W. Abdelghani, C. Zayani, I. Amous, and F. Sèdes, Trust management in social internet of things: a survey, Conference on e-Business, pp.430-441, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01702224

M. Nitti, R. Girau, L. Atzori, A. Iera, and G. Morabito, A subjective model for trustworthiness evaluation in the social internet of things, Personal Indoor and Mobile Radio Communications (PIMRC), pp.18-23, 2012.

X. Jia, Q. Feng, T. Fan, and Q. Lei, Rfid technology and its applications in internet of things (iot), Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, pp.1282-1285, 2012.

C. Han, J. M. Jornet, E. Fadel, and I. F. Akyildiz, A cross-layer communication module for the internet of things, Computer Networks, vol.57, issue.3, pp.622-633, 2013.

D. Miorandi, S. Sicari, F. D. Pellegrini, and I. Chlamtac, Internet of things: Vision, applications and research challenges, Ad hoc networks, vol.10, issue.7, pp.1497-1516, 2012.

D. H. Ali, A social internet of things application architecture: applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds, 2015.
URL : https://hal.archives-ouvertes.fr/tel-01316892

L. Atzori, A. Iera, G. Morabito, and M. Nitti, The social internet of things (siot)-when social networks meet the internet of things: Concept, architecture and network characterization, Computer networks, vol.56, issue.16, pp.3594-3608, 2012.

S. Geetha, Social internet of things, World Scientific News, vol.41, p.76, 2016.

A. Dohr, R. Modre-opsrian, M. Drobics, D. Hayn, and G. Schreier, The internet of things for ambient assisted living, Seventh International Conference on Information Technology: New Generations (ITNG), pp.804-809, 2010.

G. Roussos and V. Kostakos, Rfid in pervasive computing: state-ofthe-art and outlook, Pervasive and Mobile Computing, vol.5, issue.1, pp.110-131, 2009.

I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: a survey, Computer networks, vol.38, issue.4, pp.393-422, 2002.

I. F. Akyildiz and I. H. Kasimoglu, Wireless sensor and actor networks: research challenges, vol.2, pp.351-367, 2004.

C. Sun, Application of rfid technology for logistics on internet of things, AASRI Procedia, vol.1, pp.106-111, 2012.

D. Singh, G. Tripathi, and A. J. Jara, A survey of internet-of-things: Future vision, architecture, challenges and services, Internet of things (WF-IoT), pp.287-292, 2014.

Z. Yan, P. Zhang, and A. V. Vasilakos, A survey on trust management for internet of things, Journal of network and computer applications, vol.42, pp.120-134, 2014.

A. Fongen, Identity management and integrity protection in the internet of things, 2012 third international conference on emerging security technologies, pp.111-114, 2012.

S. Gambs, M. Killijian, M. N. Del-prado, and C. , Deanonymization attack on geolocated data, Journal of Computer and System Sciences, vol.80, issue.8, pp.1597-1614, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01242268

A. J. Jara, L. Marin, A. F. Skarmeta, D. Singh, G. Bakul et al., Mobility modeling and security validation of a mobility management scheme based on ecc for ip-based wireless sensor networks (6lowpan), 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.491-496, 2011.

M. A. Isa, N. N. Mohamed, H. Hashim, S. F. Adnan, J. Manan et al., A lightweight and secure tftp protocol for smart environment, Computer Applications and Industrial Electronics (ISCAIE), 2012 IEEE Symposium on, pp.302-306, 2012.

J. Granjal, E. Monteiro, and J. S. Silva, On the effectiveness of endto-end security for internet-integrated sensing applications, Green Computing and Communications (GreenCom), 2012 IEEE International Conference on, pp.87-93, 2012.

S. Raza, L. Wallgren, and T. Voigt, Svelte: Real-time intrusion detection in the internet of things, Ad hoc networks, vol.11, issue.8, pp.2661-2674, 2013.

H. Ning, H. Liu, and L. Yang, Cyber-entity security in the internet of things, Computer, p.1, 2013.

Z. Quan, F. Gui, D. Xiao, and Y. Tang, Trusted architecture for farmland wireless sensor networks, Cloud Computing Technology and Science (CloudCom), pp.782-787, 2012.

D. Seal, ARM architecture reference manual. Pearson Education, 2001.

D. Gessner, A. Olivereau, A. S. Segura, and A. Serbanati, Trustworthy infrastructure services for a secure and privacy-respecting internet of things, Trust, Security and Privacy in Computing and Communications (TrustCom), pp.998-1003, 2012.

R. Z. Rebaï, L. Ghorbel, C. A. Zayani, and I. Amous, An adaptive method for user profile learning, East European Conference on Advances in Databases and Information Systems, pp.126-134, 2013.

M. Mezghani, A. Péninou, C. A. Zayani, I. Amous, and F. Sèdes, Analyzing tagged resources for social interests detection, International Conference on Enterprise Information Systems, pp.340-345, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01178560

D. Tchuente, M. Canut, N. Jessel, A. Péninou, and F. Sèdes, Dérivation de profils utilisateursà partir de réseaux sociaux: une approche par communautés de réseauxégocentriques (derivation of user profiles from social networks: a community approach of egocentric networks), Ingénierie des systèmes d'information, vol.18, pp.11-37, 2013.

E. Khanfir, C. E. Hog, R. B. Djmeaa, and I. A. Amor, A web service selection framework based on user's context and qos, 2014 IEEE International Conference on, pp.708-711, 2014.

J. Miranda, From the internet of things to the internet of people, IEEE Internet Computing, vol.19, issue.2, pp.40-47, 2015.

A. Sheth and P. Anantharam, Physical cyber social computing for human experience, Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics, p.1, 2013.

J. Guillen, J. Miranda, J. Berrocal, J. Garcia-alonso, J. M. Murillo et al., People as a service: a mobile-centric model for providing collective sociological profiles, IEEE software, vol.31, issue.2, pp.48-53, 2014.

N. Mäkitalo, Social devices: collaborative co-located interactions in a mobile cloud, Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p.10, 2012.

C. C. Aggarwal, N. Ashish, and A. Sheth, The internet of things: A survey from the data-centric perspective," in Managing and mining sensor data, pp.383-428, 2013.

L. Atzori, A. Iera, and G. Morabito, From" smart objects" to" social objects": The next evolutionary step of the internet of things, IEEE Communications Magazine, vol.52, issue.1, pp.97-105, 2014.

, Les franais et la mobilité digitale (the french and digital mobility), vol.04, pp.2018-2020, 2014.

. Laposte, Objets connectés: Ce qu'en attendent les franais, vol.12, pp.2018-2020, 2014.

M. Nitti, R. Girau, and L. Atzori, Trustworthiness management in the social internet of things, IEEE Transactions on knowledge and data engineering, vol.26, issue.5, pp.1253-1266, 2014.

. Vidal, L'utilisation de smartphones par les médecins (the use of smartphones by doctors, vol.3, pp.2018-2020, 2016.

A. Morris, Medical Research and Technology, ser. Cutting-Edge Science and Technology, 2016.

B. Patrick and L. Jacques, Connected health: From e-health to connected health, CNOM, Tech. Rep, vol.06, p.2015

J. B. Bernabe, J. L. Ramos, and A. F. Gomez, Taciot: multidimensional trust-aware access control system for the internet of things, Soft Computing, vol.20, issue.5, pp.1763-1779, 2016.

N. B. Truong, T. Um, B. Zhou, and G. M. Lee, From personal experience to global reputation for trust evaluation in the social internet of things, GLOBECOM 2017-2017 IEEE Global Communications Conference, pp.1-7, 2017.

R. Chen, F. Bao, and J. Guo, Trust-based service management for social internet of things systems, IEEE transactions on dependable and secure computing, vol.13, pp.684-696, 2016.

S. Lee, A study on the need of the usable security in the corelation between it security and user experience, International Journal of Internet, Broadcasting and Communication, vol.9, issue.4, pp.14-18, 2017.

P. Realpe-muñoz, C. A. Collazos, T. Granollers, J. Muñoz-arteaga, and E. B. Fernandez, Design process for usable security and authentication using a user-centered approach, Proceedings of the XVIII International Conference on Human Computer Interaction, p.42, 2017.

H. Harkous, Data-driven, personalized usable privacy, EPFL, 2017.

J. Angulo, S. Fischer-hübner, E. Wästlund, and T. Pulls, Towards usable privacy policy display and management, Information Management & Computer Security, vol.20, issue.1, pp.4-17, 2012.

U. E. Manawadu, M. Kamezaki, M. Ishikawa, T. Kawano, and S. Sugano, A multimodal human-machine interface enabling situationadaptive control inputs for highly automated vehicles, Intelligent Vehicles Symposium, pp.1195-1200, 2017.

J. D. Bauer, H. F. Kenneth, and R. N. Flores, Intelligent humanmachine interface, 2011.