Collective Privacy Management in Social Media
Full-text is available here: Collective Privacy Management in Social Media
Over the recent years, social media has achieved huge popularity through users sharing original multimedia with their friends, family, colleagues and even the public. When people are depicted in media, mainly photos, they assume co-ownership of that media and should be able to manage their privacy accordingly. Social media sites currently only offer all or nothing approaches of untagging or requesting that a photo is deleted. These approaches hinder sharing media to different groups of people (e.g. one user may have a privacy preference of “I don’t want Bob to see this photo”, but not mind if other friends see it.). Following this, a conflicting privacy preference may occur (e.g. another tagged user has a preference of “Why not? I want Bob to see this photo.") and thus this also needs resolving via a mediator. This project explores creating a tool for users on Facebook to collectively manage their privacy.
Privacy plays an important role in society as it describes how people protect their information by choosing with whom they share it with. It is desirable to protect your own information as adversaries could use it to commit crimes such as fraud or cyberstalking against you, or lead to unintended consequences such as losing your job or tarnish your self-representation 1.
Project Aims and Objectives
The aim of this project is to develop a tool utilising the Facebook Graph API that facilitates reaching an agreement between co-owners on whom can access shared photos. The tool will automatically generate groups using community detection and detect conflicts from user-defined privacy policies. It will use an automated negotiation strategy to suggest a resolution for any given conflicts that arise.
To meet these aims, this tool has the following objectives:
- Co-owners should be aware of the audience that has access to a shared item.
- Use an automated negotiation algorithm to suggest resolutions to conflicts found.
- Discover what other variables might influence conflict resolution through user feedback.
- Use non-identifiable information to evaluate how successful the algorithms are and identify further improvements.
Background and Literature Survey
This section identifies what methods and tools will be used in the development of the project.
The functional specification, identifying the stakeholders in an agile fashion, for the system
- As a social media user, I want to log in with my Facebook account, in order to use the application.
- As a social media user, I want to see which photos I am tagged in, in order to be aware of which photos may breach my privacy.
- As a social media user, I want to add context tags to photos I am tagged in, in order to help a mediator and define my privacy policies.
- As a social media user, I want to define what contexts a group of friends can access, in order to define my privacy policies.
- As a social media user, I want a community detection algorithm to determine groups of friends, in order to reduce my burden.
- As a social media user, I want a mediator to suggest resolutions to conflicts in my friends and my privacy policies.
The non-functional specification and properties of this system are the following:
- The system must be highly available, in order to sustain lots of users.
- The system must be horizontally scalable, in order to be cost-efficient with varying amounts of users over time.
- The system must be asynchronous, in order to perform slow calculations without reducing availability for other users.
- The system must be accessible on different devices, in order for people to the application on the go or at a desktop.
- The application must be simple to use in order to engage most users.
- The system must be secure as it stores personally identifiable information about its users in order to comply with laws and protect user privacy.
This section outlines the development practices used whilst developing the system.
Kanban is a popular agile development methodology that uses the Just-In-Time (JIT) process to complete features of a project. It allows for a continuous flow of software releases (continuous delivery) and the whole team takes responsibility for moving features along the workflow 6.
MVC describes an architectural structure of developing applications that have a user interface. A model represents the domain-specific simulation of an entity, for example a Building. A view presents a user interface that shows data from models and can be composed of other views. A controller interfaces between models and views, defining the actions a user can take upon a model through a view 7.
Inversion of Control (Dependency Injection)
Writing modular code results in an easily maintainable code-base. By writing small classes, modules and functions that have dependencies injected, we can stub out the dependencies
during testing without having to have finished the implementation of them 8. This also means that those dependencies can be implemented as interfaces and the
implementation becomes swappable. E.g. a storage interface could be implemented by an SQL database class or a NOSQL database class.
Domain Driven Design/Development (DDD)
With MVC and Inversion of Control, Domain Driven Design helps organise a system by considering the domain context and models involved. This allows a system to be expanded easily by adding onto an existing core model 9.
By splitting a system into smaller services that communicate with each other, we create an interchangeable system that is easier to understand architecturally as the services are simpler by being responsible for fewer tasks
In this project, there will be computationally expensive algorithms that will delay responses if they were implemented in a simple HTTP request-response scenario and the service availability would be reduced. To solve this problem, message queues provide an asynchronous communication protocol where a producer that places messages onto a queue does not require a response immediately 10. A consumer service (worker) can then pick up the messages one-by-one and perform the tasks without being overwhelmed.
To compliment Message Queueing, the project uses the publish-subscribe pattern to deliver an asynchronous message when a consumer finishes a task. The web application can connect to a web socket to receive these updates and update its local information accordingly.
During development, it is useful to test and deploy newer changes and iterations as soon as possible so that stakeholders can provide feedback. Continuous integration software can be used to run our automated tests on new commits to a repository and automatically deploy if those tests are successful. This project will use the hosted Travis CI service for continuous integration as it offers free builds for open-sourced projects. An alternative self-hosted solution would be to use Jenkins; however, this requires further set up, maintenance as well as cost.
Analysis and Design
This section considers the different ways of implementing the system, explaining why some implementations are more suitable than others.
To determine groups of users, the clique percolation method will be used as it was determined to be the most successful from Misra, Such and Balogun’s research as
mentioned in the Background and Literature Survey. They used libraries to determine cliques from an input, but these are made for traversing completed friendship graphs. Due
to the Facebook Graph API only showing mutual friends whom use the application, the graph of friendships that the application is aware of grows whenever new users join.
Existing users may also form new friendships with each other during the lifetime of the application, thus changing or merging existing cliques. This algorithm therefore must:
- Compare found cliques to existing cliques, where if
- The clique already exists, make no changes.
- An existing clique is a subset of a newly found clique, merge the subset
cliques into the new clique.
- Only traverse necessary parts of the graph.
Clique persistence can be achieved with bi-partites, assigning a many-to-many relationship between clique identifies and users 11.
To determine tie-strengths, profile information features can be compared, where friends that have more in common are deemed closer than friends that have less in common. This can be achieved by valuing each common feature as 1 12.
To detect conflicts, every co-owner’s policy can be compared to find co-owners that disagree with each other on target friends 1. To determine item sensitivity, tie-strengths between users are used. The friendship with the highest tiestrength in a set of conflicts will have their resolution suggested.
This section plans the implementation considering the Theoretical Development section.
Two ways that this system could be implemented are the client-server architecture or a peer-to-peer network. A peer-to-peer network offers better availability as it is decentralised and persistent storage could use distributed hash tables in a similar way to Bitcoin. The disadvantage of this architecture are that the client applications will be more complex and resource intensive, limiting the scope of users that can access the application. With the client-server model, ‘thin' clients can be implemented as a lightweight application that submits tasks to much powerful backend computers. Persistent storage will contain personally identifiable information and should be destroyed at the end of the project. It is impossible to guarantee destruction in a peer-to-peer network whereas, in the client-server model, we have authority over database replication thus can delete replicas as necessary. These points favour the client-server model which will be used.
A synchronous system in the client-server model can result in fluctuations of latency where a burst of requests to resource intensive operations will make the system respond slower to
other requests and thus a Denial of Service (DoS) attack can be easily performed. By creating an asynchronous system, resource intensive tasks can be queued and performed at a constant rate without reducing the availability of other tasks for other users. We can also use bidirectional communication where the backend can send the client updates.
The client could be implemented in arbitrary languages as a desktop or mobile application. To meet the accessibility requirement, the application should be available on as many
Using frontend libraries and frameworks will help accelerate the development process and help conform to better programming practices. One of the most popular and feature filled
the user interface, a User Interface framework will be used. Materialize CSS provides components that follow Google’s Material Design standards as well as card components
that can contain images which will be useful for displaying a grid of images. It also exposes a responsive grid for laying out components of a page which will be used for streamlining user
experiences across different screen sizes (mobile to desktop).
The technology used for the frontend follows in Figure 1.
|Angular 4||angular.io||MVC framework|
|Materialize CSS||materializecss.com||UI framework|
An asynchronous system needs bi-directional communication between the backend and clients. We can use the WebSocket protocol 13 to achieve this. Whilst Python, PHP and Java dominate much of the current backend server software share, Go is a newer programming language maintained by Google that compiles into machine code with garbage collection. Its compilation makes it easy to place into minimal Docker containers.
For deploying services, Docker has taken the headlines in the dev-ops (developer operations) world as it allows containers to run with different configurations independently from each other on a host utilising Linux Containers (LXC).
|Docker||docker.com||Linux Container engine|
|Terraform||terraform.io||Infrastructure as Code|
|Amazon Web Services||aws.amazon.com||Platform as a Service|
|Travis CI||travis-ci.com||Continuous Integration|
Representational State Transfer (REST) API
The RESTful API will be the only publicly exposed endpoint of the backend as it will be easier to harden the system and monitor access from the internet. It will only interact with the cache so that it can maintain a low response time for all requests.
It will only implement the required REST endpoints, for example friends will be synced via a worker in the background, thus only GET for friends will need to be implemented.
Workers will collect resource intensive tasks from the queue service to execute. They will store results in the database and cache when necessary, also telling publish/subscribe channels to update user-sessions if appropriate.
Persistent storage will be used in the form of a relational database. Storing normalised data in a relational database allows for arbitrary queries to take place. A cache will be used to serve commonly used structures of data.
The database will only store the minimum amount of information that can be used to derive other information. For example, instead of storing user attributes, only store the user ID as other attributes are not necessary. As mentioned in Algorithms, cliques will be stored in the form of bi-partites and it would not be necessary to store the whole friendship graph in the database.
The cache will be used to accelerate performance on common sets of information used by the REST API. It will store transient information such as the friendship graph and user profile information that is used during tie-strength calculation to save querying the Facebook Graph API excessively.
Redis is an in-memory data-structure store that offers O(1) complexity on many of its operations making it ideal for a cache on common operations. It also offers publish-subscribe capability, which will be used for updating user-sessions
As mentioned in the Overall System, queues will be used to hold collections of tasks to be carried out by worker services. The payload of a task should only hold enough information to identify what entities need processing so that fresh information is used when the task is carried out.
RabbitMQ will be used as it offers traditional message broking which the API will use to offload more resource intensive processes to be completed asynchronously 14. It also offers official support for Go.
Implementation and Experimental Work
This section explains how the system was constructed and deployed.
Figure 3 shows the overall system architecture on Amazon Web Services (AWS). The Application Load Balancer, Cluster management(containers) and Managed Database are provided from AWS as Software as a Service (SaaS). A managed database was desired because it offers simple backup and replication. The Application Load balancer from AWS integrates with the Elastic Container Service (ECS) to expose services behind a load balancer.
The cluster consists of 2 m4.large (2 CPU cores – 8GB memory) EC2 spot instances. The m4 series of instances are preferred over the cheaper t2 series because they guarantee constant performance. The t2 instance class varies in performance based on past usage making them more suited for mostly idle configurations (Amazon Web Services, 2017). Spot instances are variably priced based on Amazon Web Services' spare capacity. These instances may be terminated and restarted in a different data centre at any time In Figure 3, the Cache and Queues also reside within this cluster as they store non-persistent data. They can also be configured to behave as a cache cluster and a queue cluster via Redis Sentinel 15 and RabbitMQ Highly Available Queues 16.
Infrastructure and Deployment
This system has been deployed to Amazon Web Services (AWS) via Hashicorp’s Terraform as infrastructure-as-code. Writing infrastructure-as-code allows us to pre-define complex infrastructures and spin them up or down on-demand. It also allows others to read how the system works without searching through a control panel. The following Amazon Web Services have been used:
- Elastic Compute Cloud (EC2) – Virtual machines running Ubuntu Linux 16.04.
- Route 53 – Domain Name Service (DNS) for routing the domain names.
- Relational Database Service (RDS) – Managed relational database solution offering automatic backup and replication.
- Elastic Container Service (ECS) – Docker container management solution.
- Virtual Private Cloud (VPC) – Private virtual networks to isolate the application.
- Identity and Access Management (IAM) – User and service access.
- Certificate Manager – Transport Layer Security (TLS) certificate provision.
- CloudWatch Logs – Service output logging.
- Simple Storage Service (S3) – Object storage used for frontend web application and secure key storage.
- CloudFront Content Delivery Network (CDN) – Frontend deployment for high availability.
Travis CI has been used for continuous integration by running code style checks and tests before deploying to a test environment.
The Angular 4 framework has been used to develop the frontend client. It is the simplest part of the system as it aims to be a ‘thin-client' as mentioned in Overall System. It has been deployed to Amazon Web Services' CloudFront CDN for high availability and it performs a small health check to verify that the backend services are reachable and coping with current load.
||These interact with the backend to provide a repository that manages the lifecycle of entities on the client.|
||These represent the entities used on the client.|
||These are used to build a UI in Angular. These is one for each view, operating as a View/Controller in MVC.|
||These are used to configure a library.|
otherwise querying the backend server for the object and resolving.
This application has been developed using Materialize CSS which incorporates Google’s Material Design standards into a user interface framework. Using this user interface framework aids in keeping a consistent style and experience throughout the application.
The navigation system allows a user to go to any of the main sections of the application in one click on desktop and 2 touches on mobile. The main sections identified are:
- Photos a user is tagged in.
- Cliques a user belongs to. This page also displays tie-strengths next to other
members in a clique.
- Contexts a user has. This page also lists the global contexts.
- Submit Feedback for the application.
Figure 5 shows all the pages in the application and how a user interacts with the application to view them. Every page within the Authenticated and Navigation System container can navigate to Photos, Feedback, Friends and Contexts using the navigation system. This container also identifies pages which are only viewable once a user has been authenticated.
The appendix provides screenshots of how the application looks under User Interface Screenshots.
All the following components are executed in separate Docker LXC (Linux Containers) as individual, scalable micro services.
The backend services share a lot of code thus have been developed in the same Go package. This package is built into a Docker container which is then started with different configurations across the cluster for the different API and worker services.
The API is started by setting the TYPE environment variable to ‘API'. This exposes a HTTP server on port 80. The API is RESTful and implements the following endpoints in Figure 6.
||Authenticate a short-lived access token and userID, returning a different authentication for use with the API.|
||Returns all categories including user-defined ones.|
||Creates a new user-defined category.|
||Returns user objects for the given friend IDs where the session-user is a friend.|
||Returns the cliques that the session-user is a member of.|
||Updates the session-user’s privacy preferences for a clique.|
||Registers a photo with the application.|
||Updates a photo’s categories.|
||Returns the request user IDs that exist on the system for determining if a photo is negotiable.|
||Upgrades the conection to a WebSocket allowing the API to send updates for the session-user in real-time.|
Where a session-user is involved (apart from the websocket endpoint
/v1/ws?authToken=x), the session-user is identified by the
Authorization header sent with requests.
A worker is started by setting the
TYPE environment variable to
WORKER and setting the
QUEUE environment variable to a valid queue name.
Long Lived Authentication Token Worker
This worker is started by setting the QUEUE environment variable to ‘auth-long-token'.
By default, Facebook returns short-lived access tokens that often only have a lifetime of two hours 19. This worker obtains a long-lived access token from Facebook using the short-lived access token for use in further API calls. It also obtains and caches the IDs for each profile vector that is used in tie-strength determination.
This worker runs every time a user logs in to the application, obtaining a long-lived access token for that user and updating the cache with profile information. It then adds a message to the community detection queue for the logged in user’s friendship groups to be updated.
Synchronise Photo Tags Worker
This worker is started by setting the QUEUE environment variable to ‘photo-tags'.
The API exposes an endpoint for users to create photo objects on this application. Arbitrary information could be sent through this endpoint therefore the backend should obtain information about a photo from Facebook’s Graph API itself as it cannot always trust the input from a client. The client sends the photo ID and Facebook user ID which this worker then uses to obtain information about the photo using the Facebook user’s long-lived access token.
This worker runs whenever a new photo has been added.
Community Detection Worker
This worker is started by setting the QUEUE environment variable to ‘community-detection'.
As mentioned in Algorithms, a new implementation of the Clique-Percolation Method is
used for determining communities of users.
This algorithm performs the following steps for a given user:
- Find and save new friends for a user by,
- Using the user’s long-lived access token to query the Facebook Graph API for the user’s friends.
- Iterates through all of the returned friends, checking if they already exist in the system and adding new bidirectional relationships for ones that do not exist.
- Builds a local graph of only the user’s friends and their friends.
- Obtain the user’s existing cliques and its members.
- Find cliques by comparing the user’s friends to each of their friend’s friends using an array union operation. If the resulting array is longer than 3 items, a clique is found. If a clique is found,
- Verify that each member of the clique is in every other member’s friends list.
- Verify that the clique is maximal by performing an array union on the members of clique’s friends.
- Compare the new clique to existing cliques.
- If an existing subset clieque exists, migrate the existing clique to the newly found one.
- If an identical clique exists, ignore the new one.
- Otherwise, form a new clique.
Tie Strength Worker
This worker is started by setting the QUEUE environment variable to ‘tie-strength'. This worker gets ran for every friend found during the Community Detection Worker. In Algorithms, the tie-strength worker was to be implemented similarly to Misra, Such and Balogun’s work. During this implementation, it became apparent that many permissions would need to be requested from users which significantly reduces the amount of completed logins as users perceive the app to be more intrusive 20. Some attributes such as similar groups are unable to be read from the Facebook Graph API entirely. The closest match is the user_managed_groups permission which gives read/write access to groups that a user manages, but no access to see which groups a user is a member of (Facebook Inc., 2017e). As well as the public permissions, 9 of the 11 permissions requested for the application are used for obtaining direct attributes for profile similarity. This takes into account the following 17 profile attributes:
- Age group
- Current Location
- Educational Institutions
- Favourite Teams
- Inspirational People
- Political Alignment
All similar attributes are valued as 1, apart from Family which is valued at 500 considering that families are usually much closer. To determine better values for each attribute, the survey asks users to weigh how important profile attributes are in their friendships.
Conflict Detection and Resolution Worker
This worker is started by setting the QUEUE environment variable to ‘conflict-detection-and-resolution'.
This algorithm is based off Such and Criado’s work as mentioned in Algorithms and split into 3 stages:
- Build maps of tagged user allowed and blocked users by,
- Iterating through the tagged user’s cliques and comparing their policy to the photo’s contexts. This considers that a friend can exist in multiple of their cliques, thus may not be granted access in one clique but granted access in another.
- As in Such and Criado’s work, compare each tagged user’s policy to other tagged users looking for conflicting policies on each friend.
- If conflicts are found, suggest a resolution by using tagged-user tie-strengths as voting weights. Where tagged-users who want to BLOCK the friend have their tiestrengths subtracted from the tagged-users who want to ALLOW the friend. The mediator suggests that the friend is allowed if the result is positive and blocked if the result is negative.
Observation and Discussion
From Question 1 (Figure 14), of the 33 respondents, 27 (81.8%) found the tool showed them photos that breached their privacy. This highlights the need for tools like the one implemented in this project. They would be better integrated as part of social networks instead of external tools to avoid obstacles created from granting login permissions (and further trust); exposed API limitations; and keeping a consistent style. It might, however, be more desirable to have one external tool that can manage privacy across multiple social media sites, requiring exposed APIs to be compliant.
Question 2 (Figure 15) shows that the majority of people have their privacy setting set to show posts to their friends or the public. This results in people being far more careful about managing their self-representation manually as they may limit what they share and/or not approve requests from colleagues or parents, which further hinders sharing.
Question 3 (Figure 16) shows use of the currently available options people have in sharing. Untagging results in the photo not being hidden from mutual friends and removing the photo reduces sharing.
Question 4 (Figure 17) shows that 84.8% of respondents felt that the tie-strengths generated represented their relationships with friends accurately. This supports Misra, Such and Balogun’s research by showing how effective similarity based access control is. The primary downfalls of this method were down to insufficient or stale profile information.
Question 5 supports some of the downfalls mentioned from Question 4, where a third of respondents felt that their Facebook profile was not representative of themselves due to insufficient or stale profile information. They also felt that they would manage their selfrepresentation more on Facebook which presents the need for tools that can be aware of self-representation goals to audiences.
Question 6 presents the collated totals for each similarity vector. In general, this indicates that respondents rated family relationship, mutual location, educational institutions, events and music taste as the most definitive attributes to their friendships. However, this does not accommodate for every user’s preference as there are some respondents that placed religion and work among their most important attributes. Given a different group of users, we may find that different profile attribute similarities are preferred in a friendship. It would be interesting to see what influences these preferences in order to predict tie-strengths more effectively. For example, Figure 20 shows that males, on average, valued sports and favourite teams in relationships more than females did. People with more similar profiles may share preferences to what attributes are most important to them.
Community detection took a long time with only 40 friends and will take exponentially longer with more friends. This is inevitable as community detection translates into a maximal clique problem which is NP-hard 21. This should continue to be done asynchronously, but further optimisation would be welcome, perhaps by examining existing cliques to discard parts of the graph.
Using queues to offload asynchronous work resulted in the API consistently having a low response time with minimal resource usage. The servers never showed any signs of higher resource usage showing that this application could handle much more load and cheaply scale to accommodate Denial of Service attacks.
It’s important to note that in Figure 21, mobile devices had almost the same amount of requests as desktops/laptops. This shows how important it is for a tool like this to be accessible on mobile devices and the use of a responsive CSS framework mentioned in Frontend Client was valuable.
Whilst the User Interface evaluation showed that it was relatively quick and easy to perform tasks. A first time user would need to spend ~8.5 seconds per photo resulting in the average user for this application spending almost 7 minutes on just photos alone plus an additional ~7 seconds per clique policy. This shows that users have to invest a lot of time in this tool at the start and will likely stop using it. However, after the first-use, there will be significantly less photos and cliques to manage, therefore lowering the required time. Some feedback also showed that the styling of the application was ugly making it appear illegitimate. This could be because they expected a similar style to Facebook’s website but integration into an existing social network would resolve these issues.
Social media’s booming popularity is evident with over 1.3 billion active daily users on Facebook (Facebook Inc., 2017a). All types of media depicting many users are uploaded to social networks but these services only present privacy management options that favour the uploader. This leaves co-owners of media limited options that either reduce sharing (delete the photo) or don’t respect their privacy completely (untag from photo).
This project has demonstrated that there is a need for collective privacy management and that profile similarities can be used in mediation. A problem that some profiles are not maintained or representative of users lives hinders how affective the algorithm is.
Collective privacy management has a long way to go before it becomes wholly mainstream, but this project could be used a starting point for future implementations as it exposes what is required, and further challenges, in building a tool to collectively manage privacy.
Future and Development
This tool would greatly benefit from integration into the social network directly. This would allow the tool to take advantage of using Facebook’s infrastructure, bypassing the limitations of the Graph API, eliminating the limitations described in Facebook Graph API.
As mentioned in the Observation and Discussion, community detection would be better implemented as an aid upon user managed groups. A user could press a button that will suggest communities for friends that aren’t currently in a group which can then be to applied or rejected.
Further work could be done to implement further alternatives such as cropping or blurring pictures to blocked users in conflict. This would rely on tagged users being marked on the photo correctly as the Graph API does expose the coordinates of a tag.
The frontend client could be improved by incorporating a service worker 22 to deliver real-time notifications of conflicts and optionally resolutions. Local storage could also be used to cache user information from the Graph API, saving the need to re-make all of the requests again whenever a user revisits the application.
Another challenge is determining a context or scenario from a photo automatically. This tool currently asks users to define them manually, but future work could look at predicting what contexts or categories a user would apply to a new photo to reduce their burden further.
A tutorial could be implemented to train users on how to use the tool to help them manage their privacy more effectively.
Further security practices should also be considered. For example, JSON Web Tokens should expire after a short amount of time, requiring clients to re-authenticate automatically.
Such, J. M. and Criado, N. (2016) ‘Resolving Multi-Party Privacy Conflicts in Social Media', IEEE Transactions on Knowledge and Data Engineering, 28(7), pp. 1851–1863. doi: 10.1109/TKDE.2016.2539165. ↩︎
Fogues, R. et al. (2015) ‘Argumentation for Multi-party Privacy Management', The Second International Workshop on Agents and CyberSecurity (ACySe), pp. 3–6. ↩︎
Misra, G. and Such, J. M. (2016) ‘How Socially Aware are Social Media Privacy Controls?', IEEE Computer, 49(3), pp. 96–99. ↩︎
Such, J. M. et al. (2017) ‘Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study', ACM Conference on Human Factors in Computing Systems (CHI). Available at: https://kclpure.kcl.ac.uk/portal/en/publications/photo-privacy-conflicts-in-social-media-alargescale-empirical-study(c5e9250b-c4ba-4a6a-9d38-33ae018aa1df)/export.html. ↩︎
Misra, G., Such, J. M. and Balogun, H. (2016) ‘IMPROVE - Identifying Minimal PROfile VEctors for Similarity Based Access Control.', Trustcom/BigDataSE/ISPA, pp. 868–875. doi: 10.1109/TrustCom.2016.149. ↩︎
Radigan, D. and Altassian (2017) Kanban. Available at: https://www.atlassian.com/agile/kanban. ↩︎
Krasner, G. E. and Pope, S. T. (1988) ‘A Description of the Model View Controller User Interface Paradigm in the Smalltalk 80 System', The Center for Research in Electronic Art Technology, (October). ↩︎
Fowler, M. (2004) Inversion of Control Containers and the Dependency Injection pattern. Available at: https://martinfowler.com/articles/injection.html. ↩︎
Evans, E. (2003) Domain-driven Design: Tackling Complexity in the Heart of Software. Addison Wesley. ↩︎
Johansson, L. (2014) What is message queueing? Available at: https://www.cloudamqp.com/blog/2014-12-03-what-is-message-queuing.html. ↩︎
Kumpula, J. M. et al. (2008) ‘Sequential algorithm for fast clique percolation', Physical Review E, 78(2), p. 26109. doi: 10.1103/PhysRevE.78.026109. ↩︎
Misra, G., Such, J. M. and Balogun, H. (2016) ‘Non-sharing communities?: an empirical study of community detection for access control decisions', Proceedings of ASONAM 2016. doi: 10.1109/ASONAM.2016.7752212. ↩︎
Fette, I. et al. (2011) ‘The WebSocket Protocol'. Internet Engineering Task Force (IETF). Available at: https://tools.ietf.org/html/rfc6455. ↩︎
Humphrey, P. (2017) Understanding When to use RabbitMQ or Apache Kafka. ↩︎
Sanfilippo, S. (2012) Redis Sentinel Documentation. Available at: https://redis.io/topics/sentinel. ↩︎
Pivotal Software Inc. (2017) ‘Highly Available (Mirrored) Queues'. Available at: https://www.rabbitmq.com/ha.html. ↩︎
ECMA International (2013) The JSON Data Interchange Format. Available at: http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-404.pdf. ↩︎
Facebook Inc. (2017b) Expiration and Extension of Access Tokens. Available at: https://developers.facebook.com/docs/facebook-login/access-tokens/expiration-andextension. ↩︎
Facebook Inc. (2017d) Optimizing Permissions Requests. Available at: https://developers.facebook.com/docs/facebook-login/permissions/requesting-andrevoking. ↩︎
Pardalos, P. M. and Xue, J. (1994) ‘The Maximum Clique Problem ( MCP )', Journal of global Optimization 4.3, pp. 301–328. ↩︎
Gaunt, M. (2017) Service Workers: an Introduction. Available at: https://developers.google.com/web/fundamentals/getting-started/primers/serviceworkers. ↩︎