Managing Your Digital Life, Commun. ACM, vol.58, pp.32-35, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01068006
Privacy and rationality in individual decision making, IEEE Security Privacy, vol.3, pp.26-33, 2005. ,
Towards a Safe Realization of Privacy-Preserving Data Publishing Mechanisms, 2011 IEEE 12th International Conference on Mobile Data Management, vol.2, pp.31-34, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00664280
Trusted Cells: A Sea Change for Personal Data Services, CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research, 2013. ,
Geo-indistinguishability: Differential Privacy for Location-based Systems, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. CCS '13, pp.901-914, 2013. ,
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality, IEEE Transactions on Knowledge and Data Engineering, vol.26, pp.1041-4347, 2014. ,
Supporting Anonymous Location Queries in Mobile Environments with Privacygrid, Proceedings of the 17th International Conference on World Wide Web. WWW '08, pp.237-246, 2008. ,
Data Privacy Through Optimal k-Anonymization, Proceedings of the 21st International Conference on Data Engineering. ICDE '05, pp.217-228, 2005. ,
Introducing global constraints in CHIP, In: Mathematical and Computer Modelling, vol.20, issue.94, pp.90127-90136, 1994. ,
URL : https://hal.archives-ouvertes.fr/hal-00442810
La gestion de la confidentialité pour les données individuelles, Institut national de la statistique et des études économiques (INSEE), 2016. ,
A French Anonymization Experiment with Health Data, PSD 2014 : Privacy in Statistical Databases. Eivissa, Spain, 2014. ,
The AllDifferent Constraint with Precedences". In: Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, pp.978-981, 2011. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00748652
Older and Wiser? Facebook Use, Privacy Concern, and Privacy Protection in the Life Stages of Emerging, Young, and Middle Adulthood, Social Media + Society, vol.1, p.2056305115616149, 2015. ,
Efficient k-Anonymization Using Clustering Techniques, Advances in Databases: Concepts, Systems and Applications, pp.188-200, 2007. ,
Age Differences in Online Social Networking: Extending Socioemotional Selectivity Theory to Social Network Sites, Journal of Broadcasting & Electronic Media, vol.59, pp.221-239, 2015. ,
Private databases on the cloud: Models, issues and research perspectives, 2016 IEEE International Conference on Big Data (Big Data, pp.3656-3661, 2016. ,
Combining Constraint Solving with Mining and Learning, Artificial Intelligence, pp.4-3702, 2017. ,
Comparing SDC Methods for Microdata on the Basis of Information Loss and Disclosure, Proceedings of ETK-NTTS, pp.807-826, 2001. ,
From t-closeness to differential privacy and vice versa in data anonymization, Knowledge-Based Systems, vol.74, pp.151-158, 2015. ,
A quantitative comparison of disclosure control methods for microdata, Confidentiality, disclosure, and data access : Theory and practical applications for statistical agencies, pp.111-133, 2001. ,
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation, Data ng and Knowledge Discovery, vol.11, pp.1573-756, 2005. ,
Differential Privacy, Proceeding of the 39th International Colloquium on Automata, Languages and Programming, vol.4052, pp.1-12, 2006. ,
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS '14, pp.1054-1067, 2014. ,
A Density-based Algorithm for Discovering Clusters a Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise, Proceedings of the Second International Conference on Knowledge Discovery and Data Mining. KDD'96, pp.226-231, 1996. ,
, European Union. ARTICLE 29 DATA PROTECTION WORKING PARTY: Opinion 05/2014 on Anonymisation Techniques, 2014.
Hyperloglog: The analysis of a near-optimal cardinality estimation algorithm, Proceedings of the 2007 International conference on Analysis of Algorithms (AOFA'07), 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00406166
Diffix: High-Utility Database Anonymization, Privacy Technologies and Policy, pp.978-981, 2017. ,
Top-down specialization for information and privacy preservation, 21st International Conference on Data Engineering (ICDE'05, pp.205-216, 2005. ,
Privacy-preserving Data Publishing: A Survey of Recent Developments, In: ACM Comput. Surv, vol.42, issue.4, 2010. ,
A Secure Database System using Homomorphic Encryption Schemes, 2015. ,
De-anonymization Attack on Geolocated Data, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.789-797, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01242268
Show Me How You Move and I Will Tell You Who You Are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. SPRINGL '10, pp.34-41, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00556833
Answering Aggregation Queries in a Secure System Model, Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB '07, pp.519-530, 2007. ,
Gecode: Generic Constraint Development Environment, 2006. ,
Location Privacy in Mobile Systems: A Personalized Anonymization Model, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05, pp.620-629, 2005. ,
Fully Homomorphic Encryption Using Ideal Lattices, Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing. STOC '09, pp.169-178, 2009. ,
Incorporating SAT Solvers into Hierarchical Clustering Algorithms: An Efficient and Flexible Approach, Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD '11, pp.1136-1144, 2011. ,
k-Anonymization Revisited, 2008 IEEE 24th International Conference on Data Engineering, pp.744-753, 2008. ,
Clustering to minimize the maximum intercluster distance, Theoretical Computer Science, vol.38, pp.90224-90229, 1985. ,
Clustering to minimize the maximum intercluster distance, Theoretical Computer Science, vol.38, pp.90224-90229, 1985. ,
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp.61-70, 2010. ,
, The ARGUS Software in the CASC-Project". In: Privacy in Statistical Databases. Ed. by Josep Domingo-Ferrer and Vicenç Torra, pp.323-335, 2004.
Transforming Data to Satisfy Privacy Constraints, Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD '02, pp.279-288, 2002. ,
Post Randomisation for Statistical Disclosure Control: Theory and Implementation, Journal of Official Statistics, vol.14, pp.282-423, 1998. ,
Conservative or liberal? Personalized differential privacy, 2015 IEEE 31st International Conference on Data Engineering, pp.1023-1034, 2015. ,
Sex, age, cardiovascular risk factors, and coronary heart disease: a prospective follow-up study of 14 786 middleaged men and women in Finland, Circulation 99, vol.9, pp.1165-1172, 1999. ,
Sharing and Usage Control of Personal Information. (Partage et Contrôle d'Usage de Données Personnelles, 2016. ,
URL : https://hal.archives-ouvertes.fr/tel-01425638
Age differences in privacy attitudes, literacy and privacy management on Facebook, vol.10, 2016. ,
The effects of class size on student grades at a public university, Economics of Education Review, vol.27, pp.272-7757, 2008. ,
Advisors for Incremental Propagation". In: Principles and Practice of Constraint Programming -CP, pp.409-422, 2007. ,
A Secure Search Engine for the Personal Cloud, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. SIGMOD '15, pp.978-979, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01176473
A Global Constraint for Closed Frequent Pattern Mining, Principles and Practice of Constraint Programming, pp.978-981, 2016. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01374719
Incognito: Efficient Full-domain K-anonymity, Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data ,
, SIGMOD '05, pp.49-60, 2005.
Mondrian Multidimensional K-Anonymity, Proceedings of the 22Nd International Conference on Data Engineering. ICDE '06. Washington, 2006. ,
Workloadaware Anonymization, Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD '06, pp.277-286, 2006. ,
Partitioning-Based Mechanisms Under Personalized Differential Privacy, Advances in Knowledge Discovery and Data Mining, pp.978-981, 2017. ,
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures, Data Warehousing and Knowledge Discovery, pp.405-416, 2006. ,
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
UCI Machine Learning Repository, 2013. ,
A Personalized Extended (a, k)-Anonymity Model, 2015 Third International Conference on Advanced Cloud and Big Data, pp.234-240, 2015. ,
l-Diversity: Privacy Beyond k-Anonymity, Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, p.24, 2006. ,
Some methods for classification and analysis of multivariate observations, Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, vol.1, pp.281-297, 1967. ,
Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07, pp.94-103, 2007. ,
Privacy Integrated Queries: An Extensible Platform for Privacy-preserving Data Analysis, Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. SIGMOD '09, pp.19-30, 2009. ,
Exécution de requêtes distribuées sous contraintes d'anonymat. Sur l'architecture des Trusted Cells, Gestion des risques naturels, technologiques et sanitaires. Envirorisk, 2016. ,
Managing Distributed Queries under Personalized Anonymity Constraints, Proceedings of the 6th International Conference on Data Science, vol.1, pp.107-117, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01682316
The Case for Personalized Anonymization of Database Query Results, Data Management Technologies and Applications. Ed. by Joaquim Filipe, Jorge Bernardino, and Christoph Quix, pp.978-981, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01945674
Differentially Private Data Release for Data Mining, Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD '11, pp.493-501, 2011. ,
The New Casper: Query Processing for Location Services Without Compromising Privacy, Proceedings of the 32Nd International Conference on Very Large Data Bases. VLDB '06. Seoul, Korea: VLDB Endowment, pp.763-774, 2006. ,
Understanding the relevance of sample size calculation, Indian J Ophthalmol, vol.58, pp.469-470, 2010. ,
Clustering Based K-anonymity Algorithm for Privacy Preservation, International Journal of Network Security, vol.19, issue.6, p.23, 2017. ,
On the Complexity of Optimal Microaggregation for Statistical Disclosure Control, Statistical Journal of the United Nations Economic Comission for Europe, vol.18, pp.345-354, 2001. ,
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -EUROCRYPT '99, pp.223-238, 1999. ,
CryptDB: Protecting Confidentiality with Encrypted Query Processing, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. SOSP '11, pp.85-100, 2011. ,
, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance, vol.27, 2016.
Interactive Privacy via the Median Mechanism, Proceedings of the Forty-second ACM Symposium on Theory of Computing. STOC '10, pp.765-774, 2010. ,
, Generalizing Data to Provide Anonymity when Disclosing Information (Abstract)". In: Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. PODS '98, 1998.
Personalized-Granular k-Anonymity, pp.1-4, 2009. ,
Information Privacy: Measuring Individuals' Concerns about Organizational Practices, MIS Quarterly, vol.20, p.2767783, 1996. ,
Discrimination rate: an attribute-centric metric to measure privacy, Annals of Telecommunications, vol.72, pp.1958-9395, 2017. ,
The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, vol.6, pp.285-294, 2017. ,
Achieving K-anonymity Privacy Protection Using Generalization and Suppression, Int. J. Uncertain. Fuzziness Knowl.-Based Syst, vol.10, pp.571-588, 2002. ,
k-Anonymity: A Model for Protecting Privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, pp.557-570, 2002. ,
Statistical Disclosure Control for Micro-Data Using the R Package sdcMicro, Journal of Statistical Software, vol.67, pp.1-36, 2015. ,
Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture, ACM Trans. Database Syst, vol.41, issue.3, pp.1-16, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01296432
SQL/AA: Executing SQL on an Asymmetric Architecture, pp.1625-1628, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01096642
From Privacy Concern to Uses of Social Network Sites: A Cultural Comparison via User Survey, 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, pp.457-464, 2011. ,
Spatial clustering in the presence of obstacles, Proceedings 17th International Conference on Data Engineering, pp.359-367, 2001. ,
Student Evaluation of College Teaching Effectiveness: a brief review, Assessment & Evaluation in Higher Education, vol.23, pp.191-212, 1998. ,
Bottom-up generalization: a data mining solution to privacy protection, Fourth IEEE International Conference on Data Mining (ICDM'04, pp.249-256, 2004. ,
A Framework for Feature Selection in Clustering, Journal of the American Statistical Association, vol.105, pp.713-726, 2010. ,
An Enhanced K-anonymity Model for Privacy Preserving Data Publishing, Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD '06, pp.754-759, 2006. ,
Minimality Attack in Privacy Preserving Data Publishing, Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB '07, pp.543-554, 2007. ,
Verbs Semantics and Lexical Selection, Proceedings of the 32Nd Annual Meeting on Association for Computational Linguistics. ACL '94, pp.133-138, 1994. ,
Personalized Privacy Preservation, Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data. SIGMOD '06, pp.229-240, 2006. ,
iReduct: Differential Privacy with Reduced Relative Errors, Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data. SIGMOD '11, pp.229-240, 2011. ,
Differentially Private Histogram Publication, 2012 IEEE 28th International Conference on Data Engineering, pp.32-43, 2012. ,
TopDown-KACA: An efficient local-recoding algorithm for k-anonymity, 2009 IEEE International Conference on Granular Computing, pp.727-732, 2009. ,
BIRCH: An Efficient Data Clustering Method for Very Large Databases, SIG-MOD Rec, vol.25, pp.163-5808, 1996. ,
Differentially Private Data Publishing and Analysis: A Survey, IEEE Transactions on Knowledge and Data Engineering, vol.29, pp.1619-1638, 2017. ,