D. Alhadidi, N. Mohammed, B. C. Fung, and M. Debbabi, Secure Distributed Framework for Achieving ??-Differential Privacy, Privacy Enhancing Technologies, pp.120-139, 2012.
DOI : 10.1007/978-3-642-31680-7_7

L. Backstrom, C. Dwork, and J. Kleinberg, Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th international conference on World Wide Web, pp.181-190, 2007.

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona, ACM SIGCOMM Computer Communication Review, vol.39, issue.4, pp.135-146, 2009.
DOI : 10.1145/1594977.1592585

B. Carminati, E. Ferrari, and A. Perego, Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, p.6, 2009.
DOI : 10.1145/1609956.1609962

C. Dwork, A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-95, 2011.
DOI : 10.1145/1866739.1866758

S. Kosta, V. C. Perta, J. Stefa, P. Hui, and A. Mei, Clone2clone (c2c): Peer-to-peer networking of smartphones on the cloud, 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud13), 2013.

C. Li, M. Hay, V. Rastogi, G. Miklau, and A. Mcgregor, Optimizing linear counting queries under differential privacy, Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems of data, PODS '10, pp.123-134, 2010.
DOI : 10.1145/1807085.1807104

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. Nguyen, D. Chae, J. Kim, and J. Kim, Meshcloak: A map-based location privacy model for continuous query in mobile services

H. Nguyen and J. Kim, A comparison of differentially private linear counting queries

T. Tassa and D. J. Cohen, Anonymization of centralized and distributed social networks by sequential clustering. Knowledge and Data Engineering, IEEE Transactions on, vol.25, issue.2, pp.311-324, 2013.

X. Wu, X. Ying, K. Liu, and L. Chen, A Survey of Privacy-Preservation of Graphs and Social Networks, Managing and mining graph data, pp.421-453, 2010.
DOI : 10.1007/978-1-4419-6045-0_14

X. Ying and X. Wu, On Randomness Measures for Social Networks, SDM, pp.709-720, 2009.
DOI : 10.1137/1.9781611972795.61

B. Zhou and J. Pei, Preserving Privacy in Social Networks Against Neighborhood Attacks, 2008 IEEE 24th International Conference on Data Engineering, pp.506-515, 2008.
DOI : 10.1109/ICDE.2008.4497459