-
1
-
-
77049099362
-
-
Acquisti, A., Gross. R.: Imagined communities: Awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 36-58. Springer, Heidelberg (2006)
-
Acquisti, A., Gross. R.: Imagined communities: Awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36-58. Springer, Heidelberg (2006)
-
-
-
-
3
-
-
33845467743
-
Rule-based access control for social networks
-
Meersman, R, Tari, Z, Herrero, P, eds, OTM 2006 Workshops, Springer, Heidelberg
-
Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops (2). LNCS, vol. 4278. pp. 1734-1744. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4278
, pp. 1734-1744
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
4
-
-
57049090622
-
Study raises new privacy concerns about facebook
-
Wahington Chronicle. Study raises new privacy concerns about facebook (2008), http://chronicle.com/free/2008/02/1489n.htm
-
(2008)
Wahington Chronicle
-
-
-
5
-
-
85001697848
-
A fine-grained access control system for XML documents
-
Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. ACM Transactions on Information and System Security 5(2). 169-202 (2002)
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
6
-
-
57049091173
-
-
Facebook (2007), http://www.facebook.com
-
(2007)
-
-
-
7
-
-
33750544462
-
-
May
-
Foster, H., Uchitel, S., Magee, J., Kramer, J.: Ltsa-ws: A tool for model-based verification of web service compositions and choreography, pp. 771-774 (May 2006)
-
(2006)
Ltsa-ws: A tool for model-based verification of web service compositions and choreography
, pp. 771-774
-
-
Foster, H.1
Uchitel, S.2
Magee, J.3
Kramer, J.4
-
8
-
-
33749074958
-
-
July
-
Foster, H., Uchitel, S., Magee, J., Kramer, J., Hu, M.: Using a rigorous approach for engineering web service compositions: a case study, vol. 1. pp. 217-224 (July 2005)
-
(2005)
Using a rigorous approach for engineering web service compositions: A case study
, vol.1
, pp. 217-224
-
-
Foster, H.1
Uchitel, S.2
Magee, J.3
Kramer, J.4
Hu, M.5
-
9
-
-
35449006761
-
Homeviews: Peer-to-peer middleware for personal data sharing applications
-
Geambasu. R., Balazinska, M., Gribble. S.D., Levy. H.M.: Homeviews: peer-to-peer middleware for personal data sharing applications. In: SIGMOD Conference, pp. 235-246 (2007)
-
(2007)
SIGMOD Conference
, pp. 235-246
-
-
Geambasu, R.1
Balazinska, M.2
Gribble, S.D.3
Levy, H.M.4
-
10
-
-
33845467053
-
Inferring binary trust relationships in web-based social networks
-
Golbeck, J., Hendler, J.A.: Inferring binary trust relationships in web-based social networks. ACM Trans. Internet Techn. 6(4), 497-529 (2006)
-
(2006)
ACM Trans. Internet Techn
, vol.6
, Issue.4
, pp. 497-529
-
-
Golbeck, J.1
Hendler, J.A.2
-
13
-
-
57049109942
-
-
Hart, M., Johnson, R., Stent, A.: More content - less control: Access control in the Web 2.0. Web 2.0 Security & Privacy (2003)
-
Hart, M., Johnson, R., Stent, A.: More content - less control: Access control in the Web 2.0. Web 2.0 Security & Privacy (2003)
-
-
-
-
15
-
-
57049189237
-
-
IEEE. W2SP 2008: Web 2.0 Security and Privacy (2008)
-
IEEE. W2SP 2008: Web 2.0 Security and Privacy (2008)
-
-
-
-
16
-
-
57049095988
-
Social networking applications can pose security risks
-
April
-
Irvine, M.: Social networking applications can pose security risks. Associated Press (April 2008)
-
(2008)
Associated Press
-
-
Irvine, M.1
-
17
-
-
34250616363
-
Access control enforcement for conversation-based web services
-
Mecella, M., Ouzzani, M., Paci, F., Bertino, E.: Access control enforcement for conversation-based web services. In: WWW Conference, pp. 257-266 (2006)
-
(2006)
WWW Conference
, pp. 257-266
-
-
Mecella, M.1
Ouzzani, M.2
Paci, F.3
Bertino, E.4
-
18
-
-
57049108807
-
-
MySpace
-
MySpace (2007), http://www.myspace.com
-
(2007)
-
-
-
19
-
-
57049177705
-
-
OASIS. OASIS WSBPEL TC Webpage, http://www.oasis-open.org/committees/tc- home.php?wg-abbrev-wsbpel
-
OASIS WSBPEL TC Webpage
-
-
-
20
-
-
57049114427
-
-
O'Reilly, T.: What Is Web 2.0. O'Reilly Network, pp. 169-202 (September 2005)
-
O'Reilly, T.: What Is Web 2.0. O'Reilly Network, pp. 169-202 (September 2005)
-
-
-
-
21
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
ACM, New York
-
Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: SIGMOD 2004: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 551-562. ACM, New York (2004)
-
(2004)
SIGMOD 2004: Proceedings of the 2004 ACM SIGMOD international conference on Management of data
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
22
-
-
4544277896
-
-
June
-
Salaun, G., Bordeaux, L., Schaerf, M.: Describing and reasoning on web services using process algebra, pp. 43-51 (June 2005)
-
(2005)
Describing and reasoning on web services using process algebra
, pp. 43-51
-
-
Salaun, G.1
Bordeaux, L.2
Schaerf, M.3
-
23
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Saltzer, J., Schroeder, M.: The Protection of Information in Computer Systems. Proceedings of the IEEE 63(9), 1278-1308 (1975)
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
24
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information
-
abstract, ACM, New York
-
Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: PODS '98: Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, p. 188. ACM, New York (1998)
-
(1998)
PODS '98: Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
|