenLab, pp.2-2016 ,
Experimental evidence of massive-scale emotional contagion through social networks, Proceedings of the National Academy of Sciences, vol.489, issue.7415, pp.24-8788, 2014. ,
DOI : 10.1038/nature11421
«Google admits it tracked user location data even when the setting was turned off.» The Verge ,
Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.61-70, 2011. ,
DOI : 10.1145/2068816.2068823
20 Mind-Boggling Facts Everyone Must Read.» Forbes, 2015. ,
Data Replication in P2P Systems, Faculté des Sciences et Techniques, 2007. ,
URL : https://hal.archives-ouvertes.fr/tel-00481828
Why your smart TV is the perfect way to spy on you . 8 Mars, 2017. ,
«WeChat confirms that it makes all private user data available to the Chinese government, » MoneyControl, 2017. ,
«Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. ,
A guided tour to approximate string matching, ACM Computing Surveys, vol.33, issue.1, pp.31-88, 2001. ,
DOI : 10.1145/375360.375365
«Challenging the Titans of Technology.» newcenter.org. 2017. http://newcenter.org/ideas-to-re-center-america/challenging-big-tech ,
«Yahoo's 2013 Email Hack Actually Compromised Three Billion Accounts.» Wired. 10 Mars, 2017. ,
«Porting Guide for Release 6.» docs.oracle.com, 2017. ,
Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security, vol.3, issue.2, pp.85-106, 2000. ,
DOI : 10.1145/354876.354878
URL : http://www.csd.uwo.ca/faculty/sylvia/models.ps
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004. ,
DOI : 10.1145/984334.984339
«117 million LinkedIn emails and passwords from a 2012 hack just got posted online.» TechCrunch-million- linkedin-emails-and-passwords-from-a-2012-hack-just-got-posted-online, 2016. ,
» 01net.com. 31 Mars, 2009. ,
OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-16, 2006. ,
DOI : 10.1145/1179529.1179532
The Dataweb: An Introduction to XDI, 2004. ,
27 Novembre 2017. https://newsroom.fb.com/newsgetting- our-community-help-in-real-time, 2017. ,
«We Experiment On Human Beings!» OkCupid. 27 Juillet, 2014. ,
Fuzzy Identity-Based Encryption, » Eurocrypt, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Extensible Messaging and Presence Protocol (XMPP): Core, RFC, vol.6120, 2011. ,
DOI : 10.17487/rfc6120
URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc6120.txt.pdf
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf
«ANSI Standard -Role Based Access Control, 2004. ,
Q. «How to do discretionary access control using roles.» ACM workshop on Role-based access control, pp.47-54, 1998. ,
Access control: principle and practice, IEEE communications magazine, pp.40-48, 1994. ,
DOI : 10.1109/35.312842
Inside the Mind of Google [02 Decembre, 2009. ,
Computer Security, 2000. ,
DOI : 10.1002/9781119183631.ch8
«Pastor outed on Ashley Madison commits suicide.» CNN. 08 Septembre, 2015. ,
An attribute-based access control model for web services.» Parallel and Distributed Computing, Applications and Technologies, pp.74-79, 2006. ,
Replicated data management in distributed database systems, ACM SIGMOD Record, vol.17, issue.4, pp.62-69, 1988. ,
DOI : 10.1145/61733.61738
A3P, Proceedings of the 22nd ACM conference on Hypertext and hypermedia, HT '11 ,
DOI : 10.1145/1995966.1996000
https://www.gnu.org/philosophy/open-source-misses-the-point, 2016. ,
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures, Computers & Security 31, pp.465-483, 2012. ,
DOI : 10.1016/j.cose.2012.02.005
Generalized key indexes, p.747, 1999. ,
«This is everything Edward Snowden revealed in one year of unprecedented top- secret leaks.» Business Insider, p.6 ,
Introduction to data mining, 2006. ,
The world's most valuable resource is no longer oil, but data. 06 05 2017. https://www.economist.com/news/leaders/21721656-data-economy-demands-new- approach-antitrust-rules-worlds-most-valuable-resource ,
MyOpenID to shut down. 2014. https://thenextweb.com/insider, 2013. ,
A. «The value of data.» World Economic Forum. 22 Septembre, 2017. ,
«Wikileaks: What has been revealed and can the CIA hack my TV ,
«Lockr: better privacy for social networks.» Emerging networking experiments and technologies, pp.169-180, 2009. ,
«A New Sharing Paradigm for the Personal Cloud.» Trust and Privacy in Digital Business (TrustBus), pp.180-196, 2017. ,
A New Sharing Paradigm for the Personal Cloud, International Conference on Advanced Data Mining and Applications (ADMA, pp.839-845, 2017. ,
«Uber's Deleted ?Rides of Glory? Blog Post ,
«A security analysis of OpenID.» Policies and Research in Identity Management, pp.73-84, 2010. ,
MegaUpload Shut Down by the Feds, Founder Arrested, 2012. ,
« A decentralized architecture for consolidating personal information ecosystems: The WebBox.» PIM, 2012. ,
Efficient execution of joins in a star schema, Proceedings of the 2002 ACM SIGMOD international conference on Management of data , SIGMOD '02, pp.542-545, 2002. ,
DOI : 10.1145/564691.564754
«Houston man charged with child porn possession after Google cyber-tip.» Khou, 2014. ,
Authentication in the Taos operating system, ACM Transactions on Computer Systems, vol.12, issue.1, pp.3-32, 1994. ,
DOI : 10.1145/174613.174614
«Uber's 'God View' is Alive and Well, Say Former Employees.» AppAdvice, p.13 ,
CL-PRE, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS '12, pp.2012-87 ,
DOI : 10.1145/2414456.2414507
Privacy-preserving photo sharing based on a secure JPEG, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.185-190, 2015. ,
DOI : 10.1109/INFCOMW.2015.7179382
«The official PGP user's guide, 1995. ,