,
Big Data" for Data Protection,» chez Articles by Maurer Faculty, 2012. ,
«Under a Watchful Eye: Incursions on Personal Privacy,» chez The War on Our Freedoms: Civil Liberties in an Age of Terrorism, 2003. ,
Big Data Usage, pp.143-165, 2016. ,
, «Big Data for All: Privacy and User Control in the Age of Analytics, vol.11, p.15, 2013.
, , pp.317-339, 2016.
, «Ad-Hoc Business Process Management in Enterprises as Expert Communities,» chez International Conference on Web-Based Learning
«Role-Based Access Control Models, IEEE Computer, vol.29, pp.38-47, 1996. ,
American National Standard for Information Technology-Role Based Access Control, ANSI INCITS, pp.359-2004, 2004. ,
«Adding Attributes to Role-Based Access Control, IEEE Computer, vol.43, pp.79-81, 2010. ,
Ibrahim Abaker Targio Hashem, «The rise of "big data" on cloud computing: Review and open research issues, Information Systems, vol.47, pp.98-115, 2015. ,
«Enforcing Role-Based Access Control for Secure Data Storage in the Cloud, » The Computer Journal, vol.54, pp.1675-1687, 2011. ,
Applying Digital Rights Management to Corporate Information Systems, 2012. ,
URL : https://hal.archives-ouvertes.fr/tel-00737777
«An Access Control Scheme for Big Data Processing, » chez International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2014. ,
«Pseudonymization and impacts of Big (personal/anonymous) Data processing in the transition from the Directive 95/46/EC to the new EU General Data Protection Regulation, Computer Law & Security Review, vol.33, pp.171-181, 2017. ,
«A Framework for Composition and Enforcement of Privacy-Aware and Context-Driven Authorization Mechanism for Multimedia Big Data, IEEE TRANSACTIONS ON MULTIMEDIA, vol.17, pp.1484-1494, 2015. ,
«Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system, Information Sciences, vol.21, pp.1-26, 2018. ,