E. Parliament, General Data Protection Regulation. Law, 2016.

T. Allard, G. Hébrail, and E. Pacitti, Chiaroscuro: Transparency and privacy for massive personal time-series clustering, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01136686

N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, P. Pucheral et al.,

G. Popa and . Scerri, Personal data management systems: The security and functionality standpoint, Information Systems, vol.80, 2019.
URL : https://hal.archives-ouvertes.fr/hal-01898705

A. Arasu and R. Kaushik, Oblivious query processing, ICDT, 2014.

M. Barbosa, B. Portela, and G. Scerri, Foundations of hardware based attested computation and application to SGX, EuroS&P, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01417137

J. Bater, G. Elliott, and C. Eggen, SMCQL: secure query processing for private data networks, vol.10, 2017.

V. Bindschaedler, P. Grubbs, and D. Cash, The tao of inference in privacy-protected databases, PVLDB, vol.11, issue.11, 2018.

D. Boneh, C. Gentry, S. Halevi, F. Wang, and D. J. Wu, Private database queries using somewhat homomorphic encryption, 2013.

R. Cortiñas, Secure Failure Detection and Consensus in TrustedPals, IEEE Trans. Dependable Sec. Comput, vol.9, issue.4, 2012.

I. Damgård, M. Keller, and E. Larraia, Practical covertly secure MPC for dishonest majority -or: Breaking the SPDZ limits, 2013.

A. Dinh, P. Saxena, and C. Chang, M2R: enabling strong-er privacy in mapreduce computation, USENIX Security Symposium, 2015.

M. Fort, F. C. Freiling, and L. D. Penso, Secure Multiparty Computation Implemented with Smart Cards. ESORICS, 2006.

T. Ge and S. B. Zdonik, Answering aggregation queries in a secure system model, 2007.

T. Hunt, Z. Zhu, Y. Xu, S. Peter, and E. Witchel, Ryoan: A distributed sandbox for untrusted computation on secret data, 2016.

M. Sabt and M. Achemlal, Trusted execution environment: What it is, and what it is not, TrustCom/BigDataSE/ISPA, issue.1, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01246364

F. Schuster, M. Costa, and C. Fournet, VC3: trustworthy data analytics in the cloud using SGX, S&P, 2015.

Q. To, B. Nguyen, and P. , Private and scalable execution of SQL aggregates on a secure decentralized architecture, TODS, vol.41, issue.3, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01296432

F. Tramèr, F. Zhang, and H. Lin, Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge, EuroS&P, 2017.

W. Wang, G. Chen, and X. Pan, Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX, 2017.

I. Anati, S. Gueron, and S. Johnson, Innovative technology for CPU based attestation and sealing, 2013.

Y. Zhang, D. Genkin, and J. Katz, Verifying arbitrary SQL queries over dynamic outsourced databases, 2017.

M. Backes, A Practical and Provable Technique to Make Randomized Systems Accountable, NDSS, vol.9, 2009.

R. Ladjel, Trustworthy Distributed Computations on Personal Data, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02269200