Big data and targeted advertising, 2012. ,
User profiling fears real but paranoia unnecessary http://www.zdnet.com/user-profiling-fears-real-but-paranoia- unnecessary-2062302030, 2011. ,
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008. ,
DOI : 10.1109/SP.2008.33
Big data: The next frontier for innovation, competition, and productivity The McKinsey Global Institute, 2011. ,
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.10-1109, 2013. ,
DOI : 10.1109/TIFS.2013.2258914
URL : https://hal.archives-ouvertes.fr/hal-01339185
On the limitations of query obfuscation techniques for location privacy, Proceedings of the 13th international conference on Ubiquitous computing, UbiComp '11, p.187, 2011. ,
DOI : 10.1145/2030112.2030139
The anatomy of a large-scale hypertextual Web search engine, Computer Networks and ISDN Systems, pp.107-117, 1998. ,
DOI : 10.1016/S0169-7552(98)00110-X
Differential Privacy, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008. ,
DOI : 10.1109/SP.2008.33
Collaborative filtering with privacy, Proceedings 2002 IEEE Symposium on Security and Privacy, p.45, 2002. ,
DOI : 10.1109/SECPRI.2002.1004361
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.3270
Pistis: A Privacy-Preserving Content Recommender System for Online Social Communities, 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, pp.79-86, 2011. ,
DOI : 10.1109/WI-IAT.2011.136
Privacy-Preserving Distributed Collaborative Filtering, INRIA, 2013. ,
DOI : 10.1007/978-3-319-09581-3_12
URL : https://hal.archives-ouvertes.fr/hal-01251314
LNCS 4321 -Privacy-Enhanced Web Personalization, pp.628-670, 2007. ,
DOI : 10.1007/978-3-540-72079-9_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.1633
Tor: the secondgeneration onion router, 2004. ,
A verifiable, centralized, coercion-free reputation system, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.61-70, 2009. ,
DOI : 10.1145/1655188.1655197
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.612.327
Signatures of Reputation, Proc. of the Intl. Conf. on Financial Cryptography (FC '10), pp.400-407, 2010. ,
DOI : 10.1007/978-3-642-14577-3_35
Preserving privacy of feedback providers in decentralized reputation systems, Computers & Security, vol.31, issue.7, pp.816-826, 2012. ,
DOI : 10.1016/j.cose.2011.12.003
URL : https://hal.archives-ouvertes.fr/hal-01352961
Differential Privacy: A Survey of Results, pp.1-19, 2008. ,
DOI : 10.1007/978-3-540-79228-4_1
Private Data Analysis via Output Perturbation, Privacy- Preserving Data Mining: Models and Algorithms, pp.383-405, 2008. ,
DOI : 10.1007/978-0-387-70992-5_16
Impossibility of Differentially Private Universally Optimal Mechanisms, 51th Annual IEEE Symposium on Foundations of Computer Science, pp.71-800256, 1008. ,
DOI : 10.1137/110846671
URL : http://arxiv.org/abs/1008.0256
Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data, Transactions on Data Privacy, vol.4, issue.1, pp.1-17, 2011. ,
DOI : 10.1007/978-3-642-15838-4_19
Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.838-852, 2013. ,
DOI : 10.1109/TIFS.2013.2253320
Towards publishing recommendation data with predictive anonymization, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, p.24, 2010. ,
DOI : 10.1145/1755688.1755693
Protecting Privacy of User Information in Continuous Location-Based Services, 2012 IEEE 15th International Conference on Computational Science and Engineering, pp.162-169, 2012. ,
DOI : 10.1109/ICCSE.2012.31
A distributed anonymization scheme for privacy-preserving recommendation systems, 2013 IEEE 4th International Conference on Software Engineering and Service Science. IEEE, pp.491-494, 2013. ,
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001. ,
DOI : 10.1109/69.971193
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.7472
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, Proceedings of the 7th ACM Symposium on . . . , 2012. [Online]. Available, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981. ,
DOI : 10.1145/358549.358563
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210
Privacy through deniable search, 2010. ,
DOI : 10.1137/1.9781611972795.66
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.217.4901
Embellishing text search queries to protect user privacy, Proceedings of the VLDB Endowment, pp.598-607, 2010. ,
DOI : 10.14778/1920841.1920918
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.174.5524
P3: A privacy preserving personalization middleware for recommendation-based services Hot Topics in Privacy Available: http://petsymposium.org Privacy Preserving Recommendation System Based on Groups, pp.1-12, 2011. ,