X. An, D. Jutla, N. Cercone, C. Pluempitiwiriyawej, W. et al., Uncertain inference control in privacy protection, International Journal of Information Security, vol.8, issue.1, pp.6-423431, 2009.
DOI : 10.1007/s10207-009-0088-z

D. Anthony, T. Henderson, and D. Kotz, Privacy in Location-Aware Computing Environments, IEEE Pervasive Computing, vol.6, issue.4, p.64, 2007.
DOI : 10.1109/MPRV.2007.83

L. Barkhuus, The mismeasurement of privacy, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.367-376, 2012.
DOI : 10.1145/2207676.2207727

M. Benisch, P. G. Kelley, N. Sadeh, and L. Cranor, Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs, Personal and Ubiquitous Computing, vol.10, issue.6, pp.679-694, 2011.
DOI : 10.1007/s00779-010-0346-0

G. Bigwood, F. B. Abdesslem, H. , and T. , Predicting Location-Sharing Privacy Preferences in Social Network Applications, Proc. of AwareCast, 2012.

A. J. Brush, J. Krumm, and J. Scott, Exploring end user preferences for location obfuscation, location-based services, and the value of location, Proceedings of the 12th ACM international conference on Ubiquitous computing, Ubicomp '10, 2010.
DOI : 10.1145/1864349.1864381

S. Consolvo, I. Smith, T. Matthews, A. Lamarca, J. Tabert et al., Location disclosure to social relations, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '05, 2005.
DOI : 10.1145/1054972.1054985

G. Danezis, Inferring privacy policies for social networking services, Proceedings of the 2nd ACM workshop on Security and artificial intelligence, AISec '09, 2009.
DOI : 10.1145/1654988.1654991

L. Fang and K. Lefevre, Privacy wizards for social networking sites, Proceedings of the 19th international conference on World wide web, WWW '10, 2010.
DOI : 10.1145/1772690.1772727

G. Hsieh, K. P. Tang, W. Y. Low, H. , and J. , Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual IM, Proc. of ACM UbiComp, 2007.
DOI : 10.1007/978-3-540-74853-3_6

C. Mancini, K. Thomas, Y. Rogers, B. A. Price, L. Jedrzejczyk et al., From spaces to places, Proceedings of the 11th international conference on Ubiquitous computing, Ubicomp '09, 2009.
DOI : 10.1145/1620545.1620547

W. Mason and S. Suri, Conducting behavioral research on Amazon???s Mechanical Turk, Behavior Research Methods, vol.90, issue.3, pp.1-23, 2012.
DOI : 10.3758/s13428-011-0124-6

M. Miettinen and N. Asokan, Towards security policy decisions based on context profiling, Proceedings of the 3rd ACM workshop on Artificial intelligence and security, AISec '10, 2010.
DOI : 10.1145/1866423.1866428

E. Miluzzo, N. D. Lane, K. Fodor, R. Peterson, H. Lu et al., Sensing meets mobile social networks, Proceedings of the 6th ACM conference on Embedded network sensor systems, SenSys '08, 2008.
DOI : 10.1145/1460412.1460445

S. Patil, Y. Gall, A. Lee, and A. Kapadia, My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules, Proc. of USEC, 2012.
DOI : 10.1007/978-3-642-34638-5_8

B. Priyantha, D. Lymberopoulos, and J. Liu, Littlerock: Enabling Energy-Efficient Continuous Sensing on Mobile Phones. Pervasive Computing, IEEE, vol.10, issue.2, pp.12-15, 2011.
DOI : 10.1109/mprv.2011.28

O. Riva, C. Qin, K. Strauss, L. , and D. , Progressive Authentication: Deciding When to Authenticate on Mobile Phones, Proc. of USENIX Security, 2012.

N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley et al., Understanding and capturing people???s privacy policies in a mobile social networking application, Personal and Ubiquitous Computing, vol.10, issue.1, pp.401-412, 2009.
DOI : 10.1007/s00779-008-0214-3

I. Smith, S. Consolvo, A. Lamarca, J. Hightower, J. Scott et al., Social Disclosure of Place: From Location Technology to Communication Practices, pp.151-164, 2005.
DOI : 10.1007/11428572_9

J. C. Tang, N. Yankelovich, J. Begole, M. Van-kleek, F. Li et al., ConNexus to awarenex, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '01, 2001.
DOI : 10.1145/365024.365105

K. Tang, J. Hong, and D. Siewiorek, The implications of offering more disclosure choices for social location sharing, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, 2012.
DOI : 10.1145/2207676.2207730

K. P. Tang, P. Keyani, J. Fogarty, H. , and J. , Putting people in their place, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06, 2006.
DOI : 10.1145/1124772.1124788

E. Toch, J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley et al., Empirical models of privacy in location sharing, Proceedings of the 12th ACM international conference on Ubiquitous computing, Ubicomp '10, 2010.
DOI : 10.1145/1864349.1864364

E. Toch, J. Cranshaw, P. Hankes-drielsma, J. Springfield, P. G. Kelley et al., Locaccino, Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing, Ubicomp '10, 2010.
DOI : 10.1145/1864431.1864446

J. Wiese, P. Kelley, L. Cranor, L. Dabbish, J. Hong et al., Are you close with me? are you nearby?, Proceedings of the 13th international conference on Ubiquitous computing, UbiComp '11, 2011.
DOI : 10.1145/2030112.2030140