메뉴 건너뛰기




Volumn , Issue , 2007, Pages 288-293

A trust based approach for protecting user data in social networks

Author keywords

[No Author keywords available]

Indexed keywords

CLEARANCE LEVEL; DATA OBJECTS; HIERARCHICAL LEVEL; MULTI-LEVEL SECURITY; READ-ONLY DATA; SECURITY CLEARANCES; SIMULATION STUDIES; SOCIAL NETWORKS; TRUST LEVEL; TRUST MODELING; TRUST VALUES; USER DATA;

EID: 70349085043     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1321211.1321251     Document Type: Conference Paper
Times cited : (64)

References (9)
  • 2
    • 59849092909 scopus 로고    scopus 로고
    • Combining provenance with trust in social networks for semantic web content filtering
    • J. Golbeck, "Combining provenance with trust in social networks for semantic web content filtering, "in Int'l Provenance and Annotation Workshop, 2006.
    • (2006) Int'l Provenance and Annotation Workshop
    • Golbeck, J.1
  • 4
    • 3042659976 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. of Computer Science, University of California, Berkeley, (manuscript)
    • R. Levien, "Attack resistant trust metrics, "Ph.D. dissertation, Dept. of Computer Science, University of California, Berkeley, 2004 (manuscript).
    • (2004) Attack Resistant Trust Metrics
    • Levien, R.1
  • 5
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov
    • A. Shamir, "How to share a secret, "Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.