S. Abiteboul, B. André, and D. Kaplan, Managing your digital life, Communications of the ACM, vol.58, issue.5, pp.32-35, 2015.
DOI : 10.1145/2670528

URL : https://hal.archives-ouvertes.fr/hal-01068006

N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, I. S. Popa et al., Trusted cells: A sea change for personal data services, CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research Online Proceedings, 2013.

R. J. Bayardo and R. Agrawal, Data Privacy through Optimal k-Anonymization, 21st International Conference on Data Engineering (ICDE'05), pp.217-228, 2005.
DOI : 10.1109/ICDE.2005.42

C. Dwork, Differential Privacy, Proceeding of the 39th International Colloquium on Automata, Languages and Programming, pp.1-12, 2006.
DOI : 10.1007/11787006_1

E. Union, Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95, EC (General Data Protection Regulation). Official Journal of the European, vol.46, p.59, 2016.

. Hyperloglog, The analysis of a near-optimal cardinality estimation algorithm, Proceedings of the 2007 International conference on Analysis of Algorithms (AOFA'07)

T. Ge and S. Zdonik, Answering aggregation queries in a secure system model, Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB '07, pp.519-530, 2007.

V. S. Iyengar, Transforming data to satisfy privacy constraints, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, pp.279-288, 2002.
DOI : 10.1145/775047.775089

URL : http://www.cse.unsw.edu.au/~qzhang/papers/181.pdf

N. Li, T. Li, and S. Venkatasubramanian, Closeness: A new privacy measure for data publishing, IEEE Trans. Knowl. Data Eng, vol.22, issue.7, pp.943-956, 2010.

M. Lichman, UCI machine learning repository, 2013.

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, -diversity, Proceedings of the 22nd International Conference on Data Engineering, p.24, 2006.
DOI : 10.1145/1217299.1217302

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002.
DOI : 10.1109/RISP.1993.287632

Q. To, B. Nguyen, and P. Pucheral, SQL/AA, Proceedings of the VLDB Endowment, vol.7, issue.13, pp.1625-1628, 2014.
DOI : 10.14778/2733004.2733046

URL : https://hal.archives-ouvertes.fr/hal-01096642

Q. To, B. Nguyen, and P. Pucheral, Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture, ACM Transactions on Database Systems, vol.41, issue.3, pp.1-1643, 2016.
DOI : 10.1186/1687-1499-2011-12

URL : https://hal.archives-ouvertes.fr/hal-01296432

S. Trabelsi, G. Neven, D. Raggett, and C. Ardagna, Report on design and implementation, 2011.