Tech topic: What is a data warehouse, Prism Solutions, vol.1, 1995. ,
The Data Warehouse Lifecycle Toolkit, 2008. ,
A multi-view approach for embedded information system security, CRiSIS, IEEE, pp.65-72, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00531630
Self-protecting documents for cloud storage security, IEEE, pp.1231-1238, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00736133
Organization based access control, POLICY, pp.120-131, 2003. ,
URL : https://hal.archives-ouvertes.fr/hal-01483818
From contextual permission to dynamic pre-obligation: An integrated approach, pp.70-78, 2010. ,
Modeling contextual security policies, Int. J. Inf. Sec, vol.7, issue.4, pp.285-305, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-01207773
Modelling contexts in the or-bac model, pp.416-427, 2003. ,
Assuring data trustworthiness -concepts and research challenges, Secure Data Management, vol.6358, pp.1-12, 2010. ,
Improving the efficiency of collaborative work with trust management, Integrated Network Management, pp.1172-1179, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00609528
Trust mechanisms for efficiency improvement in collaborative working environments, MASCOTS, IEEE, pp.465-467, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00640712
Evaluating the trustworthiness of contributors in a collaborative environment, of Lecture Notes of the Institute for Computer Sciences, vol.10, pp.451-460, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-02162301
Information security risk management in a world of services, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01020244
Information security in business intelligence based on cloud: A survey of key issues and the premises of a proposal, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01082063
, Metadata: The ghosts haunting e-documents. In: FindLaw, 2008.
Cloud computing in higher education and research institutions and the USA PATRIOT Act, Social Science Research Network Working Paper Series, 2012. ,
USA PATRIOT Act and telecommunications: Privacy under attack, Rutgers Computer & Tech. LJ, vol.29, p.371, 2003. ,
, EU: Fighting cyber crime and protecting privacy in the cloud, 2012.
, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protecting Regulation), Comm. European Communities, 2012.
Towards the development of privacy-aware systems, Inf. Softw. Technol, vol.51, issue.2, pp.337-350, 2009. ,
A brief survey on anonymization techniques for privacy preserving publishing of social network data, SIGKDD Explor. Newsl, vol.10, issue.2, pp.12-22, 2008. ,