General Data Protection Regulation. Law, 2016. ,
Chiaroscuro: Transparency and privacy for massive personal time-series clustering, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01136686
,
Personal data management systems: The security and functionality standpoint, Information Systems, vol.80, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01898705
Oblivious query processing, ICDT, 2014. ,
Foundations of hardware based attested computation and application to SGX, EuroS&P, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01417137
SMCQL: secure query processing for private data networks, vol.10, 2017. ,
The tao of inference in privacy-protected databases, PVLDB, vol.11, issue.11, 2018. ,
Private database queries using somewhat homomorphic encryption, 2013. ,
Secure Failure Detection and Consensus in TrustedPals, IEEE Trans. Dependable Sec. Comput, vol.9, issue.4, 2012. ,
Practical covertly secure MPC for dishonest majority -or: Breaking the SPDZ limits, 2013. ,
M2R: enabling strong-er privacy in mapreduce computation, USENIX Security Symposium, 2015. ,
, Secure Multiparty Computation Implemented with Smart Cards. ESORICS, 2006.
Answering aggregation queries in a secure system model, 2007. ,
Ryoan: A distributed sandbox for untrusted computation on secret data, 2016. ,
Trusted execution environment: What it is, and what it is not, TrustCom/BigDataSE/ISPA, issue.1, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01246364
VC3: trustworthy data analytics in the cloud using SGX, S&P, 2015. ,
Private and scalable execution of SQL aggregates on a secure decentralized architecture, TODS, vol.41, issue.3, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01296432
Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge, EuroS&P, 2017. ,
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX, 2017. ,
Innovative technology for CPU based attestation and sealing, 2013. ,
Verifying arbitrary SQL queries over dynamic outsourced databases, 2017. ,
A Practical and Provable Technique to Make Randomized Systems Accountable, NDSS, vol.9, 2009. ,
Trustworthy Distributed Computations on Personal Data, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02269200