Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.61-70, 2011.
DOI : 10.1145/2068816.2068823

H. R. Lipford, A. Besmer, and J. Watson, Understanding privacy settings in facebook with an audience view, Proceedings of the 1st Conference on Usability, Psychology, and Security, pp.1-8, 2008.

A. Acquisti and R. Gross, Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook, Privacy Enhancing Technologies, pp.36-58, 2006.
DOI : 10.1007/11957454_3

N. Awad and M. Krishnan, The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization, MIS quarterly, pp.13-28, 2006.

M. Madejski, M. Johnson, and S. Bellovin, A study of privacy settings errors in an online social network, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.340-345, 2012.
DOI : 10.1109/PerComW.2012.6197507

M. Johnson, S. Egelman, and S. M. Bellovin, Facebook and privacy, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-15, 2012.
DOI : 10.1145/2335356.2335369

A. Besmer and H. Richter-lipford, Moving beyond untagging, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1563-1572, 2010.
DOI : 10.1145/1753326.1753560

J. Grimmelmann, Saving facebook, Iowa Law Review, vol.94, pp.1137-1206, 2009.

C. Zhang, J. Sun, X. Zhu, and Y. Fang, Privacy and security for online social networks: challenges and opportunities, IEEE Network, vol.24, issue.4, pp.13-18, 2010.
DOI : 10.1109/MNET.2010.5510913

B. Viswanath, E. Kiciman, and S. Saroiu, Keeping information safe from social networking apps, Proceedings of the 2012 ACM workshop on Workshop on online social networks, WOSN '12, pp.49-54, 2012.
DOI : 10.1145/2342549.2342561

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.6072

P. Brey, Ethical Aspects of Information Security and Privacy, Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, pp.21-36, 2007.
DOI : 10.1007/978-3-540-69861-6_3

E. Zheleva, E. Terzi, and L. Getoor, Privacy in Social Networks, Synthesis Lectures on Data Mining and Knowledge Discovery, vol.3, issue.1, pp.1-85, 2012.
DOI : 10.2200/S00408ED1V01Y201203DMK004

A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, pp.0-34, 2010.

S. Wasserman and K. Faust, Social Network Analysis: Methods and Applications, 1994.
DOI : 10.1017/CBO9780511815478

L. Getoor and C. P. Diehl, Link mining, ACM SIGKDD Explorations Newsletter, vol.7, issue.2, pp.3-12, 2005.
DOI : 10.1145/1117454.1117456

A. Broder, R. Kumar, F. Maghoul, P. Raghavan, S. Rajagopalan et al., Graph structure in the Web, Computer Networks, vol.33, issue.1-6, pp.309-320, 2000.
DOI : 10.1016/S1389-1286(00)00083-9

B. Wellman, Computer Networks As Social Networks, Science, vol.293, issue.5537, pp.2031-2034, 2001.
DOI : 10.1126/science.1065547

T. Ito, T. Chiba, R. Ozawa, M. Yoshida, M. Hattori et al., A comprehensive two-hybrid analysis to explore the yeast protein interactome, Proceedings of the National Academy of Sciences, vol.98, issue.8, pp.4569-4574, 2001.
DOI : 10.1073/pnas.061034498

M. Gomez-rodriguez, J. Leskovec, and A. Krause, Inferring networks of diffusion and influence, ACM Transactions on Knowledge Discovery from Data, vol.5, issue.4, 2012.

L. Adamic, O. Buyukkokten, and E. Adar, A social network caught in the Web, First Monday, vol.8, issue.6, 2003.
DOI : 10.5210/fm.v8i6.1057

C. Wilson, A. Sala, K. P. Puttaswamy, and B. Y. Zhao, Beyond Social Graphs, ACM Transactions on the Web, vol.6, issue.4, pp.1-1731, 2012.
DOI : 10.1145/2382616.2382620

K. Faust, Centrality in affiliation networks, Social Networks, vol.19, issue.2, pp.157-191, 1997.
DOI : 10.1016/S0378-8733(96)00300-0

S. Borgatti, A. Mehra, D. Brass, and G. Labianca, Network Analysis in the Social Sciences, Science, vol.323, issue.5916, pp.892-895, 2009.
DOI : 10.1126/science.1165821

Y. Matsuo, J. Mori, M. Hamasaki, T. Nishimura, H. Takeda et al., POLYPHONET, Proceedings of the 15th international conference on World Wide Web , WWW '06, pp.262-278, 2007.
DOI : 10.1145/1135777.1135837

E. Gilbert, Predicting tie strength in a new medium, Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, CSCW '12, pp.1047-1056, 2012.
DOI : 10.1145/2145204.2145360

C. Haythornthwaite, Social network analysis: An approach and technique for the study of information exchange, Library & Information Science Research, vol.18, issue.4, pp.323-342, 1996.
DOI : 10.1016/S0740-8188(96)90003-1

K. Musial and P. Kazienko, Social networks on the Internet, World Wide Web, vol.22, issue.1, pp.31-72, 2013.
DOI : 10.1007/s11280-011-0155-z

M. S. Granovetter, The Strength of Weak Ties, American Journal of Sociology, vol.78, issue.6, pp.1360-1380, 1973.
DOI : 10.1086/225469

C. Haythornthwaite, Social networks and Internet connectivity effects, Information, Communication & Society, vol.1, issue.2, pp.125-147, 2005.
DOI : 10.1287/orsc.10.1.83

B. Wellman and S. Wortley, Different Strokes from Different Folks: Community Ties and Social Support, American Journal of Sociology, vol.96, issue.3, pp.558-588, 1990.
DOI : 10.1086/229572

H. Bernard, E. Johnsen, P. Killworth, C. Mccarty, G. Shelley et al., Comparing four different methods for measuring personal social networks, Social Networks, vol.12, issue.3, pp.179-215, 1990.
DOI : 10.1016/0378-8733(90)90005-T

P. Killworth, E. Johnsen, H. Bernard, A. Shelley, G. Mccarty et al., Estimating the size of personal networks, Social Networks, vol.12, issue.4, pp.289-312, 1990.
DOI : 10.1016/0378-8733(90)90012-X

C. Steinfield, N. Ellison, and C. Lampe, Social capital, self-esteem, and use of online social network sites: A longitudinal analysis, Journal of Applied Developmental Psychology, vol.29, issue.6, pp.434-445, 2008.
DOI : 10.1016/j.appdev.2008.07.002

J. Heidemann, M. Klier, and F. Probst, Online social networks: A survey of a global phenomenon, Computer Networks, vol.56, issue.18, pp.3866-3878, 2012.
DOI : 10.1016/j.comnet.2012.08.009

W. Hua and B. Wellman, Social connectivity in america: Changes in adult friendship network size from, American Behavioral Scientist, vol.53, issue.8, pp.1148-1169, 2002.

R. I. Dunbar, Social cognition on the Internet: testing constraints on social network size, Philosophical Transactions of the Royal Society B: Biological Sciences, vol.45, issue.8, pp.2192-2201, 1599.
DOI : 10.1371/journal.pone.0022656

K. Subrahmanyam, S. Reich, N. Waechter, and G. Espinoza, Online and offline social networks: Use of social networking sites by emerging adults, Journal of Applied Developmental Psychology, vol.29, issue.6, pp.420-433, 2008.
DOI : 10.1016/j.appdev.2008.07.003

T. Correa, A. Hinsley, and H. De-zúñiga, Who interacts on the Web?: The intersection of users??? personality and social media use, Computers in Human Behavior, vol.26, issue.2, pp.247-253, 2010.
DOI : 10.1016/j.chb.2009.09.003

A. N. Joinson, Looking at, looking up or keeping up with people?, Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems , CHI '08, pp.1027-1036, 2008.
DOI : 10.1145/1357054.1357213

Z. Papacharissi and A. Mendelson, Toward a new (er) sociability: uses, gratifications and social capital on facebook. Media perspectives for the 21st century, pp.212-230, 2011.

T. Ryan and S. Xenos, Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage, Computers in Human Behavior, vol.27, issue.5, pp.1658-1664, 2011.
DOI : 10.1016/j.chb.2011.02.004

B. Gentile, J. Twenge, E. Freeman, and W. Campbell, The effect of social networking websites on positive self-views: An experimental investigation, Computers in Human Behavior, vol.28, issue.5, pp.1929-1933, 2012.
DOI : 10.1016/j.chb.2012.05.012

A. Nosko, E. Wood, and S. Molema, All about me: Disclosure in online social networking profiles: The case of FACEBOOK, Computers in Human Behavior, vol.26, issue.3, pp.406-418, 2010.
DOI : 10.1016/j.chb.2009.11.012

H. Krasnova, S. Spiekermann, K. Koroleva, and T. Hildebrand, Online social networks: why we disclose, Journal of Information Technology, vol.2, issue.4, pp.109-125, 2010.
DOI : 10.1111/j.1468-2958.1976.tb00494.x

C. Ross, E. Orr, M. Sisic, J. Arseneault, M. Simmering et al., Personality and motivations associated with Facebook use, Computers in Human Behavior, vol.25, issue.2, pp.578-586, 2009.
DOI : 10.1016/j.chb.2008.12.024

M. R. Morris, J. Teevan, and K. Panovich, What do people ask their social networks, and why?, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1739-1748, 2010.
DOI : 10.1145/1753326.1753587

K. Y. Lin and H. P. Lu, Why people use social networking sites: An empirical study integrating network externalities and motivation theory, Computers in Human Behavior, vol.27, issue.3, pp.1152-1161, 2011.
DOI : 10.1016/j.chb.2010.12.009

A. Nosko, E. Wood, M. Kenney, K. Archer, D. De-pasquale et al., Examining priming and gender as a means to reduce risk in a social networking context: Can stories change disclosure and privacy setting use when personal profiles are constructed?, Computers in Human Behavior, vol.28, issue.6, pp.2067-2074, 2012.
DOI : 10.1016/j.chb.2012.06.010

D. Sledgianowski and S. Kulviwat, Using social network sites: The effects of playfulness , critical mass and trust in a hedonic context, Journal of Computer Information Systems, vol.49, issue.4, pp.74-83, 2009.

T. Pempek, Y. Yermolayeva, and S. Calvert, College students' social networking experiences on Facebook, Journal of Applied Developmental Psychology, vol.30, issue.3, pp.227-238, 2009.
DOI : 10.1016/j.appdev.2008.12.010

O. Kwon and Y. Wen, An empirical study of the factors affecting social network service use, Computers in Human Behavior, vol.26, issue.2, pp.254-263, 2010.
DOI : 10.1016/j.chb.2009.04.011

L. Adamic and E. Adar, How to search a social network, Social Networks, vol.27, issue.3, pp.187-203, 2005.
DOI : 10.1016/j.socnet.2005.01.007

D. Boyd and N. Ellison, Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, vol.3, issue.1, pp.210-230, 2007.
DOI : 10.1111/j.1083-6101.2007.00393.x

F. Schneider, A. Feldmann, B. Krishnamurthy, and W. Willinger, Understanding online social network usage from a network perspective, Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, pp.35-48, 2009.
DOI : 10.1145/1644893.1644899

E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic, The role of social networks in information diffusion, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.519-528, 2012.
DOI : 10.1145/2187836.2187907

N. Ellison, C. Steinfield, and C. Lampe, The Benefits of Facebook ???Friends:??? Social Capital and College Students??? Use of Online Social Network Sites, Journal of Computer-Mediated Communication, vol.22, issue.3, pp.1143-1168, 2007.
DOI : 10.1111/j.1083-6101.2007.00367.x

E. Raad, R. Chbeir, and A. Dipanda, User Profile Matching in Social Networks, 2010 13th International Conference on Network-Based Information Systems, pp.297-304, 2010.
DOI : 10.1109/NBiS.2010.35

URL : https://hal.archives-ouvertes.fr/hal-00643509

M. Thelwall, Social networks, gender, and friending: An analysis of MySpace member profiles, Journal of the American Society for Information Science and Technology, vol.9, issue.8, pp.1321-1330, 2008.
DOI : 10.1002/asi.20835

F. Abel, N. Henze, E. Herder, and D. Krause, Interweaving Public User Profiles on the Web, Lecture Notes in Computer Science, vol.6075, pp.16-27, 2010.
DOI : 10.1007/978-3-642-13470-8_4

M. Graves, A. Constabaris, and D. Brickley, FOAF: Connecting People on the Semantic Web, Cataloging & Classification Quarterly, vol.43, issue.3-4, pp.3-4, 2007.
DOI : 10.1504/IJMSO.2006.008770

J. Cranshaw, E. Toch, J. Hong, A. Kittur, and N. Sadeh, Bridging the gap between physical location and online social networks, Proceedings of the 12th ACM international conference on Ubiquitous computing, Ubicomp '10, pp.119-128, 2010.
DOI : 10.1145/1864349.1864380

E. Raad, R. Chbeir, and A. Dipanda, Discovering relationship types between users using profiles and shared photos in a social network, Multimedia Tools and Applications, vol.19, issue.2, pp.141-170, 2013.
DOI : 10.1007/s11042-011-0853-7

URL : https://hal.archives-ouvertes.fr/hal-01091671

L. Tang and H. Liu, Scalable learning of collective behavior based on sparse social dimensions, Proceeding of the 18th ACM conference on Information and knowledge management, CIKM '09, pp.1107-1116, 2009.
DOI : 10.1145/1645953.1646094

J. Mcauley and J. Leskovec, Learning to discover social circles in ego networks, Advances in Neural Information Processing Systems, pp.548-556, 2012.

N. Ellison, C. Steinfield, and C. Lampe, Connection strategies: Social capital implications of Facebook-enabled communication practices, New Media & Society, vol.11, issue.4, pp.873-892, 2011.
DOI : 10.1177/1461444810385389

M. Newman, The Structure and Function of Complex Networks, SIAM Review, vol.45, issue.2, pp.167-256, 2003.
DOI : 10.1137/S003614450342480

S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D. U. Hwang, Complex networks: Structure and dynamics, Physics Reports, vol.424, issue.4-5, pp.4-5, 2006.
DOI : 10.1016/j.physrep.2005.10.009

S. Fortunato, Community detection in graphs, Physics Reports, vol.486, issue.3-5, pp.75-174, 2010.
DOI : 10.1016/j.physrep.2009.11.002

S. Brams, H. Mutlu, and S. Ramirez, Influence in Terrorist Networks: From Undirected to Directed Graphs, Studies in Conflict & Terrorism, vol.24, issue.3, pp.703-718, 2006.
DOI : 10.1080/10576100600701982

C. Morselli, C. Giguère, and K. Petit, The efficiency/security trade-off in criminal networks, Social Networks, vol.29, issue.1, pp.143-153, 2007.
DOI : 10.1016/j.socnet.2006.05.001

G. Bachi, M. Coscia, A. Monreale, and F. Giannotti, Classifying Trust/Distrust Relationships in Online Social Networks, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp.552-557
DOI : 10.1109/SocialCom-PASSAT.2012.115

T. Zhang, H. Chao, and D. Tretter, Dynamic Estimation of Family Relations from Photos, Lecture Notes in Computer Science, vol.1, pp.65-76, 2011.
DOI : 10.2197/ipsjtcva.1.115

B. Carminati, E. Ferrari, and A. Perego, Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, 2009.
DOI : 10.1145/1609956.1609962

R. Xiang, J. Neville, and M. Rogati, Modeling relationship strength in online social networks, Proceedings of the 19th international conference on World wide web, WWW '10, pp.981-990, 2010.
DOI : 10.1145/1772690.1772790

F. Stutzman and J. Kramer-duffield, Friends only, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1553-1562, 2010.
DOI : 10.1145/1753326.1753559

T. Kogov?ek, A. Ferligoj, G. Coenders, and W. Saris, Estimating the reliability and validity of personal support measures: full information ML estimation with planned incomplete data, Social Networks, vol.24, issue.1, pp.1-20, 2002.
DOI : 10.1016/S0378-8733(01)00047-8

R. Groves, Survey errors and survey costs, 2004.
DOI : 10.1002/0471725277

S. Gonzalez-bailon, Opening the black box of link formation: Social factors underlying the structure of the web, Social Networks, vol.31, issue.4, pp.271-280, 2009.
DOI : 10.1016/j.socnet.2009.07.003

J. Tyler, D. Wilkinson, and B. Huberman, E-Mail as Spectroscopy: Automated Discovery of Community Structure within Organizations, The Information Society, vol.64, issue.2, pp.133-141, 2005.
DOI : 10.1073/pnas.0307740100

H. Kautz, B. Selman, and M. Shah, Referral Web: combining social networks and collaborative filtering, Communications of the ACM, vol.40, issue.3, pp.63-65, 1997.
DOI : 10.1145/245108.245123

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.838

P. Mika, Flink: Semantic Web technology for the extraction and analysis of social networks, Web Semantics: Science, Services and Agents on the World Wide Web, vol.3, issue.2-3, pp.211-223, 2005.
DOI : 10.1016/j.websem.2005.05.006

A. Marin and B. Wellman, Social Network Analysis: An Introduction, Handbook of Social Network Analysis, vol.22, pp.11-25, 2010.
DOI : 10.4135/9781446294413.n2

H. Kwak, C. Lee, H. Park, and S. Moon, What is Twitter, a social network or a news media?, Proceedings of the 19th international conference on World wide web, WWW '10, pp.591-600, 2010.
DOI : 10.1145/1772690.1772751

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.6476

P. Kazienko, K. Musial, and T. Kajdanowicz, Multidimensional social network in the social recommender system. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, vol.41, issue.4, pp.746-759, 2011.

S. Catanese, P. Meo, E. Ferrara, G. Fiumara, and A. Provetti, Extraction and Analysis of Facebook Friendship Relations, Computational Social Networks, pp.291-324, 2012.
DOI : 10.1007/978-1-4471-4054-2_12

B. Schneier, A Taxonomy of Social Networking Data, IEEE Security & Privacy Magazine, vol.8, issue.4, p.88, 2010.
DOI : 10.1109/MSP.2010.118

J. Diesner, T. Frantz, and K. Carley, Communication Networks from the Enron Email Corpus ???It's Always About the People. Enron is no Different???, Computational and Mathematical Organization Theory, vol.64, issue.3, pp.201-228, 2005.
DOI : 10.1007/s10588-005-5377-0

K. Liu and E. Terzi, Towards identity anonymization on graphs, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, pp.93-106, 2008.
DOI : 10.1145/1376616.1376629

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009.
DOI : 10.1109/SP.2009.22

URL : http://arxiv.org/abs/0903.3276

M. Hay, G. Miklau, D. Jensen, D. Towsley, and C. Li, Resisting structural re-identification in anonymized social networks, The VLDB Journal, vol.2, issue.1, pp.797-823, 2010.
DOI : 10.1007/s00778-010-0210-x

R. Agrawal and R. Srikant, Privacy-preserving data mining, SIGMOD Record (ACM Special Interest Group on Management of Data), vol.29, issue.2, pp.439-450, 2000.

V. Verykios, E. Bertino, I. Fovino, L. Provenza, Y. Saygin et al., State-of-the-art in privacy preserving data mining, ACM SIGMOD Record, vol.33, issue.1, pp.50-57, 2004.
DOI : 10.1145/974121.974131

B. Zhou and J. Pei, The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, Knowledge and Information Systems, vol.2, issue.1, pp.47-77, 2011.
DOI : 10.1007/s10115-010-0311-2

N. Li, N. Zhang, and S. K. Das, Relationship Privacy Preservation in Publishing Online Social Networks, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, pp.443-450
DOI : 10.1109/PASSAT/SocialCom.2011.191

P. W. Fong and I. Siahaan, Relationship-based access control policies and their policy languages, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.51-60, 2011.
DOI : 10.1145/1998441.1998450

G. P. Cheek and M. Shehab, Policy-by-example for online social networks, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.23-32, 2012.
DOI : 10.1145/2295136.2295142

N. Li and G. Chen, Sharing location in online social networks, IEEE Network, vol.24, issue.5, pp.20-25, 2010.
DOI : 10.1109/MNET.2010.5578914

L. Backstrom, E. Sun, and C. Marlow, Find me if you can, Proceedings of the 19th international conference on World wide web, WWW '10, pp.61-70, 2010.
DOI : 10.1145/1772690.1772698

S. Cunningham, M. Masoodian, and A. Adams, Privacy Issues for Online Personal Photograph Collections, Journal of theoretical and applied electronic commerce research, vol.5, issue.2, pp.26-40, 2010.
DOI : 10.4067/S0718-18762010000200003

K. Frikken, M. Atallah, and J. Li, Attribute-Based Access Control with Hidden Policies and Hidden Credentials, IEEE Transactions on Computers, vol.55, issue.10, pp.1259-1270, 2006.
DOI : 10.1109/TC.2006.158

B. Bouna, R. Chbeir, and S. Marrara, Enforcing role based access control model with multimedia signatures, Journal of Systems Architecture, vol.55, issue.4, pp.264-274, 2009.
DOI : 10.1016/j.sysarc.2008.10.003

URL : https://hal.archives-ouvertes.fr/hal-01094095

H. Peng, J. Gu, and X. Ye, Dynamic Purpose-Based Access Control, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp.695-700, 2008.
DOI : 10.1109/ISPA.2008.80

W. Willinger, R. Rejaie, M. Torkjazi, M. Valafar, and M. Maggioni, Research on online social networks, ACM SIGMETRICS Performance Evaluation Review, vol.37, issue.3, pp.49-54, 2010.
DOI : 10.1145/1710115.1710125

B. Wellman, The School Child???s Choice of Companions, The Journal of Educational Research, vol.14, issue.2, pp.126-132, 1926.
DOI : 10.1080/00220671.1926.10879675

H. Bott, Observation of play activities in a nursery school, Genetic Psychology Monographs, vol.4, issue.1, pp.44-88, 1928.

J. Moreno, Who shall survive?, 1934.

B. Wellman, Network Analysis: Some Basic Principles, Sociological Theory, vol.1, issue.1, pp.155-200, 1983.
DOI : 10.2307/202050

J. A. Barnes, Class and Committees in a Norwegian Island Parish, Human Relations, vol.7, issue.1, pp.39-58, 1954.
DOI : 10.1177/001872675400700102

D. Luke and J. Harris, Network Analysis in Public Health: History, Methods, and Applications, Annual Review of Public Health, vol.28, issue.1, pp.69-93, 2007.
DOI : 10.1146/annurev.publhealth.28.021406.144132

D. Watts, The ???New??? Science of Networks, Annual Review of Sociology, vol.30, issue.1, pp.243-270, 2004.
DOI : 10.1146/annurev.soc.30.020404.104342

A. L. Barabási and E. Bonabeau, Scale-Free Networks, Scientific American, vol.288, issue.5, pp.60-69, 2003.
DOI : 10.1038/scientificamerican0503-60

R. Christley, G. Pinchbeck, R. Bowers, D. Clancy, N. French et al., Infection in Social Networks: Using Network Analysis to Identify High-Risk Individuals, American Journal of Epidemiology, vol.162, issue.10, pp.1024-1031, 2005.
DOI : 10.1093/aje/kwi308

A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, Measurement and analysis of online social networks, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.29-42, 2007.
DOI : 10.1145/1298306.1298311

D. Koschützki, K. Lehmann, L. Peeters, S. Richter, D. Tenfelde-podehl et al., Centrality Indices, Network Analysis . Lecture Notes in Computer Science, vol.3418, pp.16-61, 2005.
DOI : 10.1007/978-3-540-31955-9_3

L. Freeman, Centrality in social networks conceptual clarification, Social Networks, vol.1, issue.3, pp.215-239, 1978.
DOI : 10.1016/0378-8733(78)90021-7

X. He, J. Vaidya, B. Shafiq, N. Adam, and V. Atluri, Preserving privacy in social networks: A structure-aware approach. In: Web Intelligence and Intelligent Agent Technologies, pp.647-654, 2009.

A. Campan and T. Truta, Data and Structural k-Anonymity in Social Networks, Privacy, Security, and Trust in KDD, pp.33-54, 2009.
DOI : 10.1136/sti.2006.023598

L. Backstrom, C. Dwork, and J. Kleinberg, Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th international conference on World Wide Web. WWW '07, pp.181-190, 2007.

M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava, Anonymizing social networks, 2007.

A. Korolova, R. Motwani, S. U. Nabar, and Y. Xu, Link privacy in social networks, Proceedings of the 17th ACM conference on Information and knowledge management . CIKM '08, pp.289-298, 2008.

E. Zheleva and L. Getoor, Preserving the Privacy of Sensitive Relationships in Graph Data, Privacy, Security, and Trust in KDD, pp.153-171, 2008.
DOI : 10.1007/978-3-540-78478-4_9

X. Wu, V. Kumar, Q. Ross, J. Ghosh, Q. Yang et al., Top 10 algorithms in data mining, Knowledge and Information Systems, vol.9, issue.2, pp.1-37, 2008.
DOI : 10.1007/s10115-007-0114-2

X. Liu, J. Bollen, M. Nelson, and H. Van-de-sompel, Co-authorship networks in the digital library research community, Information Processing & Management, vol.41, issue.6, pp.1462-1480, 2005.
DOI : 10.1016/j.ipm.2005.03.012

G. Creamer and S. Stolfo, A link mining algorithm for earnings forecast and trading, Data Mining and Knowledge Discovery, vol.51, issue.3, pp.419-445, 2009.
DOI : 10.1007/s10618-008-0124-z

P. Li, Z. Li, H. Liu, J. He, and X. Du, Using Link-Based Content Analysis to Measure Document Similarity Effectively, Advances in Data and Web Management, pp.455-467, 2009.
DOI : 10.1016/0306-4573(88)90021-0

Z. Lin, L. Wang, and S. Guo, Recommendations on Social Network Sites: From Link Mining Perspective, 2009 International Conference on Management and Service Science, pp.1-4, 2009.
DOI : 10.1109/ICMSS.2009.5302750

J. Karamon, Y. Matsuo, H. Yamamoto, and M. Ishizuka, Generating Social Network Features for Link-Based Classification, Knowledge Discovery in Databases: PKDD 2007 of Lecture Notes in Computer Science, pp.127-139, 2007.
DOI : 10.1007/978-3-540-74976-9_15

S. Chakrabarti, B. Dom, and P. Indyk, Enhanced hypertext categorization using hyperlinks, ACM SIGMOD Record, vol.27, issue.2, pp.307-318, 1998.
DOI : 10.1145/276305.276332

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.5728

E. Segal, H. Wang, and D. Koller, Discovering molecular pathways from protein interaction and gene expression data, Bioinformatics, vol.19, issue.Suppl 1, pp.264-272, 2003.
DOI : 10.1093/bioinformatics/btg1037

E. Stattner and N. Vidot, Social network analysis in epidemiology: Current trends and perspectives, 2011 FIFTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, pp.1-11, 2011.
DOI : 10.1109/RCIS.2011.6006866

URL : https://hal.archives-ouvertes.fr/hal-00624364

A. Fard and M. Ester, Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery, 2009 International Conference on Computational Science and Engineering, pp.582-587, 2009.
DOI : 10.1109/CSE.2009.435

G. Barbier and H. Liu, Data Mining in Social Media, pp.327-352, 2011.
DOI : 10.1007/978-1-4419-8462-3_12

I. Bhattacharya and L. Getoor, Iterative record linkage for cleaning and integration, Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery , DMKD '04, pp.11-18, 2004.
DOI : 10.1145/1008694.1008697

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.7894

S. P. Ponzetto and M. Strube, Exploiting semantic role labeling, WordNet and Wikipedia for coreference resolution, Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics -, pp.192-199, 2006.
DOI : 10.3115/1220835.1220860

URL : http://acl.ldc.upenn.edu/N/N06/N06-1025.pdf

L. Stein, Integrating biological databases, Nature Reviews Genetics, vol.4, issue.5, pp.337-345, 2003.
DOI : 10.1038/nrg1065

B. Taskar, M. F. Wong, P. Abbeel, and D. Koller, Link prediction in relational data, Advances in Neural Information Processing Systems (NIPS), 2003.

Z. Huang, X. Li, and H. Chen, Link prediction approach to collaborative filtering, Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries , JCDL '05, pp.141-142, 2005.
DOI : 10.1145/1065385.1065415

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.5175

H. Yu, A. Paccanaro, V. Trifonov, and M. Gerstein, Predicting interactions in protein networks by completing defective cliques, Bioinformatics, vol.22, issue.7, pp.823-829, 2006.
DOI : 10.1093/bioinformatics/btl014

E. Zheleva, L. Getoor, J. Golbeck, and U. Kuter, Using Friendship Ties and Family Circles for Link Prediction, Lecture Notes in Computer Science, pp.5498-97, 2009.
DOI : 10.1007/978-3-642-14929-0_6

F. Buccafurri, G. Lax, A. Nocera, and D. Ursino, Discovering Links among Social Networks, Machine Learning and Knowledge Discovery in Databases, pp.467-482, 2012.
DOI : 10.1007/978-3-642-33486-3_30

L. Getoor, Link mining, ACM SIGKDD Explorations Newsletter, vol.5, issue.1, pp.84-89, 2003.
DOI : 10.1145/959242.959253

H. Cheng, D. Lo, Y. Zhou, X. Wang, and X. Yan, Identifying bug signatures using discriminative graph mining, Proceedings of the eighteenth international symposium on Software testing and analysis, ISSTA '09, pp.141-152, 2009.
DOI : 10.1145/1572272.1572290

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.506.9662

G. Ciriello and C. Guerra, A review on models and algorithms for motif discovery in protein-protein interaction networks, Briefings in Functional Genomics and Proteomics, vol.7, issue.2, 2008.
DOI : 10.1093/bfgp/eln015

K. Borgwardt, C. Ong, S. Schönauer, S. Vishwanathan, A. Smola et al., Protein function prediction via graph kernels, Bioinformatics, vol.21, issue.Suppl 1, pp.47-56, 2005.
DOI : 10.1093/bioinformatics/bti1007

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.528.6168

J. Rabelo, R. Prudêncio, and F. Barros, Leveraging relationships in social networks for sentiment analysis, Proceedings of the 18th Brazilian symposium on Multimedia and the web, WebMedia '12, pp.181-188, 2012.
DOI : 10.1145/2382636.2382676

D. Zhou, E. Manavoglu, J. Li, C. L. Giles, and H. Zha, Probabilistic models for discovering e-communities, Proceedings of the 15th international conference on World Wide Web , WWW '06, pp.173-182, 2006.
DOI : 10.1145/1135777.1135807

C. Nguyen and H. Mamitsuka, Kernels for Link Prediction with Latent Feature Models, Machine Learning and Knowledge Discovery in Databases, pp.517-532, 2011.
DOI : 10.1007/978-3-540-45167-9_12

B. Zhou, J. Pei, and W. Luk, A brief survey on anonymization techniques for privacy preserving publishing of social network data, ACM SIGKDD Explorations Newsletter, vol.10, issue.2, pp.12-22, 2008.
DOI : 10.1145/1540276.1540279

E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts, Everyone's an influencer, Proceedings of the fourth ACM international conference on Web search and data mining, WSDM '11, pp.65-74, 2011.
DOI : 10.1145/1935826.1935845

W. Chen, C. Wang, and Y. Wang, Scalable influence maximization for prevalent viral marketing in large-scale social networks, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, pp.1029-1038, 2010.
DOI : 10.1145/1835804.1835934

D. Kempe, J. Kleinberg, and E. Tardos, Maximizing the spread of influence through a social network, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '03, pp.137-146, 2003.
DOI : 10.1145/956750.956769

S. Adali, F. Sisenda, and M. Magdon-ismail, Actions speak as loud as words, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.689-698, 2012.
DOI : 10.1145/2187836.2187930

M. Mcpherson, L. Smith-lovin, and J. Cook, Birds of a Feather: Homophily in Social Networks, Annual Review of Sociology, vol.27, issue.1, pp.415-444, 2001.
DOI : 10.1146/annurev.soc.27.1.415

S. Macskassy and F. Provost, Classification in networked data: A toolkit and a univariate case study, Journal of Machine Learning Research, vol.8, pp.935-983, 2007.

A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel, You are who you know, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, pp.251-260, 2010.
DOI : 10.1145/1718487.1718519

R. Heatherly, M. Kantarcioglu, and B. Thuraisingham, Preventing private information inference attacks on social networks. Knowledge and Data Engineering, IEEE Transactions on PP, issue.1, p.99, 2012.

E. A. Baatarjav, S. Phithakkitnukoon, and R. Dantu, Group Recommendation System for Facebook, On the Move to Meaningful Internet Systems: OTM 2008 Workshops, pp.211-219, 2008.
DOI : 10.1073/pnas.0503018102

E. Zheleva and L. Getoor, To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, pp.531-540, 2009.
DOI : 10.1145/1526709.1526781

A. Chaabane, G. Acs, and M. A. Kaafar, You Are What You Like! Information Leakage Through Users' Interests, Proc. Annual Network and Distributed System Security Symposium (NDSS), 2012.
URL : https://hal.archives-ouvertes.fr/hal-00748162

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.
DOI : 10.1109/ICDE.2007.367856

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.824

A. Machanavajjhala, A. Korolova, and A. D. Sarma, Personalized social recommendations, Proc. VLDB Endow, pp.440-450, 2011.
DOI : 10.14778/1988776.1988780

X. Ying and X. Wu, On link privacy in randomizing social networks, Knowledge and Information Systems, vol.19, issue.2, pp.645-663, 2011.
DOI : 10.1007/s10115-010-0353-5

R. Heatherly, M. Kantarcioglu, and B. Thuraisingham, Social network classification incorporating link type values, 2009 IEEE International Conference on Intelligence and Security Informatics, pp.19-24, 2009.
DOI : 10.1109/ISI.2009.5137265

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.3360

J. Donath and D. Boyd, Public Displays of Connection, BT Technology Journal, vol.22, issue.4, pp.71-82, 2004.
DOI : 10.1023/B:BTTJ.0000047585.06264.cc

D. Gayo-avello, All liaisons are dangerous when all your friends are known to us, Proceedings of the 22nd ACM conference on Hypertext and hypermedia, HT '11, pp.171-180, 2011.
DOI : 10.1145/1995966.1995991

J. Kubica, A. Moore, J. Schneider, and Y. Yang, Stochastic link and group detection, Proceedings of the National Conference on Artificial Intelligence, pp.798-804, 2002.

E. Zheleva, H. Sharara, and L. Getoor, Co-evolution of social and affiliation networks, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.1007-1016, 2009.
DOI : 10.1145/1557019.1557128

L. Backstrom and J. Leskovec, Supervised random walks, Proceedings of the fourth ACM international conference on Web search and data mining, WSDM '11, pp.635-644, 2011.
DOI : 10.1145/1935826.1935914

T. Hogg, D. Wilkinson, G. Szabo, and M. Brzozowski, Multiple relationship types in online communities and social networks, Proceedings of the AAAI Symposium on Social Information Processing, AAAI, pp.30-35, 2008.

J. Hart, C. Ridley, F. Taher, C. Sas, and A. Dix, Exploring the facebook experience, Proceedings of the 5th Nordic conference on Human-computer interaction building bridges, NordiCHI '08, pp.471-474, 2008.
DOI : 10.1145/1463160.1463222

B. Krishnamurthy and C. E. Wills, Characterizing privacy in online social networks, Proceedings of the first workshop on Online social networks, WOSP '08, pp.37-42, 2008.
DOI : 10.1145/1397735.1397744

M. Thelwall, Social Network Sites, Advances in Computers, vol.76, pp.19-73, 2009.
DOI : 10.1201/9781420090437-c12

E. Clemons, The complex problem of monetizing virtual electronic social networks, Decision Support Systems, vol.48, issue.1, pp.46-56, 2009.
DOI : 10.1016/j.dss.2009.05.003

T. Boongoen, Q. Shen, and C. Price, Disclosing false identity through hybrid link analysis, Artificial Intelligence and Law, vol.8, issue.6, pp.77-102, 2010.
DOI : 10.1007/s10506-010-9085-9

E. Kabir, M. Wang, H. Bertino, and E. , A conditional purpose-based access control model with dynamic roles, Expert Systems with Applications, vol.38, issue.3, pp.1482-1489, 2011.
DOI : 10.1016/j.eswa.2010.07.057

J. Mcnealy, The privacy implications of digital preservation: Social media archives and the social networks theory of privacy, Elon Law Review, vol.3, p.133, 2011.

B. Fisher, K. Turner, and P. Morling, Defining and classifying ecosystem services for decision making, Ecological Economics, vol.68, issue.3, pp.643-653, 2009.
DOI : 10.1016/j.ecolecon.2008.09.014