| 3/2/2017 | What is privacy? Why it matters? Case Studies. |  | Read: Privacy and IoT, Gilad Rosner, O’ReilySuch et al, “A Survey of Privacy in MAS”, Knowledge Engineering Review, 2012
 | 
| 7/2/2017 | Privacy Policies: Specification, Requirements, Languages (Role-Based Access Control, XACML, P3P, Relation-Based Access Control)
 |  | Read: S Gurses, C Diaz, "Two tales of privacy in online social networks", IEEE Security & Privacy, 11 (3), 29-37Fong, Philip WL. "Relationship-based access control: protection model and policy language." Proceedings of the first ACM conference on Data and application security and privacy. ACM, 2011.
 | 
| 14/2/2017 | Privacy Policies: Specification, Requirements, Languages(Collaborative approaches)
 |  |  Hu, H., Ahn, G.J. and Jorgensen, J., 2013. Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering, IEEE Transactions on, 25(7), pp.1614-1627.Kökciyan, N., & Yolum, P. (2016). P ri G uard: A Semantic Approach to Detect Privacy Violations in Online Social Networks. IEEE Transactions on Knowledge and Data Engineering, 28(10), 2724-2737.
 | 
| 21/2/2017 | Preventing Privacy Violations (Agreement Technologies) |  | Read: Squicciarini, A. C., Shehab, M., & Paci, F. (2009, April). Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web (pp. 521-530). ACM.Such, J. M., & Rovatsos, M. (2016). Privacy Policy Negotiation in Social Media. ACM Transactions on Autonomous and Adaptive Systems, 11(1),
 | 
| 28/2/2017 | Detecting Privacy Violations (Agreement Technologies) |  | Read: J. M. Such, N. Criado.  Resolving Multi-party Privacy Conflicts in Social Media. IEEE Transactions on Knowledge and Data Engineering. In pressN. Kokciyan, N. Yagikci, P. Yolum. An Argumentation Approach for Resolving Privacy Disputes in Online Social Networks. ACM Transactions on Internet Technology, To appear.
   | 
| 7/3/2017 | Detecting Privacy Violations (Learning) |  | Read: Vanetti, M., Binaghi, E., Ferrari, E., Carminati, B., & Carullo, M. (2013). A system to filter unwanted messages from OSN user walls. IEEE Transactions on Knowledge and data Engineering, 25(2), 285-297. Squicciarini, A. C., Lin, D., Sundareswaran, S., & Wede, J. (2015). Privacy policy inference of user-uploaded images on content sharing sites. IEEE transactions on knowledge and data engineering, 27(1), 193-206. | 
| 14/3/2017 | Setting Privacy Constraints |  | Read: Fang, L., & LeFevre, K. (2010, April). Privacy wizards for social networking sites. In Proceedings of the 19th international conference on World wide web (pp. 351-360). ACM.Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., ... & Reiter, M. (2012, May). Tag, you can see it!: Using tags for access control in photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 377-386). ACM.
 | 
| 21/3/2017 | Self-Censorship for Privacy |  | Read: 
						
							Lampinen, A., Lehtinen, V., Lehmuskallio, A., & Tamminen, S. (2011, May). We're in it together: interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 3217-3226). ACM.
						Sleeper, M., Balebako, R., Das, S., McConahy, A. L., Wiese, J., & Cranor, L. F. (2013, February). The post that wasn't: exploring self-censorship on facebook. In Proceedings of the 2013 conference on Computer supported cooperative work (pp. 793-802). ACM.
 | 
| 28/3/2017 | Social Network Analysis for Privacy |  | Read: Akcora, Cuneyt, Barbara Carminati, and Elena Ferrari. "Privacy in social networks: How risky is your social graph?." In Data Engineering (ICDE), 2012 IEEE 28th International Conference on, pp. 9-19. IEEE, 2012.Strufe, Thorsten. "Safebook: A privacy-preserving online social network leveraging on real-life trust." IEEE Communications Magazine (2009): 95.
 | 
| 4/4/2017 | Recommending Privacy Settings |  | Read: Ilia, P., Carminati, B., Ferrari, E., Fragopoulou, P., & Ioannidis, S.(2017, March). SAMPAC: Socially-Aware collaborative Multi-Party Access Control. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (pp. 71-82). ACMAlbertini, D. A., Carminati, B., & Ferrari, E. (2016, November). Privacy Settings Recommender for Online Social Network. In Collaboration and Internet Computing (CIC), 2016 IEEE 2nd International Conference on (pp.514-521). IEEE.
   | 
| 11/4/2017 | Distributed OSN Architecutes |  | 
						
							Paul, Thomas, Antonino Famulari, and Thorsten Strufe. "A survey on decentralized online social networks." Computer Networks 75 (2014): 437-452.
 | 
| 18/4/2017 | Spring Break |  |  | 
| 25/4/2017 | Learning Privacy Requirements |  |  | 
| 2/5/2017 | Project Presentations |  |  | 
| 9/5/2017 |  |  |  |