Amazon taxonomy http://serv ices.amazon.com/services/soa-approvalcategory .htm#openCategories, Adscape: Harvesting and Analyzing Online Display Ads. WWW '14: Proceedings of the 23nd international conference on World Wide Web ,
Black Box Testing: Techniques for Functional Testing of Software and Systems, IEEE Software, vol.13, issue.5, 1995. ,
DOI : 10.1109/MS.1996.536464
Public Key Encryption with Keyword Search, Proc. of the ACM European Conference on Computer Systems (EuroSys), pp.506-522, 2004. ,
DOI : 10.1007/978-3-540-24676-3_30
Betrayed by your ads! PETS, Proceedings of the 12th international conference on Privacy enhancing technologies, 2012. ,
TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting, 11th IEEE Symposium on Computers and Communications (ISCC'06), 2006. ,
DOI : 10.1109/ISCC.2006.158
Measuring and fingerprinting click-spam in ad networks, SIGCOMM '12: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies , architectures, and protocols for computer communication. ACM Request Permissions, 2012. ,
Algorithmic accountability reporting: On the investigation of black boxes. Tow Center for Digital Journalism, Columbia University, 2014. ,
Tor: The second-generation onion router, 2004. ,
TaintDroid, Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010. ,
DOI : 10.1145/2619091
RePriv: Re-imagining Content Personalization and In-browser Privacy, 2011 IEEE Symposium on Security and Privacy, pp.131-146, 2011. ,
DOI : 10.1109/SP.2011.37
Vanish: Increasing data privacy with self-destructing data, Proc. of USENIX Security, 2009. ,
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009. ,
DOI : 10.1145/1536414.1536440
Hails: Protecting data privacy in untrusted web applications. 10th Symposium on, 2012. ,
Adsense categories. https://support.googl e.com/adsense, 3016459. ,
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180418
Snapchat's expired snaps are not deleted, just hidden ? media network -partner zone infosecurity ? guardian professional. http://www.theguardian.com/media- network/partner-zone-infosecurity/snapcha t-photos-not-deleted-hidden ,
Challenges in measuring online advertising systems, Proceedings of the 10th annual conference on Internet measurement, IMC '10, 2010. ,
DOI : 10.1145/1879141.1879152
Measuring personalization of web search, Proceedings of the 22nd international conference on World Wide Web, WWW '13, 2013. ,
DOI : 10.1145/2488388.2488435
Twitter adoption and use in mass convergence and emergency events, International Journal of Emergency Management, vol.6, issue.3/4, 2009. ,
DOI : 10.1504/IJEM.2009.031564
Safegov.org -google admits data mining student emails in its free education apps. http://safego v.org/2014/1/31/google-admits-data-mining- student-emails-in-its-free-education-apps ,
Privacy Violations Using Microtargeted Ads: A Case Study, 2010 IEEE International Conference on Data Mining Workshops, 2010. ,
DOI : 10.1109/ICDMW.2010.137
Privacy Violations Using Microtargeted Ads: A Case Study, 2010 IEEE International Conference on Data Mining Workshops, pp.474-482, 2010. ,
DOI : 10.1109/ICDMW.2010.137
On the leakage of personally identifiable information via online social networks, Proceedings of the 2Nd ACM Workshop on Online Social Networks, WOSN '09, pp.7-12, 2009. ,
Who owns the future? p112-114, Who Owns the Future? Simon and Schuster, 2013. ,
AdReveal, Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, HotNets-XII, 2013. ,
DOI : 10.1145/2535771.2535783
Declaration of kyle c. wong in support of google inc.'s opposition to plaintiffs' motion for class certification ,
Detecting price and search discrimination on the internet, Proceedings of the 11th ACM Workshop on Hot Topics in Networks, HotNets-XI, pp.79-84 ,
DOI : 10.1145/2390231.2390245
Selling off Privacy at Auction, Proceedings 2014 Network and Distributed System Security Symposium, 2013. ,
DOI : 10.14722/ndss.2014.23270
URL : https://hal.archives-ouvertes.fr/hal-01087557
CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.85-100, 2011. ,
DOI : 10.1145/2043556.2043566
Sharemenot. https://sharemenot.cs.was hington ,
Detecting and defending against third-party tracking on the web, NSDI'12: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 2012. ,
Modeling the impact of lifestyle on health at scale, Proceedings of the sixth ACM international conference on Web search and data mining, WSDM '13, 2013. ,
DOI : 10.1145/2433396.2433476
Discrimination in online ad delivery, Communications of the ACM, vol.56, issue.5, 2013. ,
Adnostic: Privacy preserving targeted advertising, Proc. NDSS, 2010. ,
Automatic Crime Prediction Using Events Extracted from Twitter Posts, Social Computing, Behavioral -Cultural Modeling and Prediction, pp.231-238, 2012. ,
DOI : 10.1007/978-3-642-29047-3_28
Why Johnny can't encrypt: A usability evaluation of PGP 5.0, Proc. of USENIX Security, 1999. ,
Understanding what they do with what they know, Proceedings of the 2012 ACM workshop on Privacy in the electronic society, WPES '12 ,
DOI : 10.1145/2381966.2381969
Exposing Inconsistent Web Search Results with Bobble. Passive and Active Measurements Conference, 2014. ,
Privacy scope: A precise information flow tracking system for finding application leaks, 2009. ,
The official PGP user's guide, 1995. ,