H. Almuhimedi, F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti et al., Your Location has been Shared 5,398 Times!, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pp.787-796, 2015.
DOI : 10.1145/2556288.2557413

J. Krumm, Inference Attacks on Location Tracks, " in PERVASIVE, pp.127-143, 2007.
DOI : 10.1007/978-3-540-72037-9_8

URL : http://research.microsoft.com/en-us/um/people/jckrumm/publications 2007/inference attack refined distribute.pdf

S. Gambs, M. Killijian, M. N. Del-prado, and C. , Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011.
DOI : 10.1145/1868470.1868479

URL : https://hal.archives-ouvertes.fr/hal-00660055

L. Franceschi-bicchierai, Redditor cracks anonymous data trove to pinpoint muslim cab drivers Available online at http://mashable, 2015.

M. Gramaglia and M. Fiore, Hiding mobile traffic fingerprints with GLOVE, Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT '15, 2015.
DOI : 10.1016/j.ins.2012.04.015

URL : https://hal.archives-ouvertes.fr/hal-01237032

M. E. Andrès, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geo-indistinguishability, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.901-914, 2013.
DOI : 10.1145/2508859.2516735

W. Qardaji, W. Yang, and N. Li, Differentially private grids for geospatial data, 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp.757-768, 2013.
DOI : 10.1109/ICDE.2013.6544872

URL : http://arxiv.org/pdf/1209.1322

Y. Xiao, L. Xiong, S. Zhang, and Y. Cao, LocLok, Proc. VLDB Endow, pp.1901-1904, 2017.
DOI : 10.14778/3137765.3137804

B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, Achieving k-anonymity in privacy-aware location-based services, IEEE INFOCOM 2014, IEEE Conference on Computer Communications, pp.754-762, 2014.
DOI : 10.1109/INFOCOM.2014.6848002

URL : http://mcn.cse.psu.edu/paper/other/infocom-ben-niu14.pdf

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002.
DOI : 10.1109/RISP.1993.287632

C. and D. Automata, Differential Privacy Languages and Programming , ser. Lecture Notes in Computer Science, pp.1-12, 2006.

M. Piorkowski, N. Sarafijanovic-djukic, and M. Grossglauser, CRAW- DAD data set epfl/mobility (v. 2009-02-24), 2009.

N. Kiukkonen, B. J. , O. Dousse, D. Gatica-perez, and L. J. , Towards rich mobile phone datasets: Lausanne data collection campaign, ICPS, 2010.

Y. Zheng, L. Zhang, X. Xie, and W. Ma, Mining interesting locations and travel sequences from GPS trajectories, Proceedings of the 18th international conference on World wide web, WWW '09, pp.791-800, 2009.
DOI : 10.1145/1526709.1526816

URL : http://www2009.eprints.org/80/1/p791.pdf

Y. De-montjoye, Z. Smoreda, R. Trinquart, C. Ziemlicki, and V. D. Blondel, D4D-Senegal: The Second Mobile Phone Data for Development Challenge, p.4885, 1407.

J. Leskovec and A. Krevl, SNAP Datasets: Stanford large network dataset collection, 2014.

O. Abul, F. Bonchi, and M. Nanni, Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, 2008 IEEE 24th International Conference on Data Engineering, pp.376-385, 2008.
DOI : 10.1109/ICDE.2008.4497446

URL : http://www-kdd.isti.cnr.it/NWA/NWA_ICDE08.pdf

K. Jiang, D. Shao, S. Bressan, T. Kister, and K. Tan, Publishing trajectories with differential privacy guarantees, Proceedings of the 25th International Conference on Scientific and Statistical Database Management, SSDBM, pp.1-1212, 2013.
DOI : 10.1145/2484838.2484846

B. Hoh and M. Gruteser, Protecting location privacy through path confusion, SECURECOMM, pp.194-205, 2005.

V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, Time Distortion Anonymization for the Publication of Mobility Data with High Utility, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.539-546, 2015.
DOI : 10.1109/Trustcom.2015.417

URL : https://hal.archives-ouvertes.fr/hal-01170060

V. Bindschaedler and R. Shokri, Synthesizing Plausible Privacy-Preserving Location Traces, 2016 IEEE Symposium on Security and Privacy (SP), 2016.
DOI : 10.1109/SP.2016.39

R. Shokri, G. Theodorakopoulos, J. Boudec, and J. Hubaux, Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011.
DOI : 10.1109/SP.2011.18

URL : https://hal.archives-ouvertes.fr/hal-01266229

S. Gambs, M. Killijian, M. N. Del-prado, and C. , GEPETO: A GEoPrivacy-Enhancing TOolkit, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp.1071-1076, 2010.
DOI : 10.1109/WAINA.2010.170

URL : https://hal.archives-ouvertes.fr/inria-00556835

M. Wernke, P. Skvortsov, F. Dürr, and K. , A classification of location privacy attacks and approaches, Personal and Ubiquitous Computing, vol.13, issue.2, pp.163-175, 2014.
DOI : 10.1007/s10707-008-0047-2

V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, Differentially Private Location Privacy in Practice, MOST, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01148230

R. Shokri, Location-privacy meter tool

S. Gambs, M. O. Killijian, I. Moise, M. N. Del-prado, and C. , MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces, 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, pp.1937-1946, 2013.
DOI : 10.1109/IPDPSW.2013.180

URL : https://hal.archives-ouvertes.fr/hal-00911238

E. Deelman, K. Vahi, G. Juve, M. Rynge, S. Callaghan et al., Pegasus, a workflow management system for science automation, Future Generation Computer Systems, vol.46, issue.C, pp.17-35, 2015.
DOI : 10.1016/j.future.2014.10.008

M. Wilde, M. Hategan, J. M. Wozniak, B. Clifford, D. S. Katz et al., Swift: A language for distributed parallel scripting, Parallel Computing, vol.37, issue.9, pp.633-652, 2011.
DOI : 10.1016/j.parco.2011.05.005

URL : http://www.mcs.anl.gov/uploads/cels/papers/P1818.pdf

I. Altintas, C. Berkley, E. Jaeger, M. Jones, B. Ludascher et al., Kepler: an extensible system for design and execution of scientific workflows, Proceedings. 16th International Conference on Scientific and Statistical Database Management, 2004., p.423, 2004.
DOI : 10.1109/SSDM.2004.1311241

J. Liu, E. Pacitti, P. Valduriez, and M. Mattoso, A Survey of Data- Intensive Scientific Workflow Management Accio documentation Available online at https, Journal of Grid Computing, vol.1335, issue.4, pp.457-493, 2015.

M. Slee, A. Agarwal, and M. Kwiatkowski, Thrift: Scalable Cross- Language Services Implementation Available online at https, 2007.

B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. D. Joseph et al., Mesos: A platform for fine-grained resource sharing in the data center, NSDI, pp.295-308, 2011.

D. Thain, T. Tannenbaum, and M. Livny, Distributed computing in practice: the Condor experience, Concurrency -Practice and Experience, pp.323-356, 2005.
DOI : 10.1002/cpe.938

O. Abul, F. Bonchi, and M. Nanni, Wait 4 Me: Time-tolerant Anonymization of Moving Objects Databases ? Executable