S. Abiteboul, B. André, and D. Kaplan, Managing Your Digital Life, Commun. ACM, vol.58, pp.32-35, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01068006

A. Acquisti and J. Grossklags, Privacy and rationality in individual decision making, IEEE Security Privacy, vol.3, pp.26-33, 2005.

T. Allard, B. Nguyen, and P. Pucheral, Towards a Safe Realization of Privacy-Preserving Data Publishing Mechanisms, 2011 IEEE 12th International Conference on Mobile Data Management, vol.2, pp.31-34, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00664280

N. Anciaux, Trusted Cells: A Sea Change for Personal Data Services, CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research, 2013.

M. E. Andrés, Geo-indistinguishability: Differential Privacy for Location-based Systems, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. CCS '13, pp.901-914, 2013.

S. Bajaj and R. Sion, TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality, IEEE Transactions on Knowledge and Data Engineering, vol.26, pp.1041-4347, 2014.

B. Bamba, Supporting Anonymous Location Queries in Mobile Environments with Privacygrid, Proceedings of the 17th International Conference on World Wide Web. WWW '08, pp.237-246, 2008.

J. Roberto, R. Bayardo, and . Agrawal, Data Privacy Through Optimal k-Anonymization, Proceedings of the 21st International Conference on Data Engineering. ICDE '05, pp.217-228, 2005.

N. Beldiceanu and . Contejean, Introducing global constraints in CHIP, In: Mathematical and Computer Modelling, vol.20, issue.94, pp.90127-90136, 1994.
URL : https://hal.archives-ouvertes.fr/hal-00442810

B. Maxime, La gestion de la confidentialité pour les données individuelles, Institut national de la statistique et des études économiques (INSEE), 2016.

B. Maxime, A French Anonymization Experiment with Health Data, PSD 2014 : Privacy in Statistical Databases. Eivissa, Spain, 2014.

C. Bessiere, The AllDifferent Constraint with Precedences". In: Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, pp.978-981, 2011.
URL : https://hal.archives-ouvertes.fr/lirmm-00748652

E. Van-den-broeck, K. Poels, and M. Walrave, Older and Wiser? Facebook Use, Privacy Concern, and Privacy Protection in the Life Stages of Emerging, Young, and Middle Adulthood, Social Media + Society, vol.1, p.2056305115616149, 2015.

J. Byun, Efficient k-Anonymization Using Clustering Techniques, Advances in Databases: Concepts, Systems and Applications, pp.188-200, 2007.

F. Pamara and . Chang, Age Differences in Online Social Networking: Extending Socioemotional Selectivity Theory to Social Network Sites, Journal of Broadcasting & Electronic Media, vol.59, pp.221-239, 2015.

A. Cuzzocrea, C. Mastroianni, and G. M. Grasso, Private databases on the cloud: Models, issues and research perspectives, 2016 IEEE International Conference on Big Data (Big Data, pp.3656-3661, 2016.

T. Dao, K. Duong, and C. Vrain, Combining Constraint Solving with Mining and Learning, Artificial Intelligence, pp.4-3702, 2017.

J. Domingo-ferrer, J. M. Mateo-sanz, and V. Torra, Comparing SDC Methods for Microdata on the Basis of Information Loss and Disclosure, Proceedings of ETK-NTTS, pp.807-826, 2001.

J. Domingo, -. Ferrer, and J. Soria-comas, From t-closeness to differential privacy and vice versa in data anonymization, KnowledgeBased Systems, vol.74, pp.151-158, 2015.

J. Domingo, -. Ferrer, V. Torra, and ;. P. Doyle, A quantitative comparison of disclosure control methods for microdata, Confidentiality, disclosure, and data access : Theory and practical applications for statistical agencies, pp.111-133, 2001.

J. Domingo, -. Ferrer, and V. Torra, Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation, Data ng and Knowledge Discovery, vol.11, pp.195-212, 2005.

C. Dwork, Differential Privacy, Proceeding of the 39th International Colloquium on Automata, Languages and Programming, vol.4052, pp.1-12, 2006.

Ú. Erlingsson, V. Pihur, and A. Korolova, RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS '14, pp.1054-1067, 2014.

M. Ester, A Density-based Algorithm for Discovering Clusters a Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise, Proceedings of the Second International Conference on Knowledge Discovery and Data Mining. KDD'96, pp.226-231, 1996.

, European Union. ARTICLE 29 DATA PROTECTION WORKING PARTY: Opinion 05/2014 on Anonymisation Techniques, 2014.

P. Flajolet, Hyperloglog: The analysis of a near-optimal cardinality estimation algorithm, Proceedings of the 2007 International conference on Analysis of Algorithms (AOFA'07), 2007.
URL : https://hal.archives-ouvertes.fr/hal-00406166

P. Francis, S. P. Eide, and R. Munz, Diffix: High-Utility Database Anonymization, Privacy Technologies and Policy, pp.978-981, 2017.

B. C. Fung, K. Wang, and P. S. Yu, Top-down specialization for information and privacy preservation, 21st International Conference on Data Engineering (ICDE'05, pp.205-216, 2005.

C. M. Benjamin and . Fung, Privacy-preserving Data Publishing: A Survey of Recent Developments, In: ACM Comput. Surv, vol.42, issue.4, 2010.

Y. Gahi, M. Guennoun, and K. El-khatib, A Secure Database System using Homomorphic Encryption Schemes, 2015.

S. Gambs, M. Killijian, and M. N. Cortez, De-anonymization Attack on Geolocated Data, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.789-797, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01242268

S. Gambs, M. Killijian, and M. Cortez, Show Me How You Move and I Will Tell You Who You Are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. SPRINGL '10, pp.34-41, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00556833

T. Ge and S. Zdonik, Answering Aggregation Queries in a Secure System Model, Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB '07, pp.519-530, 2007.

G. Team, Gecode: Generic Constraint Development Environment, 2006.

B. Gedik and L. Liu, Location Privacy in Mobile Systems: A Personalized Anonymization Model, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05, pp.620-629, 2005.

C. Gentry, Fully Homomorphic Encryption Using Ideal Lattices, Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing. STOC '09, pp.169-178, 2009.

S. Gilpin and I. Davidson, Incorporating SAT Solvers into Hierarchical Clustering Algorithms: An Efficient and Flexible Approach, Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD '11, pp.1136-1144, 2011.

A. Gionis, A. Mazza, and T. Tassa, k-Anonymization Revisited, 2008 IEEE 24th International Conference on Data Engineering, pp.744-753, 2008.

F. Teofilo and . Gonzalez, Clustering to minimize the maximum intercluster distance, Theoretical Computer Science, vol.38, pp.90224-90229, 1985.

F. Teofilo and . Gonzalez, Clustering to minimize the maximum intercluster distance, Theoretical Computer Science, vol.38, pp.90224-90229, 1985.

M. Hardt and G. N. Rothblum, A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp.61-70, 2010.

A. Hundepool, The ARGUS Software in the CASC-Project". In: Privacy in Statistical Databases, pp.323-335, 2004.

V. S. Iyengar, Transforming Data to Satisfy Privacy Constraints, Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD '02, pp.279-288, 2002.

L. C. Willenborg, J. M. Gouweleeuw, P. Kooiman, and P. Wolf, Post Randomisation for Statistical Disclosure Control: Theory and Implementation, Journal of Official Statistics, vol.14, pp.282-423, 1998.

Z. Jorgensen, T. Yu, and G. Cormode, Conservative or liberal? Personalized differential privacy, 2015 IEEE 31st International Conference on Data Engineering, pp.1023-1034, 2015.

P. Jousilahti, Sex, age, cardiovascular risk factors, and coronary heart disease: a prospective follow-up study of 14 786 middleaged men and women in Finland, Circulation 99, vol.9, pp.1165-1172, 1999.

A. Katsouraki, Sharing and Usage Control of Personal Information. (Partage et Contrôle d'Usage de Données Personnelles, 2016.
URL : https://hal.archives-ouvertes.fr/tel-01425638

M. Kezer, Age differences in privacy attitudes, literacy and privacy management on Facebook, vol.10, pp.2016-2017, 2016.

C. Edward, M. Kokkelenberg, S. M. Dillon, and . Christy, The effects of class size on student grades at a public university, Economics of Education Review, vol.27, pp.221-233, 2008.

M. Z. Lagerkvist and C. Schulte, Advisors for Incremental Propagation". In: Principles and Practice of Constraint Programming -CP, pp.409-422, 2007.

S. Lallali, A Secure Search Engine for the Personal Cloud, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. SIGMOD '15, pp.978-979, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01176473

N. Lazaar, A Global Constraint for Closed Frequent Pattern Mining". In: Principles and Practice of Constraint Programming, pp.978-981, 2016.
URL : https://hal.archives-ouvertes.fr/lirmm-01374719

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Incognito: Efficient Full-domain K-anonymity, Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data

, SIGMOD '05, pp.49-60, 2005.

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Mondrian Multidimensional K-Anonymity, Proceedings of the 22Nd International Conference on Data Engineering. ICDE '06. Washington, 2006.

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Workloadaware Anonymization, Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD '06, pp.277-286, 2006.

H. Li, Partitioning-Based Mechanisms Under Personalized Differential Privacy, Advances in Knowledge Discovery and Data Mining, pp.978-981, 2017.

J. Li, Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures, Data Warehousing and Knowledge Discovery, pp.978-981, 2006.

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.

M. Lichman, UCI Machine Learning Repository, 2013.

X. Liu, Q. Xie, and L. Wang, A Personalized Extended (a, k)-Anonymity Model, 2015 Third International Conference on Advanced Cloud and Big Data, pp.234-240, 2015.

A. Machanavajjhala, l-Diversity: Privacy Beyond k-Anonymity, Proceedings of the 22nd International Conference on Data Engineering, ICDE, p.24, 2006.

J. Macqueen, Some methods for classification and analysis of multivariate observations, Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, vol.1, pp.281-297, 1967.

F. Mcsherry and K. Talwar, Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07, pp.94-103, 2007.

D. Frank and . Mcsherry, Privacy Integrated Queries: An Extensible Platform for Privacy-preserving Data Analysis, Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. SIGMOD '09, pp.19-30, 2009.

A. Michel and B. Nguyen, Exécution de requêtes distribuées sous contraintes d'anonymat. Sur l'architecture des Trusted Cells, Gestion des risques naturels, technologiques et sanitaires. Envirorisk, 2016.

A. Michel, B. Nguyen, and P. Pucheral, Managing Distributed Queries under Personalized Anonymity Constraints, Proceedings of the 6th International Conference on Data Science, vol.1, pp.107-117, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01682316

A. Michel, B. Nguyen, and P. Pucheral, The Case for Personalized Anonymization of Database Query Results, Data Management Technologies and Applications. Ed. by Joaquim Filipe, Jorge Bernardino, and Christoph Quix, pp.978-981, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01945674

N. Mohammed, Differentially Private Data Release for Data Mining, Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD '11, pp.493-501, 2011.

M. F. Mokbel, C. Chow, and W. G. Aref, The New Casper: Query Processing for Location Services Without Compromising Privacy, Proceedings of the 32Nd International Conference on Very Large Data Bases. VLDB '06. Seoul, Korea: VLDB Endowment, pp.763-774, 2006.

. Barun-kumar-nayak, Understanding the relevance of sample size calculation, Indian J Ophthalmol, vol.58, pp.469-470, 2010.

S. Ni, M. Xie, and Q. Qian, Clustering Based K-anonymity Algorithm for Privacy Preservation, International Journal of Network Security, vol.19, issue.6, p.23, 2017.

A. Oganian and J. Domingo-ferrer, On the Complexity of Optimal Microaggregation for Statistical Disclosure Control, Statistical Journal of the United Nations Economic Comission, vol.18, pp.345-354, 2001.

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -EUROCRYPT '99, pp.223-238, 1999.

A. Raluca and . Popa, CryptDB: Protecting Confidentiality with Encrypted Query Processing, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. SOSP '11, pp.85-100, 2011.

, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance, vol.27, 2016.

A. Roth and T. Roughgarden, Interactive Privacy via the Median Mechanism, Proceedings of the Forty-second ACM Symposium on Theory of Computing. STOC '10, pp.765-774, 2010.

P. Samarati and L. Sweeney, Generalizing Data to Provide Anonymity when Disclosing Information (Abstract)". In: Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. PODS '98, 1998.

Y. Shen, Y. Liu, and Y. Zhang, Personalized-Granular k-Anonymity, 2009 International Conference on Information Engineering and Computer Science, pp.1-4, 2009.

H. , J. Smith, S. J. Milberg, and S. J. Burke, Information Privacy: Measuring Individuals' Concerns about Organizational Practices, MIS Quarterly, vol.20, pp.167-196, 1996.

M. Louis-philippe-sondeck, V. Laurent, and . Frey, Discrimination rate: an attribute-centric metric to measure privacy, Annals of Telecommunications, vol.72, pp.1958-9395, 2017.

M. Louis-philippe-sondeck, V. Laurent, and . Frey, The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, vol.6, pp.285-294, 2017.

L. Sweeney, Achieving K-anonymity Privacy Protection Using Generalization and Suppression, Int. J. Uncertain. Fuzziness Knowl.-Based Syst, vol.10, pp.571-588, 2002.

L. Sweeney, k-Anonymity: A Model for Protecting Privacy, International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems, vol.10, pp.557-570, 2002.

M. Templ, A. Kowarik, and B. Meindl, Statistical Disclosure Control for Micro-Data Using the R Package sdcMicro, Journal of Statistical Software, vol.67, pp.1-36, 2015.

Q. To, B. Nguyen, and P. Pucheral, Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture, In: ACM Trans. Database Syst, vol.41, issue.3, pp.1-16, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01296432

Q. To, B. Nguyen, and P. Pucheral, SQL/AA: Executing SQL on an Asymmetric Architecture, pp.1625-1628, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01096642

H. K. Tsoi and L. Chen, From Privacy Concern to Uses of Social Network Sites: A Cultural Comparison via User Survey, 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, pp.457-464, 2011.

A. K. Tung, J. Hou, and J. Han, Spatial clustering in the presence of obstacles, Proceedings 17th International Conference on Data Engineering, pp.359-367, 2001.

H. K. Wachtel, Student Evaluation of College Teaching Effectiveness: a brief review, Assessment & Evaluation in Higher Education, vol.23, pp.191-212, 1998.

K. Wang, P. S. Yu, and S. Chakraborty, Bottom-up generalization: a data mining solution to privacy protection, Fourth IEEE International Conference on Data Mining (ICDM'04, pp.249-256, 2004.

D. M. Witten and R. Tibshirani, A Framework for Feature Selection in Clustering, Journal of the American Statistical Association, vol.105, pp.713-726, 2010.

R. Wong, An Enhanced K-anonymity Model for Privacy Preserving Data Publishing, Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD '06, pp.754-759, 2006.

R. Wong, Minimality Attack in Privacy Preserving Data Publishing, Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB '07, pp.978-979, 2007.

Z. Wu and M. Palmer, Verbs Semantics and Lexical Selection, Proceedings of the 32Nd Annual Meeting on Association for Computational Linguistics. ACL '94, pp.133-138, 1994.

X. Xiao and Y. Tao, Personalized Privacy Preservation, Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data. SIGMOD '06, pp.229-240, 2006.

X. Xiao, Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data. SIGMOD '11, pp.229-240, 2011.

J. Xu, Differentially Private Histogram Publication, 2012 IEEE 28th International Conference on Data Engineering, pp.32-43, 2012.

J. Yu, TopDown-KACA: An efficient local-recoding algorithm for k-anonymity, 2009 IEEE International Conference on Granular Computing, pp.727-732, 2009.

T. Zhang, R. Ramakrishnan, and M. Livny, BIRCH: An Efficient Data Clustering Method for Very Large Databases, SIG-MOD Rec, vol.25, pp.163-5808, 1996.

T. Zhu, Differentially Private Data Publishing and Analysis: A Survey, IEEE Transactions on Knowledge and Data Engineering, vol.29, pp.1619-1638, 2017.