The right to privacy, Harvard law review, pp.193-220, 1890. ,
Privacy in ubiquitous computing, 2012. ,
La vie privée sur internet expliquée par secret story, 2015. ,
A taxonomy of privacy, U. Pa. L. Rev, vol.154, p.477, 2005. ,
Technology and Industry Scoreboard, 2015. ,
, Joint International Conference on Group Decision and Negotiation. Kapuer: A decision Support System for protecting privacy, pp.100-107, 2014.
, Annals of Data Science, vol.1, issue.3-4, p.369, 2014.
, Availability, Reliability and Security (ARES) 2016 11th International Conference on. A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions, pp.1-9, 2016.
The next 700 access control models or a unifying meta-model?, Proceedings of the 14th ACM symposium on Access control models and technologies, pp.187-196, 2009. ,
The NIST model for role-based access control: towards a unified standard, ACM workshop on Role-based access control, pp.1-11, 2000. ,
, Computer Security Applications Conference, 2003. Proceedings. 19th Annual. Modelling context in the Or-BAC model, pp.416-425, 2003.
Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies, pp.102-110, 2005. ,
, ACM Trans-actions on Information and System Security. (TISSEC), vol.13, issue.3, p.24, 2010.
, Inf. Forensic. Secur. IEEE Trans, vol.7, issue.5, 1426.
Dependable and Secure Comput, IEEE Trans, vol.11, issue.3, p.211, 2014. ,
, Oasis Xacml Committee, extensible access control markup language (xacml) version 3, 2017.
Securedroid: An android security framework extension for context-aware policy enforcement, Privacy and Security in Mobile Systems (PRISMS), 2013. International Conference on, pp.1-8, 2013. ,
International Conference on. A non-technical XACML target editor for dynamic access control systems, Collaboration Technologies and Systems (CTS), pp.150-157, 2014. ,
Authorization policies: Using decision support system for context-aware protection of user's private data, Trust, Security and Privacy in Computing and Communications (TrustCom), pp.1639-1644, 2013. ,
Decision support systems: an organizational perspective, 1978. ,
Knowledge and data engineering, IEEE Transactions on, vol.17, issue.6, p.734, 2005. ,
, Social media retrieval. Privacy in recommender system, pp.263-281, 2013.
, Recommender systems handbook. Privacy aspects of recommender systems, pp.649-688, 2015.
, Integrated network management (IM), 2015. IFIP/IEEE International Symposium on. Dude, ask the expert!: Android resource access permission recommendation with recdroid, pp.296-304, 2015.
Multiple criteria decision making, vol.25, 1982. ,
, Consumer Communications & Networking Conference (CCNC), 2016 13th IEEE Annual. Difficulties to enforce your privacy preferences on Android? Kapuer will help you, pp.315-316, 2016.
Aide à la dècision multicritère et systèmes relationnels de prèfèrences, 1980. ,
Application of the Choquet integral in multicriteria decision making, Fuzzy Measures and Integrals-Theory and Applications, pp.348-374, 2000. ,
URL : https://hal.archives-ouvertes.fr/hal-01573484
, Proceedings of the 11th international conference on information processing and management of uncertainty in knowledge-based systems. Using the Kappalab R package for capacity identification in Choquet integral based MAUT, pp.1702-1709, 2006.
Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems, Georgia Institute of Technology, 2002. ,