Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), p.168, 2000. ,
DOI : 10.1109/ACSAC.2000.898870
Eight friends are enough, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.13-18, 2009. ,
DOI : 10.1145/1578002.1578005
Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, vol.13, issue.1, pp.210-230, 2007. ,
DOI : 10.1111/j.1083-6101.2007.00393.x
TAO: Facebook's Distributed Data Store for the Social Graph, USENIX ATC 13, pp.49-60, 2013. ,
Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, pp.1-638, 2009. ,
DOI : 10.1145/1609956.1609962
Delegation in role-based access control, International Journal of Information Security, vol.32, issue.3, pp.123-136, 2008. ,
DOI : 10.1109/2.485845
URL : http://www.isg.rhul.ac.uk/~jason/Pubs/esorics06.pdf
Unicorn, Proceedings of the VLDB Endowment, vol.6, issue.11, pp.1150-1161, 2013. ,
DOI : 10.14778/2536222.2536239
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems, 2011 IEEE Symposium on Security and Privacy, pp.263-278, 2011. ,
DOI : 10.1109/SP.2011.16
A Privacy Preservation Model for Facebook-Style Social Network Systems, ESORICS'09, pp.303-320, 2009. ,
DOI : 10.1145/1609956.1609962
URL : http://www.cpsc.ucalgary.ca/~pwlfong/Pub/esorics2009.pdf
Protection, Proceedings of the November 16-18, 1971, fall joint computer conference on, AFIPS '71 (Fall), pp.417-429, 1972. ,
DOI : 10.1145/1478873.1478928
All friends are not equal: Using weights in social graphs to improve search, p.4, 2010. ,
Project 'Gaydar' Computes Orientation, CACM 15. Levy, H.M.: Capability-Based Computer Systems, 1984. ,
DOI : 10.5210/fm.v14i10.2611
On safety in discretionary access control, 2005 IEEE Symposium on Security and Privacy (S P'05, pp.96-109, 2005. ,
The Princeton Web Transparency and Accountability Project. Transparent data mining for Big and Small Data, 2017. ,
DOI : 10.1007/978-3-319-54024-5_3
Dynamic Labelling to Enforce Conformance of Cross Domain Security/Privacy Policies, pp.183-195, 2017. ,
Privacy as a currency, Tech. rep., ISRDC, IIT Bombay, 2017. ,
DOI : 10.5220/0006478705860595
Social networks and collective unravelling of privacy, Tech. rep., ISRDC, IIT Bombay, 2017. ,
Privacy: Aspects, definitions and a multi-faceted privacy preservation approach Information Security for South Africa, pp.2010-2011, 2010. ,
DOI : 10.1109/issa.2010.5588297
Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993. ,
DOI : 10.1109/2.241422
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382