E. Barka and R. Sandhu, Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), p.168, 2000.
DOI : 10.1109/ACSAC.2000.898870

J. Bonneau, Eight friends are enough, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.13-18, 2009.
DOI : 10.1145/1578002.1578005

D. M. Boyd and N. B. Ellison, Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, vol.13, issue.1, pp.210-230, 2007.
DOI : 10.1111/j.1083-6101.2007.00393.x

N. Bronson and Z. Amsden, TAO: Facebook's Distributed Data Store for the Social Graph, USENIX ATC 13, pp.49-60, 2013.

B. Carminati, E. Ferrari, and A. Perego, Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, pp.1-638, 2009.
DOI : 10.1145/1609956.1609962

J. Crampton and H. Khambhammettu, Delegation in role-based access control, International Journal of Information Security, vol.32, issue.3, pp.123-136, 2008.
DOI : 10.1109/2.485845

URL : http://www.isg.rhul.ac.uk/~jason/Pubs/esorics06.pdf

M. Curtiss, I. Becker, and T. Bosman, Unicorn, Proceedings of the VLDB Endowment, vol.6, issue.11, pp.1150-1161, 2013.
DOI : 10.14778/2536222.2536239

P. W. Fong, Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems, 2011 IEEE Symposium on Security and Privacy, pp.263-278, 2011.
DOI : 10.1109/SP.2011.16

P. W. Fong, M. Anwar, and Z. Zhao, A Privacy Preservation Model for Facebook-Style Social Network Systems, ESORICS'09, pp.303-320, 2009.
DOI : 10.1145/1609956.1609962

URL : http://www.cpsc.ucalgary.ca/~pwlfong/Pub/esorics2009.pdf

G. S. Graham and P. J. Denning, Protection, Proceedings of the November 16-18, 1971, fall joint computer conference on, AFIPS '71 (Fall), pp.417-429, 1972.
DOI : 10.1145/1478873.1478928

S. Hangal, D. Maclean, M. S. Lam, and J. Heer, All friends are not equal: Using weights in social graphs to improve search, p.4, 2010.

C. Jernigan and B. Mistree, Project 'Gaydar' Computes Orientation, CACM 15. Levy, H.M.: Capability-Based Computer Systems, 1984.
DOI : 10.5210/fm.v14i10.2611

N. Li and M. V. Tripunitara, On safety in discretionary access control, 2005 IEEE Symposium on Security and Privacy (S P'05, pp.96-109, 2005.

A. Narayanan and D. Reisman, The Princeton Web Transparency and Accountability Project. Transparent data mining for Big and Small Data, 2017.
DOI : 10.1007/978-3-319-54024-5_3

N. Kumar, N. V. Shyamasundar, and R. K. , Dynamic Labelling to Enforce Conformance of Cross Domain Security/Privacy Policies, pp.183-195, 2017.

V. T. Patil and R. K. Shyamasundar, Privacy as a currency, Tech. rep., ISRDC, IIT Bombay, 2017.
DOI : 10.5220/0006478705860595

V. T. Patil and R. K. Shyamasundar, Social networks and collective unravelling of privacy, Tech. rep., ISRDC, IIT Bombay, 2017.

K. Renaud, G. , and D. , Privacy: Aspects, definitions and a multi-faceted privacy preservation approach Information Security for South Africa, pp.2010-2011, 2010.
DOI : 10.1109/issa.2010.5588297

R. S. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993.
DOI : 10.1109/2.241422

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382