R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona: an online social network with user-defined privacy, pp.135-146, 2009.

D. Buszko, W. H. Lee, and A. Helal, Decentralized ad-hoc groupware API and framework for mobile collaboration, Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work , GROUP '01, pp.5-14, 2001.
DOI : 10.1145/500286.500291

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5237

L. A. Cutillo, R. Molva, and T. Strufe, Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, pp.94-101, 2009.
DOI : 10.1109/MCOM.2009.5350374

URL : https://hal.archives-ouvertes.fr/hal-00687143

A. El-saddik, A. S. Rahman, S. Abdala, and B. Solomon, PECOLE: P2P multimedia collaborative environment, Multimedia Tools and Applications, vol.2, issue.3, pp.353-377, 2008.
DOI : 10.1007/s11042-007-0165-0

A. Famulari and A. Hecker, Mantle: A Novel DOSN Leveraging Free Storage and Local Software, Lecture Notes in Computer Science, vol.7593, pp.213-224, 2012.
DOI : 10.1007/978-3-642-38227-7_24

M. Freitas, twister -a P2P microblogging platform, p.7152, 2013.
DOI : 10.1080/17445760.2015.1053808

H. Gilbert and H. Handschuh, Security Analysis of SHA-256 and Sisters, Lecture Notes in Computer Science, vol.3006, pp.175-193, 2003.
DOI : 10.1007/978-3-540-24654-1_13

B. Greschbach, G. Kreitz, and S. Buchegger, The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.333-339, 2012.
DOI : 10.1109/PerComW.2012.6197506

B. Greschbach, G. Kreitz, and S. Buchegger, User Search with Knowledge Thresholds in Decentralized Online Social Networks, Privacy and Identity Management. IFIP Advances in ICT, pp.188-202, 2013.
DOI : 10.1007/978-3-642-55137-6_15

URL : https://hal.archives-ouvertes.fr/hal-01276071

P. Johnson-lenz and T. Johnson-lenz, Groupware, ACM SIGGROUP Bulletin, vol.19, issue.2, p.34, 1998.
DOI : 10.1145/290575.290585

M. K. Kim and H. C. Kim, Awareness and Privacy in Groupware Systems, 2006 10th International Conference on Computer Supported Cooperative Work in Design, pp.984-988, 2006.
DOI : 10.1109/CSCWD.2006.253165

W. D. Li, S. K. Ong, J. Y. Fuh, Y. S. Wong, Y. Q. Lu et al., Feature-based design in a distributed and collaborative environment, Computer-Aided Design, vol.36, issue.9, pp.775-797, 2004.
DOI : 10.1016/j.cad.2003.09.005

I. Lunden, Facebook turns off facial recognition in the EU, gets the all-clear on several points from Ireland's data protection commissioner on its review facebook-turns-off-facial-recognition-in-the-eu-gets-the-all-clear, Online, vol.21, 2012.

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2009.

W. Reinhard, J. Schweitzer, G. Völksen, and M. Weber, CSCW tools: concepts and architectures, Computer, vol.27, issue.5, pp.28-36, 1994.
DOI : 10.1109/2.291293

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.55.9758

T. Rodden and G. S. Blair, CSCW and Distributed Systems: The Problem of Control, 1991.
DOI : 10.1007/978-94-011-3506-1_4

A. I. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Lecture Notes in Computer Science, vol.2218, pp.329-350, 2001.
DOI : 10.1007/3-540-45518-3_18

G. Shih, Facebook admits year-long data breach exposed 6 million users, Online, 2013.

C. Smith, Reinventing social media: Deep learning, predictive marketing, and image recognition will change everything, 2014.

J. Trevor, T. Koch, and G. Woetzel, MetaWeb: Bringing synchronous groupware to the World Wide Web, pp.65-80, 1997.
DOI : 10.1007/978-94-015-7372-6_5

G. Zhang and Q. Jin, Scalable information sharing utilizing decentralized P2P networking integrated with centralized personal and group media tools, 20th International Conference on Advanced Information Networking and Applications, Volume 1 (AINA'06), pp.707-711, 2006.
DOI : 10.1109/AINA.2006.293

M. E. Zurko, IBM Lotus Notes/Domino: Embedding Security in Collaborative Applications , chap. 30, pp.607-622, 2005.