1. Eric C. T urner, Subhasish Dasgupt a: P rivacy on t he Web: an Examination of User Concerns, Technology, and Implications for Business Organizat ions and Individuals. IS Management (ISM) 20(1):8 -18 (2003)
2. Davis, J., P rot ect ing P rivacy in t he Cyber Era , IEEE T echnology and Societ y Magazine, Summer 2000, pp. 10 –22
3. Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong. Analysis of T opological Charact erist ics of Huge Online Social Net working Services. In P roceedings of t he 16th international conference on World Wide Web (WWW’07), Banff, Canada, May 2007.
4. Davida GI, Wells DL, Kam JB (1981) A Database Encryption Syst em wit h subkeys. ACM T rans. Dat abase Syst . 6, 312 -328.
5. Buehrer D, Chang C (1991) A crypt ographic mechanism for sharing dat abases. T he Int ernat ional Conference on Informat ion & Syst ems. Hangzhou, China, pp. 1039 -1045.