F. Baader, D. Borchmann, and A. Nuradiansyah, Preliminary results on the identity problem in description logic ontologies, Description Logics. CEUR Workshop Proceedings, vol.1879, 2017.

G. Bagan, A. Bonifati, R. Ciucanu, G. H. Fletcher, A. Lemay et al., gMark: Schema-driven generation of graphs and queries, IEEE Transactions on Knowledge and Data Engineering, vol.29, issue.4, pp.856-869, 2017.
DOI : 10.1109/icde.2017.38

URL : https://hal.archives-ouvertes.fr/hal-01591706

A. Bonifati, W. Martens, and T. Timm, An analytical study of large SPARQL query logs, PVLDB, vol.11, issue.2, pp.149-161, 2017.
DOI : 10.14778/3149193.3149196

URL : https://hal.archives-ouvertes.fr/hal-01979692

D. Bursztyn, F. Goadoué, and I. Manolescu, Reformulation-based query answering in rdf: alternatives and performance, PVLDB, vol.8, 2015.
DOI : 10.14778/2824032.2824093

URL : https://hal.archives-ouvertes.fr/hal-01174298

D. Calvanese, G. D. Giacomo, D. Lembo, M. Lenzerini, and R. Rosati, Tractable reasoning and efficient query answering in description logics: The dl-lite family, Journal of Automated Reasoning, vol.39, issue.3, pp.385-429, 2007.
DOI : 10.1007/s10817-007-9078-x

URL : http://www.dis.uniroma1.it/~degiacom/papers/2007/calv-etal-JAR-2007.pdf

C. Dwork, Differential privacy. In: ICALP (2), vol.4052, pp.1-12, 2006.

B. C. Fung, K. Wang, R. Chen, and P. S. Yu, Privacy-preserving data publishing: A survey of recent developments, ACM Comput. Surv, vol.42, issue.4, pp.1-14, 2010.
DOI : 10.1145/1749603.1749605

URL : http://summit.sfu.ca/system/files/iritems1/8060/etd2942.pdf

B. C. Grau and E. V. Kostylev, Logical foundations of privacy-preserving publishing of linked data, pp.943-949, 2016.

P. Hansen, C. Lutz, I. Seylan, and F. Wolter, Efficient query rewriting in the description logic el and beyond, p.IJCAI, 2015.

B. Heitmann, F. Hermsen, and S. Decker, k-rdf-neighbourhood anonymity: Combining structural and attribute-based anonymisation for linked data, PrivOn@ISWC. CEUR Workshop Proceedings, vol.1951, 2017.

S. Kirrane, A. Mileo, and S. Decker, Access control and the resource description framework: A survey, Semantic Web, vol.8, issue.2, pp.311-352, 2017.

S. Kirrane, S. Villata, and M. Aquin, Privacy, security and policies: A review of problems and solutions with semantic web technologies, Semantic Web Journal, vol.9, issue.2, pp.153-161, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01876423

N. Li, T. Li, and S. Venkatasubramanian, t-closeness: Privacy beyond k-anonymity and l-diversity, pp.106-115, 2007.

A. Machanavajjhala, X. He, and M. Hay, Differential privacy in the wild: A tutorial on current practices & open challenges, PVLDB, vol.9, issue.13, pp.1611-1614, 2016.

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, L-diversity: Privacy beyond k-anonymity, TKDD, vol.1, issue.1, p.3, 2007.

S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens, and S. Morucci, Privacy policy preferences enforced by SPARQL query rewriting, pp.335-342, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00948460

F. Radulovic, R. García-castro, and A. Gómez-pérez, Towards the anonymisation of RDF data, SEKE. pp, pp.646-651, 2015.

L. Sweeney, k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.5, pp.557-570, 2002.

S. Villata, N. Delaforge, F. Gandon, and A. Gyrard, An access control model for linked data, OTM Workshops, vol.7046, pp.454-463, 2004.
URL : https://hal.archives-ouvertes.fr/hal-00695229