W. H. Inmon, Tech topic: What is a data warehouse, Prism Solutions, vol.1, 1995.

R. Kimball, M. Ross, W. Thornthwaite, J. Mundy, and B. Becker, The Data Warehouse Lifecycle Toolkit, 2008.

M. Munier, A multi-view approach for embedded information system security, CRiSIS, IEEE, pp.65-72, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00531630

M. Munier, V. Lalanne, and M. Ricarde, Self-protecting documents for cloud storage security, IEEE, pp.1231-1238, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00736133

A. A. Kalam, S. Benferhat, A. Miège, R. E. Baida, F. Cuppens et al., Organization based access control, POLICY, pp.120-131, 2003.
URL : https://hal.archives-ouvertes.fr/hal-01483818

Y. Elrakaiby, F. Cuppens, and N. Cuppens-boulahia, From contextual permission to dynamic pre-obligation: An integrated approach, pp.70-78, 2010.

F. Cuppens and N. Cuppens-boulahia, Modeling contextual security policies, Int. J. Inf. Sec, vol.7, issue.4, pp.285-305, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01207773

F. Cuppens and A. Miège, Modelling contexts in the or-bac model, pp.416-427, 2003.

E. Bertino and H. S. Lim, Assuring data trustworthiness -concepts and research challenges, Secure Data Management, vol.6358, pp.1-12, 2010.

X. Zheng, P. Maillé, C. T. Le, and S. Morucci, Improving the efficiency of collaborative work with trust management, Integrated Network Management, pp.1172-1179, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00609528

X. Zheng, P. Maillé, C. Tu-phan-le, and S. Morucci, Trust mechanisms for efficiency improvement in collaborative working environments, MASCOTS, IEEE, pp.465-467, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00640712

C. T. Le, F. Cuppens, N. Cuppens-boulahia, and P. Maillé, Evaluating the trustworthiness of contributors in a collaborative environment, of Lecture Notes of the Institute for Computer Sciences, vol.10, pp.451-460, 2008.
URL : https://hal.archives-ouvertes.fr/hal-02162301

V. Lalanne, M. Munier, and A. Gabillon, Information security risk management in a world of services, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01020244

E. Jaramillo, M. Munier, and P. Aniorté, Information security in business intelligence based on cloud: A survey of key issues and the premises of a proposal, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01082063

D. Hricik and C. E. Scott, Metadata: The ghosts haunting e-documents. In: FindLaw, 2008.

J. Van-hoboken, A. Arnbak, and N. Van-eijk, Cloud computing in higher education and research institutions and the USA PATRIOT Act, Social Science Research Network Working Paper Series, 2012.

L. T. Lee, USA PATRIOT Act and telecommunications: Privacy under attack, Rutgers Computer & Tech. LJ, vol.29, p.371, 2003.

, EU: Fighting cyber crime and protecting privacy in the cloud, 2012.

, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protecting Regulation), Comm. European Communities, 2012.

P. Guarda and N. Zannone, Towards the development of privacy-aware systems, Inf. Softw. Technol, vol.51, issue.2, pp.337-350, 2009.

B. Zhou, J. Pei, and W. Luk, A brief survey on anonymization techniques for privacy preserving publishing of social network data, SIGKDD Explor. Newsl, vol.10, issue.2, pp.12-22, 2008.