S. Chabridon, R. Laborde, T. Desprats, A. Oglaza, P. Marie et al., A survey on addressing privacy together with quality of context for context management in the Internet of Things, annals of telecommunications - annales des t??l??communications, vol.4, issue.5, pp.47-62, 2014.
DOI : 10.1007/s12243-013-0387-2

URL : https://hal.archives-ouvertes.fr/hal-01285786

L. Cranor, M. Langheinrich, M. Marchiori, and J. Reagle, The platform for privacy preferences 1.0 (p3p1.0) specification. W3C recommendation, 2002.

P. Kelley, L. Cesca, J. Bresee, and L. Cranor, Standardizing privacy notices, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, 2009.
DOI : 10.1145/1753326.1753561

P. Inglesant, M. Sasse, D. Chadwick, and L. Shi, Expressions of expertness, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, 2008.
DOI : 10.1145/1408664.1408675

B. Stepien, S. Matwin, and A. Felty, Advantages of a non-technical XACML notation in role-based models, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.193-200, 2011.
DOI : 10.1109/PST.2011.5971983

R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

J. Byun, E. Bertino, and N. Li, Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.102-11010, 2005.
DOI : 10.1145/1063979.1063998

X. Jiang and J. Landay, Modeling privacy control in context-aware systems, IEEE Pervasive Computing, vol.1, issue.3, pp.59-63, 2002.
DOI : 10.1109/MPRV.2002.1037723

W. Wagealla, S. Terzis, and C. English, Trust-based model for privacy control in context aware systems, Second workshop on security in ubiquitous computing at the fifth annual conference on ubiquitous computing, 2003.

N. Ajam, N. Cuppens-boulahia, and F. Cuppens, Contextual privacy management in extended role based access control model (eds) Data privacy management and autonomous spontaneous security, Lecture notes in computer scienceSpringer, pp.121-135, 2010.

C. Graf and C. Hochleitner, Towards usable privacy enhancing technologies: lessons learned from the PrimeLife project, Accessed, vol.31, pp.149-416, 2011.

A. Oglaza, R. Laborde, and P. Zaraté, Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013.
DOI : 10.1109/TrustCom.2013.202

G. Gorry and M. Morton, A framework for management information systems, Sloan Manage RevMassachusetts Institute of Technology), vol.13, pp.21-36, 1971.

G. Adomavicius and A. Tuzhilin, Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.6, pp.734-749, 2005.
DOI : 10.1109/TKDE.2005.99

E. Ruiz, An algorithm for finding nearest neighbours in (approximately) constant average time, Pattern Recognition Letters, vol.4, issue.3, pp.145-157, 1986.
DOI : 10.1016/0167-8655(86)90013-9

A. Martin, P. Zaraté, and G. Camilleri, Gestion et évolution de profils multicritères de décideur par apprentissage pour l'aide à la décision, INFORSID: INFormatique des ORganisation et Systémes d'Information et de Décision, pp.223-238, 2012.

F. Mcsherry and I. Mironov, Differentially private recommender systems, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.627-636, 2009.
DOI : 10.1145/1557019.1557090

K. Shyong, D. Frankowski, and J. Riedl, you trust your recommendations? An exploration of security and privacy issues in recommender systemsed) Emerging trends in information and communication security, pp.14-29, 2006.

J. Calandrino, A. Kilzer, A. Narayanan, E. Felten, and V. Shmatikov, "You Might Also Like:" Privacy Risks of Collaborative Filtering, 2011 IEEE Symposium on Security and Privacy, pp.231-246, 2011.
DOI : 10.1109/SP.2011.40

H. Simon, Theories of bounded rationality, Decis Organiz, vol.1, pp.161-176, 1972.

V. Giard and R. B. , Méthodologie multicritère d'aide à la décision, 1985.

D. Bouyssou, D. Dubois, M. Pirlot, and H. Prade, Concepts et méthodes pour l'aide à la décision? analyse multicritère, Traité IC2, vol.3, 2006.

M. Grabisch and M. Roubens, Application of the choquet integral in multicriteria decision making, Fuzzy Measures Integrals, vol.40, pp.348-375, 2000.

M. Grabisch, I. Kojadinovic, S. Nantes, and P. Meyer, Using the kappalab r package for capacity identification in choquet integral based maut, Proceedings of the 11th international conference on information processing and management of uncertainty in knowledge-based systems, pp.1702-1709, 2006.

A. Oglaza, Système d'aide à la décision pour la protection des données de vie privée, Thèse de doctorat, 2014.