. [. Bibliographie, N. Allard, L. Anciaux, P. Bouganim, R. Pucheral et al., Seamless Access to Healthcare Folders with Strong Privacy Guarantees. Special issue of the, Journal of Healthcare Delivery Reform Initiatives, vol.1, pp.4-82, 2009.

]. T. Aab+10a, N. Allard, L. Anciaux, Y. Bouganim, L. Guo et al., Secure personal data servers: a vision paper, 36th International Conference on Very Large Data Bases (VLDB), pp.25-35, 2010.

]. T. Aab+10b, N. Allard, L. Anciaux, P. Bouganim, R. Pucheral et al., IX: Trustworthiness of Pervasive Healthcare Folders. Book chapter of Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and, Information Science Reference, pp.1-24, 2010.

T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, and R. Thion, Concilier ubiquité et sécurité des données médicales. Les Cahiers du CRID « Les technologies au service des droits, opportunités, défis, 2010.

P. Alimonti, G. Ausiello, L. Giovaniello, and M. Protasi, On the Complexity of approximating weighted satis_ability problems, Tech. rep, 1998.

M. [. Anciaux, L. Benzine, P. Bouganim, D. Pucheral, and . Shasha, GhostDB, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, 2007.
DOI : 10.1145/1247480.1247555

URL : https://hal.archives-ouvertes.fr/inria-00321721

]. N. Abb+08a, M. Anciaux, L. Berthelot, L. Braconnier, M. Bouganim et al., A Tamper-Resistant and Portable Healthcare Folder, International Journal of Telemedicine and Applications (IJTA), vol.2008, 2008.

]. N. Abb+08b, M. Anciaux, L. Benzine, K. Bouganim, P. Jacquemin et al., Restoring the Patient Control over her Medical History, 21th IEEE Int. Symposium on Computer-Based Medical Systems (IEEE CBMS, 2008.

A. N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, P. Pucheral et al., Trusted Cells : A Sea Change for Personal Data Services, 6th Conference on Innovative Database Research (CIDR), 4 p, 2013.

P. [. Anciaux, L. Bonnet, and P. Bouganim, Trusted Cells: Ensuring Privacy for the Citizens of Smart Cities, ERCIM News, vol.98, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01096643

N. Anciaux, L. Bouganim, T. Delot, S. Ilarri, L. Kloul et al., Folk-IS, 36th International Conference on Very Large Data Bases (PVLDB) Vision Paper, pp.425-428, 2014.
DOI : 10.14778/2732269.2732278

URL : https://hal.archives-ouvertes.fr/hal-00906204

N. Anciaux, L. Bouganim, T. Delot, S. Ilarri, L. Kloul et al., Opportunistic data services in least developed countries, ACM SIGMOD Record, vol.43, issue.1, pp.1-52, 2014.
DOI : 10.1145/2627692.2627704

URL : https://hal.archives-ouvertes.fr/hal-00906204

L. [. Anciaux, Y. Bouganim, P. Guo, J. Pucheral, S. Vandewalle et al., Pluggable personal data servers, Proceedings of the 2010 international conference on Management of data, SIGMOD '10, 2010.
DOI : 10.1145/1807167.1807328

URL : https://hal.archives-ouvertes.fr/inria-00551836

]. N. Abh+08a, L. Anciaux, H. Bouganim, P. Van-heerde, P. M. Pucheral et al., Data Degradation: Making Private Data Less Sensitive Over Time, 17th ACM International Conference on Information and Knowledge Management (ACM CIKM), short paper, 2008.

]. N. Abh+08b, L. Anciaux, H. Bouganim, P. Van-heerde, P. M. Pucheral et al., InstantDB: Enforcing Timely Degradation of Sensitive Data, 24th International Conference on Data Engineering (ICDE), short paper, 2008.

]. N. Abh+08c, L. Anciaux, H. Bouganim, P. Van-heerde, P. M. Pucheral et al., Dégradation progressive et irréversible des données, 2008.

N. Anciaux, D. Boutara, B. Nguyen, and . Vazirgiannis, Limiting Data Exposure in Multi-Label Classification Processes, International Workshop on Privacy- AwaRe Intelligent Systems (PARIS2012), 2012.
URL : https://hal.archives-ouvertes.fr/hal-01176445

W. [. Anciaux, B. Bezza, M. Nguyen, and . Vazirgiannis, MinExp-card, Proceedings of the 16th International Conference on Extending Database Technology, EDBT '13, pp.753-756, 2013.
DOI : 10.1145/2452376.2452472

URL : https://hal.archives-ouvertes.fr/hal-00937105

N. Anciaux, D. Boutara, B. Nguyen, and M. Vazirgiannis, Limiting Data Exposure in Multi-Label Classification Processes, Fundamenta Informaticae
URL : https://hal.archives-ouvertes.fr/hal-01176445

A. N. Anciaux, C. Bobineau, L. Bouganim, P. Pucheral, and P. Valduriez, PicoDBMS: Validation and Experience, 27th International Conference on Very Large Data Bases (VLDB), demo. paper, 2001.

L. [. Anciaux and P. Bouganim, Future Trends in Secure Chip Data Management, IEEE Data Engineering BulletinIEEE DEB), vol.30, p.3, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00316019

]. N. Abp+08a, L. Anciaux, P. Bouganim, K. Pucheral, S. Jacquemin et al., Software: PlugDB-engine version 1, registered at the 'Agence pour la Protection des Programmes (APP)' under the reference IDDN, 2008.

]. N. Abp+08b, L. Anciaux, P. Bouganim, P. Pucheral, and . Valduriez, DiSC: Benchmarking Secure Chip DBMS, IEEE Transactions on Knowledge and Data EngineeringIEEE TKDE, vol.20, pp.1363-1377, 2008.

]. N. Abp+08c, L. Anciaux, and P. Bouganim, SGBD embarqué dans une puce : retour d'expérience, Technique et Science Informatiques (TSI), vol.27, pp.1-2, 2008.

L. [. Anciaux, P. Bouganim, S. Pucheral, M. Yin, K. Benzine et al., Software: PlugDB-engine version 2, registered at the 'Agence pour la Protection des Programmes (APP)' under the reference IDDN Software: PlugDB-engine version 3, registered at the 'Agence pour la Protection des Programmes (APP)' under the reference IDDN, ABP+14] N. Anciaux, L. Bouganim, P. Pucheral, Y. Guo, L. Le Folgoc. MiloDB: a Personal, Secure and Portable Database Machine. Distributed and Parallel Databases (DAPD), pp.1-37, 2009.

]. N. Abp03b, L. Anciaux, and P. Bouganim, Memory Requirements for Query Execution in Highly Constrained Devices, 29th International Conference on Very Large Data Bases (VLDB), 2003.

L. [. Anciaux and P. Bouganim, Confidentialit?? des Bases de Donn??es : Apports de la Cryptographie et de Composants Mat??riels S??curis??s, annals of telecommunications - annales des t??l??communications, vol.29, issue.2, pp.3-4, 2006.
DOI : 10.1007/BF03219909

L. [. Anciaux and P. Bouganim, A Hardware Approach for Trusted Access and Usage Control. Book chapter of the Handbook of Research on Secure Multimedia Distribution, Information Science Reference, pp.157-179, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00333208

C. A. Ardagna, S. De-capitani-di-vimercati, S. Foresti, S. Paraboschi, and P. Samarati, Minimising disclosure of client information in credential-based interactions, International Journal of Information Privacy, Security and Integrity, vol.1, issue.2/3, pp.205-233, 2012.
DOI : 10.1504/IJIPSI.2012.046133

D. Agrawal, D. Ganesan, R. Sitaraman, Y. Diao, and S. Singh, Lazy-Adaptive Tree, Proc. of the VLDB, pp.361-372, 2009.
DOI : 10.14778/1687627.1687669

]. N. Anb06, L. Anciaux, and . Bouganim, Data Management in Embedded Smart Devices. Tutorial donné à la Smart University, co-organisée avec la 7ème édition de la conférence internationale e-smart, 2006.

]. N. Anb14, B. Anciaux, and . Nguyen, Limiter la collecte des données personnelles, un problème juridique NP-difficile. Magazine Tangente, numéro hors-série n°52 bibliothèque, 2014.

]. N. Anc10 and . Anciaux, Dossier Médico-Social Portable et Sécurisé. Présentation et démonstration, Les Industries du Numérique pour la Santé, RII, in conjunction with the Connectathon, 2010.

]. N. Anc11 and . Anciaux, Dossier Médico-Social Portable et Sécurisé Présentation et démonstration. Les sciences du numérique au service de la santé à domicile et de l'autonomie, RII, 2010.

]. N. Anc13a and . Anciaux, Gestion de données personelles respetueuse de la vie privée. Presentation et démonstration, Futur en Seine, Archipelle des projets, 2013.

]. N. Anc13b and . Anciaux, Une nouvelle approche de la protection de nos données, 2013.

]. N. Anc14 and . Anciaux, Vers un modèle de gestion des données respectueux de la vie privée : application à la collecte limitée d'informations personnelles. Seminaire IREP "BIG DATA, 2014.

]. N. Anc15 and . Anciaux, Garantir la confidentialité des données personnelles. Futur en Seine 2014, 2014.

A. H. Anderson, An introduction to the Web Services Policy Language (WSPL), Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004.
DOI : 10.1109/POLICY.2004.1309166

B. [. Anciaux, I. S. Nguyen, and . Popa, Personal Data Management with Secure Hardware : The advantage of Keeping you Data at Hand, 14th International Conference on Mobile Data Management (MDM), Advanced Seminar, pp.1-2, 2013.

B. [. Anciaux, I. S. Nguyen, and . Popa, Tutorial: Managing Personal Data with Strong Privacy Guarantees, 17th International Conference on Extending Database Technology (EDBT), Tutorial, pp.672-673, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01096633

B. [. Anciaux, M. Nguyen, and . Vazirgiannis, Minimum Exposure -A New Approach for Limited Data Collection, Digiteo workshop on Web Mining, 2011.

]. N. Anv12a, B. Anciaux, M. Nguyen, and . Vazirgiannis, Limiting Data Collection in Application Forms : A real-case Application of a Founding Privacy Principle, 10th Conference on Privacy, Security and Trust (PST), p.8, 2012.

]. N. Anv12b, B. Anciaux, M. Nguyen, and . Vazirgiannis, The Minimum Exposure Project: Limiting Data Collection in Online Forms, ERCIM News, vol.90, 2012.

B. [. Anciaux, M. Nguyen, and M. Vazirgiannis, Exposition minimum de donn??es pour des applications ?? base de classifieurs, Ingénierie des Systèmes d'Information, pp.59-85, 2013.
DOI : 10.3166/isi.18.4.59-85

J. [. Anciaux, P. Petit, K. Pucheral, and . Zeitouni, Personal Data Server: Keeping Sensitive Data under the Indiviual's Control, ERCIM News, vol.90, 2012.

L. Arge, The Buffer Tree: A Technique for Designing Batched External Data Structures, Algorithmica, 2003.

]. S. Bas11, R. Bajaj, S. Bajaj, and R. Sion, Sion: TrustedDB: a trusted hardware based database with privacy and data confidentiality TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality, SIGMOD Conference, pp.205-216, 2011.

G. [. Blank, E. Bolsover, and . Dubois, A New Privacy Paradox. Global Cyber Security Capacity Centre, Draft Working Paper, 2014.

P. Belotti, J. Lee, L. Liberti, F. Margot, and A. Wachter, Branching and bounds tightening techniques for non-convex MINLP, Optimization Methods and Software, vol.24, pp.4-5, 2009.

P. Bernstein, C. Reid, and S. Das, Hyder -A Transactional Record Manager for Shared Flash, 2011.

C. Bolchini, F. Salice, F. Schreiber, and L. Tanca, Logical and physical design issues for smart card databases, ACM Transactions on Information Systems, vol.21, issue.3, 2003.
DOI : 10.1145/858476.858478

]. D. Cas13 and D. Castro, How much will PRISM cost the US cloud computing industry. The Information Technology and Innovation Foundation, 2013.

R. Coceres, E. M. Belding, T. S. Parikh, and L. Subramanian, Information and Communication Technologies for Development [Guest editors' introduction], IEEE Pervasive Computing, vol.11, issue.3, 2012.
DOI : 10.1109/MPRV.2012.46

W. Chen, L. Clarke, J. Kurose, and D. Towsley, Optimizing cost-sensitive trustnegotiation protocols, IEEE Computer and Communications Societies, 2005.

]. P. Coc13, N. Collin, and . Colin, Mission d'expertise sur la fiscalité de l'économie numérique

S. A. Cook, The complexity of theorem-proving procedures, Proceedings of the third annual ACM symposium on Theory of computing , STOC '71, 1971.
DOI : 10.1145/800157.805047

S. [. Damiani, S. De-capitani-vimercati, S. Jajodia, P. Paraboschi, and . Samarati, Balancing Confidentiality and Efficiency in Untrusted Relational DBMSsA Fine- Grained Access Control System for XML Documents, ACM Conference on Computer and Communications Security (CCS), p.67, 2002.

B. Debnath, S. Sengupta, and J. Li, SkimpyStash, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, 2011.
DOI : 10.1145/1989323.1989327

Y. Diao, D. Ganesan, G. Mathur, and P. J. Shenoy, Rethinking data management for storage-centric sensor networks, CIDR, pp.22-31, 2007.

]. J. Ehj07, S. A. Ehlers, and . Jassim, Wavelet library for constrained devices, pp.65790-65790, 2007.

&. Giesecke and . Devrient, StarSign® Mobile Security Card SE 1.2, Datasheet, 2014.

]. J. Gob14, P. González, . J. Bonnethaf+06-]-h, N. Van-heerde, L. Anciaux et al., Towards an open framework leveraging a trusted execution environment Balancing Smartness and Privacy for the Ambient Intelligence, Cyberspace Safety and Security First European Conference on Smart Sensing and Context (EuroSSC), Lecture Notes in Computer Science 4272 springer, p.2013, 2006.

L. M. Haas, M. J. Carey, M. Livny, and A. Shukla, Seeking the truth about ad hoc join costs, Journal, 1997.

M. [. Van-heerde, N. Fokkinga, and . Anciaux, A Framework to Balance Privacy and Data Usability Using Data Degradation, 2009 International Conference on Computational Science and Engineering, 2009.
DOI : 10.1109/CSE.2009.174

URL : https://hal.archives-ouvertes.fr/hal-00624068

. Kar72 and R. M. Karp, Reducibility among combinatorial problems, Complexity of Computer Computations, pp.85-103, 1972.

]. F. Kha11 and . Khatibloo, Personal Identity Management -Preparing For A World Of Consumer-Managed Data, Forrester Report, 2011.

I. Koltsidas and S. D. Viglas, Data management over flash memory, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, 2011.
DOI : 10.1145/1989323.1989455

H. Lim, B. Fan, D. Andersen, and M. Kaminsky, SILT, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, 2011.
DOI : 10.1145/2043556.2043558

Z. Li, R. , and K. A. , Fast joins using join indices, VLDB Journal, 1999.
DOI : 10.1007/s007780050071

F. Li, B. Luo, and P. Liu, Secure Information Aggregation for Smart Grids Using Homomorphic Encryption, 2010 First IEEE International Conference on Smart Grid Communications, pp.327-332, 2010.
DOI : 10.1109/SMARTGRID.2010.5622064

]. R. Mer90 and . Merkle, A Certified Digital Signature, Advances in Cryptology (Crypto'89), 1990.

C. C. Miller, Revelations of N.S.A. Spying Cost U.S. Tech Companies. The New York Times, 21 Mars, 2014.

M. Madden, A. Lenhart, S. Cortesi, and U. Gasser, Teens and Mobile Apps Privacy. Pew Internet and American Life Project, 2013.

P. Muth, P. O-'neil, A. Pick, and G. Weikum, The LHAM log-structured history data access method, The VLDB Journal The International Journal on Very Large Data Bases, vol.8, issue.3-4, 2000.
DOI : 10.1007/s007780050004

L. [. Mulligan, A. J. Wang, and . Burstein, Final Project Report Privacy in the Smart Grid: An Information Flow Analysis, CIEE Report, p.69, 2011.

[. Neil, P. Cheng, E. Gawlick, D. O-'neil, and E. , The log-structured merge-tree (LSM-tree), Acta Informatica, 1996.

L. [. Pucheral, P. Bouganim, C. Valduriez, and . Bobineau, PicoDBMS: Scaling down Database Techniques for the Smartcard', Very Large Data Bases Journal, Special issue on the best papers from VLDB, 2000.

A. Rial and G. Danezis, Privacy-preserving smart metering, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, pp.49-60, 2011.

M. Rosenblum and J. Ousterhout, The Design and Implementation of a Log- Structured File System, ACM TOCS, 1992.

N. [. Salperwyck, M. Anciaux, L. Benzine, P. Bouganim, D. Pucheral et al., GhostDB: Hiding Data from Prying Eyes, 33th International Conference on Very Large Data Bases (VLDB), demo. paper, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00321721

. Sam01 and P. Samarati, Protecting respondents' identities in microdata release, IEEE TKDE, vol.13, issue.6, 2001.

. Sel76, D. Severance, and G. Lohman, Differential files: their application to the maintenance of large databases, 1976.

P. Schmid and A. Roos, SDXC/SDHC Memory Cards, Rounded Up And Benchmarked

P. Sundaresan, General Key Index, 1999.

Q. To, B. Nguyen, P. N. Pucheral, and J. C. Worthmann, Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware Security-control methods for statistical databases: a comparative study, ACM Comput. Surv, 1989.

D. Agrawal, D. Ganesan, R. Sitaraman, Y. Diao, and S. Singh, Lazy-Adaptive Tree, Proceedings of the VLDB Endowment, vol.2, issue.1, 2009.
DOI : 10.14778/1687627.1687669

A. Ailamaki, D. J. Dewitt, and M. D. Hill, Data page layouts for relational databases on deep memory hierarchies, The VLDB Journal, 2002.
DOI : 10.1007/s00778-002-0074-9

T. Allard, B. Nguyen, and P. Pucheral, Safe Anonymization of Data Hosted in Smart Tokens, PRiSM Technical Report, vol.526, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00553164

T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, and R. Thion, Trustworthiness of Pervasive Healthcare Folders, Pervasive and Smart Technologies for Healthcare, Information Science Reference, 2009.

N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, and D. Shasha, GhostDB, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, 2007.
DOI : 10.1145/1247480.1247555

URL : https://hal.archives-ouvertes.fr/inria-00321721

N. Anciaux, L. Bouganim, Y. Guo, P. Pucheral, J. Vandewalle et al., Pluggable personal data servers, Proceedings of the 2010 international conference on Management of data, SIGMOD '10, 2010.
DOI : 10.1145/1807167.1807328

URL : https://hal.archives-ouvertes.fr/inria-00551836

B. H. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, 1970.
DOI : 10.1145/362686.362692

R. Dingledine, N. Mathewson, and S. P. Tor, The Second-Generation Onion Router, 2004.

B. C. Fung, K. Wang, R. Chen, and P. S. Yu, Privacypreserving data publishing: A survey on recent developments, 2010.

M. Gagneux, Recommandations de la mission de relance du projet de DMP. http://www.sante-jeunesse-sports.gouv.fr

D. Goldschlag, M. Reed, and P. Syverson, Onion Routing for Anonymous and Private Internet Connections, Communications of the ACM, 1999.

L. M. Haas, M. J. Carey, M. Livny, and A. Shukla, Seeking the truth about ad hoc join costs, VLDB Journal, 1997.

H. Hac?gümü?, B. Iyer, and S. Mehrotra, Providing Database as a Service, ICDE, 2002.

S. Lee and B. Moon, Design of flash-based DBMS, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, 2007.
DOI : 10.1145/1247480.1247488

Z. Li and K. A. Ross, Fast joins using join indices, The VLDB Journal The International Journal on Very Large Data Bases, vol.8, issue.1, 1999.
DOI : 10.1007/s007780050071

M. Robshaw and O. Billet, New Stream Cipher Designs -The eSTREAM Finalists, LNCS, vol.4986, 2008.

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, 2002.
DOI : 10.1142/S0218488502001648

C. Wu, L. Chang, and T. Kuo, An Efficient B-Tree Layer for Flash-Memory Storage Systems, 2003.
DOI : 10.1007/978-3-540-24686-2_26

X. Xiao and Y. Tao, Output perturbation with query relaxation, Proceedings of the VLDB Endowment, vol.1, issue.1, 2008.
DOI : 10.14778/1453856.1453949

S. Yin, P. Pucheral, and X. Meng, A sequential indexing scheme for flash-based embedded systems, Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology, EDBT '09, 2009.
DOI : 10.1145/1516360.1516429

URL : https://hal.archives-ouvertes.fr/hal-00624077

T. Allard, Secure personal data servers, Proceedings of the VLDB Endowment, vol.3, issue.1-2, pp.25-35, 2010.
DOI : 10.14778/1920841.1920850

URL : https://hal.archives-ouvertes.fr/inria-00551875

S. Bajaj and R. , Sion: TrustedDB: a trusted hardware based database with privacy and data confidentiality, SIGMOD Conference, pp.205-216, 2011.

S. Katzenbeisser and K. Kursawe, Privacy and Security in Smart Energy Grids, 2011.

H. Lam, A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signatures, IEEE Transactions on Consumer Electronics, 2007.

A. Narayanan, V. Toubiana, S. Barocas, H. Nissenbaum, and D. , Boneh: A Critical Look at Decentralized Personal Data Architectures CoRR abs, 1202.

H. Nissenbaum, Privacy in context: Technology, policy, and the integrity of social life, 2010.

J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

A. Pentland, Personal Data: The Emergence of a New Asset Class. World Economic Forum, 2011.

S. Petronio, Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet, In Computer-mediated communication in Personal Relationships, 2011.

N. Zhang and W. Zhao, Distributed privacy preserving information sharing, 2005.

N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, I. S. Popa et al., Trusted Cells: A Sea Change for Personal Data Services, 2013.

S. Vandewalle and . Yin, Pluggable Personal Data Servers, ACM SIGMOD, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00551836

E. Brewer, M. Demmer, B. Du, M. Ho, M. Kam et al., The Case for Technology in Developing Regions, Computer, vol.38, issue.6, 2005.

D. Bursky, Secure Microcontrollers Keep Data Safe, PRN Engineering Services, 2012.

Y. Cao and Z. Sun, Routing in Delay/Disruption Tolerant Networks: A Taxonomy, Survey and Challenges, IEEE Communications Surveys & Tutorials, vol.15, issue.2, p.2013
DOI : 10.1109/SURV.2012.042512.00053

R. Chaudhri, G. Borriello, and R. J. Anderson, Monitoring Vaccine Cold Chains in Developing Countries, IEEE Pervasive Computing, vol.11, issue.3, p.2012
DOI : 10.1109/MPRV.2012.20

R. Coceres, E. M. Belding, T. S. Parikh, and L. Subramanian, Information and Communication Technologies for Development [Guest editors' introduction], IEEE Pervasive Computing, vol.11, issue.3, p.2012
DOI : 10.1109/MPRV.2012.46

L. Gao, M. Li, A. Bonti, W. Zhou, and S. Yu, Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks, IEEE Transactions on Mobile Computing, vol.12, issue.11, pp.12-2013
DOI : 10.1109/TMC.2012.188

V. Ndou, E-Government for Developing Countries: Opportunities and Challenges, EJISDC, vol.18, 2004.

G. Rossi, S. Murugesan, and N. Godbole, IT in Emerging Markets, IT Professional, vol.14, issue.4, p.2012
DOI : 10.1109/MITP.2012.79

A. Seth, D. Kroeker, M. A. Zaharia, S. Guo, and S. Keshav, Low-cost communication for rural internet kiosks using mechanical backhaul, Proceedings of the 12th annual international conference on Mobile computing and networking , MobiCom '06, 2006.
DOI : 10.1145/1161089.1161127

H. Shirani-mehr, F. B. Kashani, and C. Shahabi, Efficient reachability query evaluation in large spatiotemporal contact datasets, Proceedings of the VLDB Endowment, vol.5, issue.9, p.2012
DOI : 10.14778/2311906.2311912

D. Abbadi, A. E. Wang, and S. , Secure data management in the cloud, p.DNIS, 2011.

D. Agrawal, D. Ganesan, R. Sitaraman, Y. Diao, and S. Singh, Lazy-Adaptive Tree, Proceedings of the VLDB Endowment, vol.2, issue.1, p.PVLDB, 2009.
DOI : 10.14778/1687627.1687669

T. Allard, N. Anciaux, L. Bouganim, Y. Guo, L. Folgoc et al., Secure personal data servers, Proceedings of the VLDB Endowment, vol.3, issue.1-2, 2010.
DOI : 10.14778/1920841.1920850

URL : https://hal.archives-ouvertes.fr/inria-00551875

T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, and R. Thion, Trustworthiness of pervasive healthcare folders, Pervasive and Smart Technologies for Healthcare, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00552199

N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, and D. Shasha, Revelation on demand, Distributed and Parallel Databases, vol.12, issue.2, p.DAPD, 2009.
DOI : 10.1007/s10619-009-7035-x

URL : https://hal.archives-ouvertes.fr/inria-00322087

N. Anciaux, L. Bouganim, Y. Guo, P. Pucheral, J. J. Vandewalle et al., Pluggable personal data servers, Proceedings of the 2010 international conference on Management of data, SIGMOD '10, p.SIGMOD, 2010.
DOI : 10.1145/1807167.1807328

URL : https://hal.archives-ouvertes.fr/inria-00551836

L. Arge, The buffer tree: a technique for designing batched external data structures, Algorithmica, 2003.

P. Bernstein, C. Reid, and S. Das, Hyder?a transactional record manager for shared flash, p.CIDR, 2011.

A. B. Bityutskiy, JFFS3 design issues, 2005.

B. H. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, 1970.
DOI : 10.1145/362686.362692

C. Bolchini, F. Salice, F. Schreiber, and L. Tanca, Logical and physical design issues for smart card databases, ACM Transactions on Information Systems, vol.21, issue.3, p.TOIS, 2003.
DOI : 10.1145/858476.858478

D. Bursky, Secure microcontrollers keep data safe. PRN engineering services (2012)

C. Y. Chan and Y. E. Ioannidis, An efficient bitmap encoding scheme for selection queries, p.SIGMOD, 1999.

B. Debnath, S. Sengupta, and J. Li, SkimpyStash, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, p.SIGMOD, 2011.
DOI : 10.1145/1989323.1989327

R. Elbaz, D. Champagne, R. B. Lee, L. Torres, G. Sassatelli et al., TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks, p.CHES, 2007.
DOI : 10.1007/978-3-540-74735-2_20

URL : https://hal.archives-ouvertes.fr/lirmm-00179776

J. Gemmell, G. Bell, and R. Lueder, MyLifeBits, Communications of the ACM, vol.49, issue.1, 2006.
DOI : 10.1145/1107458.1107460

L. M. Haas, M. J. Carey, M. Livny, and A. Shukla, Seeking the truth about ad hoc join costs, VLDB J, 1997.

P. Bonnet, L. Bouganim, I. Koltsidas, and S. D. Viglas, System co-design and date management for flash devices, p.PVLDB, 2011.

Y. Li, B. He, R. J. Yang, Q. Luo, and K. Yi, Tree indexing on solid state drives, Proceedings of the VLDB Endowment, vol.3, issue.1-2, p.PVLDB, 2010.
DOI : 10.14778/1920841.1920990

Z. Li and K. A. Ross, Fast joins using join indices, The VLDB Journal The International Journal on Very Large Data Bases, vol.8, issue.1, 1999.
DOI : 10.1007/s007780050071

H. Lim, B. Fan, D. Andersen, and M. Kaminsky, SILT, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, p.SOSP, 2011.
DOI : 10.1145/2043556.2043558

A. J. Menezes, P. C. Van-oorschot, S. A. Vanstone, and R. L. Rivest, Handbook of Applied Cryptography, Boca Raton, vol.19964964, 2001.
DOI : 10.1201/9781439821916

P. Muth, P. O-'neil, A. Pick, and G. Weikum, The LHAM log-structured history data access method, The VLDB Journal The International Journal on Very Large Data Bases, vol.8, issue.3-4, 2000.
DOI : 10.1007/s007780050004

O. Neil, P. Cheng, E. Gawlick, D. O-'neil, and E. , The log-structured merge-tree (LSM-tree) Acta Inform, 1996.

P. Pucheral, L. Bouganim, P. Valduriez, and C. Bobineau, PicoDBMS: scaling down database techniques for the smart card, VLDB J, 2001.

M. Rosenblum and J. Ousterhout, The design and implementation of a log-structured file system, ACM Trans. Comput. Sci, 1992.

P. Schmid and A. Roos, SDXC/SDHC memory cards, rounded up and benchmarked

D. Severance and G. Lohman, Differential files: their application to the maintenance of large databases, ACM Transactions on Database Systems, vol.1, issue.3, 1976.
DOI : 10.1145/320473.320484

P. Sundaresan, General key indexes, US Patent No, vol.5870747, 1999.

H. T. Vo, S. Wang, D. Agrawal, G. Chen, and B. C. Ooi, LogBase, Proceedings of the VLDB Endowment, vol.5, issue.10, 2012.
DOI : 10.14778/2336664.2336673

A. Weininger, Efficient execution of joins in a star schema, Proceedings of the 2002 ACM SIGMOD international conference on Management of data , SIGMOD '02, 2002.
DOI : 10.1145/564691.564754

C. Wu, L. Chang, and T. Kuo, An Efficient B-Tree Layer for Flash-Memory Storage Systems, p.RTCSA, 2003.
DOI : 10.1007/978-3-540-24686-2_26

S. Yin, P. Pucheral, and X. Meng, A sequential indexing scheme for flash-based embedded systems, Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology, EDBT '09, p.EDBT, 2009.
DOI : 10.1145/1516360.1516429

URL : https://hal.archives-ouvertes.fr/hal-00624077

. Mon-rôle, Responsable pour le partenaire SMIS. Partenaires: Arles-Mimove

. Objectif, Le projet étudie les solutions ICT pour la ville intelligente dans un objectif de soutenabilité sociale (et environnementale) J'ai eu un rôle important dans la rédaction de la proposition de projet, et y représente l'équipe SMIS. Notre implication a pour but d'envisager des architectures Privacy-by- Design garantissant la vie privée des citoyens, dans un contexte où ils sont producteurs de données, Nous nous intéressons en particulier la capture de données sociales

S. Mon-rôle:-membre-du-pôle-vie-privée-et-identité-numérique-et-responsable-pour, P. Projet, . Paip, . Partenaires, . Grace et al., ISN) adopte une approche interdisciplinaire, entre disciplines informatiques et sciences humaines économiques et sociales, pour étudier certains défis sociétaux inhérents à la société numérique. Deux pôles ont été lancés: le premier sur le thème de la coévolution homme/machine, le second sur celui de la vie privée et l'identité numérique. Je m'implique actuellement dans le pôle 'vie privée et identité numérique, Nous avons notamment lancé le projet PEPS PAIP financé par le CNRS et impliquant les partenaires du pôle, dans lequel nous évaluons sous forme expérimentale, l'impact sur les usagers de solutions de gestion de données personnelles où l'individu possède (physiquement) ses données ainsi que le serveur qui en régit la dissémination, par rapport aux solutions centralisées classiques

K. Projet and . Ins, (à vérifier)) https://project.inria.fr/kiss, 2011.

. Mon-rôle, Responsable de la tâche sur l'exposition minimum de données

C. Équipes, . Secret, . Smis-), . Sopinspace, and . Objectif, Évaluer et MOdéliser les Technologies de l'Information de Santé) vise à éclairer les limitations et compromis réciproques que l'intrication des domaines juridiques et informatiques impose à la conception d'infrastructures en charge du Dossier Médical Personnalisé (DMP) et celles des dossiers des réseaux de soins liés à certaines affections (SIDA, cancer) Les deux volets du projet, juridique, Mon rôle : Responsable scientifique pour les équipes Inria. Partenaires : CECOJI, Inria

. Objectif, Conception d'un serveur personnel de données sur un nouveau composant matériel combinant un microcontrôleur sécurisé (type carte à puce) et une grande quantité de la mémoire FLASH (Go) dans une clé USB. La solution doit offrir une alternative à la centralisation des données plus respectueuse de la vie privée

. Int and . Conf, on Management of Data SIGMOD'09 (CP demo, Techniques et Sciences Informatiques TSI (CE)

. Plugdb-engine, un microcontrôleur sécurisé (type carte à puce) relié à une mémoire FLASH de grande capacité Le moteur du SGBD s'exécute dans le microcontrôleur et les données sont stockées (sous protection cryptographique) en mémoire FLASH. Des modules complémentaires permettent de pré-compiler des requêtes SQL pour les applications, de communiquer avec le SGBD à partir d'un programme Java/Android, et de synchroniser les données locales avec un serveur central. Ce prototype est développé dans le cadre du projet CG78/DMSP. Il a fait l'objet de dépôts successifs à l'Agence pour la Protection de Programmes (APP) depuis 2008, a été démontré dans une douzaine d'événements nationaux et internationaux dont Javaone'09 [D4] (événement industriel important regroupant près de 15000 participants, SIGMOD'10 [CI10], Futur en Seine 2013, 2009.

. Minexp-card, pour ensuite pouvoir ajuster les services offerts (e.g., prêt bancaires, aide sociale) à leur situation spécifique. L'ensemble de ces données doit être réduit à son strict minimum en vue du traitement ultérieur, comme l'impose le principe de collecte limitée inscrit dans les textes internationaux sur la vie privée, mais aussi pour réduire les coûts (traitement des dossiers, archivage, fuites) pour les fournisseurs de services. Nous avons conçu un prototype sur carte à puce basé sur nos travaux de recherche [RI8, CI13, CI12], visant les services d'aide sociale fournis par 2013 ? 2014: Systèmes d'information Privacy-by-Design, modules SIP1&2 ENSIIE 15h, Des formulaires de demande sont souvent utilisés pour collecter des données personnelles sur les postulants, 2013.

. Chapitres-de-livre-[-cl2-]-t, N. Allard, L. Anciaux, P. Bouganim, R. Pucheral et al., Trustworthiness of Pervasive Healthcare Folders. Book chapter of Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and, Information Science Reference, pp.1-24, 2010.

N. Anciaux, L. Bouganim, and P. , A Hardware Approach for Trusted Access and Usage Control. Book chapter of the Handbook of Research on Secure Multimedia Distribution, Information Science Reference, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00333208

R. Internationales, [. Anciaux, L. Bouganim, T. Delot, S. Ilarri et al., Opportunistic data services in least developed countries: benefits, challenges and feasibility issues, SIGMOD Record, vol.43, pp.1-52, 2014.

N. Anciaux, L. Bouganim, P. Pucheral, Y. Guo, and L. L. Folgoc, MiloDB: a Personal, Secure and Portable Database Machine, Distributed and Parallel Databases (DAPD), pp.1-37, 2014.
DOI : 10.1007/s10619-012-7119-x

URL : https://hal.archives-ouvertes.fr/hal-00768355

T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, and R. Thion, Seamless Access to Healthcare Folders with Strong Privacy Guarantees, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00623899

N. Anciaux, L. Bouganim, P. Pucheral, and P. Valduriez, DiSC: Benchmarking Secure Chip DBMS, IEEE Transactions on Knowledge and Data Engineering, vol.20, issue.10, pp.1363-1377, 2008.
DOI : 10.1109/TKDE.2008.67

URL : https://hal.archives-ouvertes.fr/inria-00333219

N. Anciaux, M. Berthelot, L. Braconnier, L. Bouganim, M. De-la-blache et al., A Tamper-Resistant and Portable Healthcare Folder, International Journal of Telemedicine and Applications, vol.61, issue.3-4, 2008.
DOI : 10.1145/362686.362692

N. Anciaux, L. Bouganim, and P. , Future Trends in Secure Chip Data Management, IEEE Data Engineering BulletinIEEE DEB), vol.30, p.3, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00316019

N. Anciaux, L. Bouganim, and P. , Confidentialit?? des Bases de Donn??es : Apports de la Cryptographie et de Composants Mat??riels S??curis??s, annals of telecommunications - annales des t??l??communications, vol.29, issue.2, pp.3-4, 2006.
DOI : 10.1007/BF03219909

R. Nationales, [. Anciaux, B. Nguyen, M. Vazirgiannis, and M. , Exposition minimum de données pour des applications à base de classifieurs, Ingénierie des Systèmes d'Information, pp.59-85, 2013.

T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, and R. Thion, Concilier ubiquité et sécurité des données médicales. Les Cahiers du CRID « Les technologies au service des droits, opportunités, défis, Editor) Bruylant, vol.32, 2010.

N. Anciaux, L. Bouganim, and P. , SGBD embarqu?? dans une puce. Retour d'exp??rience, Techniques et sciences informatiques, vol.27, issue.1-2, pp.1-2, 2008.
DOI : 10.3166/tsi.27.141-179

URL : https://hal.inria.fr/inria-00319144/file/ABP06a.pdf

N. Anciaux, B. Nguyen, and I. S. Popa, Tutorial: Managing Personal Data with Strong Privacy Guarantees, 17th International Conference on Extending Database Technology (EDBT), Tutorial, pp.672-673, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01096633

N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, P. Pucheral et al., Trusted Cells : A Sea Change for Personnal Data Services, 6th Conference on Innovative Database Research (CIDR), 2013.
URL : https://hal.archives-ouvertes.fr/hal-00768379

N. Anciaux, W. Bezza, B. Nguyen, and M. Vazirgiannis, MinExp-card, Proceedings of the 16th International Conference on Extending Database Technology, EDBT '13, pp.753-756, 2013.
DOI : 10.1145/2452376.2452472

URL : https://hal.archives-ouvertes.fr/hal-00937105

N. Anciaux, B. Nguyen, and I. S. Popa, Personal Data Management with Secure Hardware : The advantage of Keeping you Data at Hand, 14th International Conference on Mobile Data Management (MDM), Advanced Seminar, pp.1-2, 2013.

N. Anciaux, D. Boutara, B. Nguyen, and . Vazirgiannis, Limiting Data Exposure in Multi-Label Classification Processes, International Workshop on Privacy-AwaRe Intelligent Systems (PARIS2012), 2012.
URL : https://hal.archives-ouvertes.fr/hal-01176445

N. Anciaux, B. Nguyen, and M. Vazirgiannis, Limiting data collection in application forms: A real-case application of a founding privacy principle, 2012 Tenth Annual International Conference on Privacy, Security and Trust, p.8, 2012.
DOI : 10.1109/PST.2012.6297920

URL : https://hal.archives-ouvertes.fr/hal-00768363

T. Allard, N. Anciaux, L. Bouganim, Y. Guo, L. Le-folgoc et al., Secure personal data servers, 36th International Conference on Very Large Data Bases (VLDB), pp.25-35, 2010.
DOI : 10.14778/1920841.1920850

URL : https://hal.archives-ouvertes.fr/inria-00551875

N. Anciaux, L. Bouganim, Y. Guo, P. Pucheral, J. Vandewalle et al., Pluggable personal data servers, Proceedings of the 2010 international conference on Management of data, SIGMOD '10, 2010.
DOI : 10.1145/1807167.1807328

URL : https://hal.archives-ouvertes.fr/inria-00551836

H. Van-heerde, M. Fokkinga, and N. Anciaux, A Framework to Balance Privacy and Data Usability Using Data Degradation, 2009 International Conference on Computational Science and Engineering, 2009.
DOI : 10.1109/CSE.2009.174

URL : https://hal.archives-ouvertes.fr/hal-00624068

N. Anciaux, L. Bouganim, H. Van-heerde, P. Pucheral, and P. M. Apers, Data degradation, Proceeding of the 17th ACM conference on Information and knowledge mining, CIKM '08, 2008.
DOI : 10.1145/1458082.1458301

URL : https://hal.archives-ouvertes.fr/inria-00321967

N. Anciaux, M. Benzine, L. Bouganim, K. Jacquemin, P. Pucheral et al., Restoring the Patient Control over Her Medical History, 2008 21st IEEE International Symposium on Computer-Based Medical Systems, 2008.
DOI : 10.1109/CBMS.2008.101

URL : https://hal.archives-ouvertes.fr/inria-00325143

N. Anciaux, L. Bouganim, H. Van-heerde, P. Pucheral, and P. M. Apers, InstantDB: Enforcing Timely Degradation of Sensitive Data, 2008 IEEE 24th International Conference on Data Engineering, 2008.
DOI : 10.1109/ICDE.2008.4497560

URL : https://hal.archives-ouvertes.fr/inria-00321967

C. Salperwyck, N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral et al., GhostDB: Hiding Data from Prying Eyes, 33th International Conference on Very Large Data Bases (VLDB), demo. paper, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00321721

N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, and D. Shasha, GhostDB, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, 2007.
DOI : 10.1145/1247480.1247555

URL : https://hal.archives-ouvertes.fr/inria-00321721

H. J. Van-heerde, N. Anciaux, L. Feng, and P. Apers, Balancing Smartness and Privacy for the Ambient Intelligence, First European Conference on Smart Sensing and Context (EuroSSC), Lecture Notes in Computer Science 4272 springer, 2006.
DOI : 10.1007/11907503_26

URL : https://hal.archives-ouvertes.fr/inria-00321682

N. Anciaux, L. Bouganim, and P. , Pucheral: 'Memory Requirements for Query Execution in Highly Constrained Devices, 29th International Conference on Very Large Data Bases (VLDB), 2003.

N. Anciaux, C. Bobineau, L. Bouganim, P. Pucheral, and P. Valduriez, PicoDBMS: Validation and Experience, 27th International Conference on Very Large Data Bases (VLDB), demo. paper, 2001.

. Dissémination-et-vulgarisation-[-d17-]-n, B. Anciaux, and . Nguyen, Limiter la collecte des données personnelles, un problème juridique NP-difficile. Tangente Hors-série n°52, 2014.

N. Anciaux, P. Bonnet, L. Bouganim, and P. , Trusted Cells: Ensuring Privacy to for the Citizens of Smart Cities, ERCIM News, vol.98, 2014.

N. Anciaux, Garantir la confidentialité des données personnelles. Futur en Seine 2014, Répondre aux défis des smart cities, 2014.

N. Anciaux, Une nouvelle approche de la protection de nos données, p.2013

N. Anciaux, Vers un modèle de gestion des données respectueux de la vie privée : application à la collecte limitée d'informations personnelles, Seminaire IREP "BIG DATA, p.2014

N. Anciaux, Gestion de données personelles respetueuse de la vie privée. Presentation et démonstration, Futur en Seine, Archipelle des projets, p.2013

N. Anciaux, B. Nguyen, and M. Vazirgiannis, The Minimum Exposure Project: Limiting Data Collection in Online Forms, ERCIM News, vol.90, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00768369

N. Anciaux, J. M. Petit, P. Pucheral, and K. Zeitouni, Personal Data Server: Keeping Sensitive Data under the Indiviual's Control, ERCIM News, vol.90, 2012.

N. Anciaux, B. Nguyen, and M. Vazirgiannis, Minimum Exposure -A New Approach for Limited Data Collection, Digiteo workshop on Web Mining, 2011.

N. Anciaux, Dossier Médico-Social Portable et Sécurisé Présentation et démonstration, Les Industries du Numérique pour la Santé, RII, in conjunction with the Connectathon, 2010.

. N. Sécurité-des-bases-de-données, D. Anciaux, P. Gross-amblard, R. Pucheral, . Thion et al., [D5] Demonstration of electronic Health Records (eHR) on Java Card? 3.0 Technology, Ecole de Physique de Houches, du 16 au 21 mai 2010 Nicolas Anciaux (Inria) and Jean-Jacques Vandewalle (Gemalto). BOF-4576, CS Advanced Based Devices, JavaOne Conferenceslides) [D4] Demonstration of Electronic Health Records (EHR) on Java Card 3.0 Based Devices. Jean- Jacques Vandewalle, Research Engineer GEMALTO, Nicolas Anciaux, Researcher (Inria), 2009.

. N. Participation-À-la-smart-university, L. Anciaux, and . Bouganim, Data Management in Embedded Smart Devices. Tutorial donné à la Smart University, co-organisée avec la 7ème édition de la conférence internationale e-smart, 2006.