. Sd-warren and . Brandeis, The right to privacy, Harvard law review, pp.193-220, 1890.

M. Langheinrich, Privacy in ubiquitous computing, 2012.

E. Cauvin, La vie privée sur internet expliquée par secret story, 2015.

D. J. Solove, A taxonomy of privacy, U. Pa. L. Rev, vol.154, p.477, 2005.

O. and O. Science, Technology and Industry Scoreboard, 2015.

A. Oglaza, . Zaraté, and . Laborde, Joint International Conference on Group Decision and Negotiation. Kapuer: A decision Support System for protecting privacy, pp.100-107, 2014.

A. Oglaza, . Zarate, and . Laborde, Annals of Data Science, vol.1, issue.3-4, p.369, 2014.

A. Oglaza, . Laborde, . Benzekri, and . Barrère, Availability, Reliability and Security (ARES) 2016 11th International Conference on. A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions, pp.1-9, 2016.

S. Barker, The next 700 access control models or a unifying meta-model?, Proceedings of the 14th ACM symposium on Access control models and technologies, pp.187-196, 2009.

R. Sandhu, . Ferraiolo, and . Kuhn, The NIST model for role-based access control: towards a unified standard, ACM workshop on Role-based access control, pp.1-11, 2000.

F. Cuppens and . Miège, Computer Security Applications Conference, 2003. Proceedings. 19th Annual. Modelling context in the Or-BAC model, pp.416-425, 2003.

J. W. Byun, . Bertino, and . Li, Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies, pp.102-110, 2005.

Q. Ni, . Bertino, C. Lobo, . Brodie, . Karat et al., ACM Trans-actions on Information and System Security. (TISSEC), vol.13, issue.3, p.24, 2010.

M. Conti, . Crispo, Y. Fernandes, and . Zhauniarovich, Inf. Forensic. Secur. IEEE Trans, vol.7, issue.5, 1426.

Y. Zhauniarovich, . Russello, . Conti, . Crispo, and . Fernandes, Dependable and Secure Comput, IEEE Trans, vol.11, issue.3, p.211, 2014.

, Oasis Xacml Committee, extensible access control markup language (xacml) version 3, 2017.

V. Arena, L. Catania, . Torre, . Monteleone, and . Ricciato, Securedroid: An android security framework extension for context-aware policy enforcement, Privacy and Security in Mobile Systems (PRISMS), 2013. International Conference on, pp.1-8, 2013.

B. Stepien, . Felty, and . Matwin, International Conference on. A non-technical XACML target editor for dynamic access control systems, Collaboration Technologies and Systems (CTS), pp.150-157, 2014.

A. Oglaza, . Laborde, and . Zarate, Authorization policies: Using decision support system for context-aware protection of user's private data, Trust, Security and Privacy in Computing and Communications (TrustCom), pp.1639-1644, 2013.

. Pg-keen and . Morton, Decision support systems: an organizational perspective, 1978.

G. Adomavicius and . Tuzhilin, Knowledge and data engineering, IEEE Transactions on, vol.17, issue.6, p.734, 2005.

A. J. Jeckmans, . Beye, . Erkin, . Hartel, . Lagendijk et al., Social media retrieval. Privacy in recommender system, pp.263-281, 2013.

A. Friedman, . Knijnenburg, . Vanhecke, . Martens, and . Berkovsky, Recommender systems handbook. Privacy aspects of recommender systems, pp.649-688, 2015.

B. Rashidi, . Fung, and . Vu, Integrated network management (IM), 2015. IFIP/IEEE International Symposium on. Dude, ask the expert!: Android resource access permission recommendation with recdroid, pp.296-304, 2015.

M. Zeleny and . Cochrane, Multiple criteria decision making, vol.25, 1982.

A. Oglaza, . Laborde, and . Zaraté, Consumer Communications & Networking Conference (CCNC), 2016 13th IEEE Annual. Difficulties to enforce your privacy preferences on Android? Kapuer will help you, pp.315-316, 2016.

E. Jacquet-lagrèze and . Roy, Aide à la dècision multicritère et systèmes relationnels de prèfèrences, 1980.

M. Grabisch and . Roubens, Application of the Choquet integral in multicriteria decision making, Fuzzy Measures and Integrals-Theory and Applications, pp.348-374, 2000.
URL : https://hal.archives-ouvertes.fr/hal-01573484

M. Grabisch, . Kojadinovic, . Sp-nantes, and . Meyer, Proceedings of the 11th international conference on information processing and management of uncertainty in knowledge-based systems. Using the Kappalab R package for capacity identification in Choquet integral based MAUT, pp.1702-1709, 2006.

D. H. Nguyen and E. D. Mynatt, Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems, Georgia Institute of Technology, 2002.