-
1
-
-
20844435854
-
Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
-
ADOMAVICIUS, G. AND TUZHILIN, A. 2005. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17, 6, 734-749.
-
(2005)
IEEE Trans. Knowl. Data Eng.
, vol.17
, Issue.6
, pp. 734-749
-
-
Adomavicius, G.1
Tuzhilin, A.2
-
2
-
-
70349085043
-
A trust-based approach for protecting user data in social networks
-
ACM Press, New York
-
ALI, B., VILLEGAS, W., AND MAHESWARAN, M. 2007. A trust-based approach for protecting user data in social networks. In Proceedings of the Conference of the Center for Advanced Studies on Collaborative Research (CASCON'07). ACM Press, New York, 288-293.
-
(2007)
Proceedings of the Conference of the Center for Advanced Studies on Collaborative Research (CASCON'07)
, pp. 288-293
-
-
Ali, B.1
Villegas, W.2
Maheswaran, M.3
-
3
-
-
26644470309
-
A trust-enhanced recommender system application: Moleskiing
-
ACM Press, New York
-
AVESANI, P., MASSA, P., AND TIELLA, R. 2005. A trust-enhanced recommender system application: Moleskiing. In Proceedings of the ACMSymposium on Applied Computing (SAC'05). ACM Press, New York, 1589-1593.
-
(2005)
Proceedings of the ACMSymposium on Applied Computing (SAC'05)
, pp. 1589-1593
-
-
Avesani, P.1
Massa, P.2
Tiella, R.3
-
4
-
-
42949172365
-
N3Logic: A logical framework for the World Wide Web
-
BERNERS-LEE, T., CONNOLLY, D., KAGAL, L., SCHARF, Y., AND HENDLER, J. 2008. N3Logic: A logical framework for the World Wide Web. Theory Pract. Log. Program. 8, 3, 249-269.
-
(2008)
Theory Pract. Log. Program.
, vol.8
, Issue.3
, pp. 249-269
-
-
Berners-Lee, T.1
Connolly, D.2
Kagal, L.3
Scharf, Y.4
Hendler, J.5
-
6
-
-
0002863367
-
Valuation of trust in open networks
-
Springer, Berlin
-
BETH, T.,BORCHERDING, M., ANDKLEIN,B. 1994. Valuation of trust in open networks. In Proceedings of the European Symposium on Research in Computer Security (ESORICS'94). Springer, Berlin, 3-18.
-
(1994)
Proceedings of the European Symposium on Research in Computer Security (ESORICS'94)
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Andklein, B.3
-
7
-
-
0004078695
-
-
IETF RFC 2704, Internet Engineering Task Force
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999. The KeyNote trust management system version 2. IETF RFC 2704, Internet Engineering Task Force. http://www.ietf.org/rfc/rfc2704.txt.
-
(1999)
The KeyNote Trust Management System Version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
8
-
-
0001071507
-
Compliance checking in the PolicyMaker trust management system
-
Springer, Berlin
-
BLAZE, M., FEIGENBAUM, J., AND STRAUSS, M. 1998. Compliance checking in the PolicyMaker trust management system. In Proceedings of the 2nd International Conference on Financial Cryptography (FC'98). Springer, Berlin, 1439-1456.
-
(1998)
Proceedings of the 2nd International Conference on Financial Cryptography (FC'98)
, pp. 1439-1456
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
9
-
-
32544446344
-
FOAF vocabulary specification 0.91
-
BRICKLEY, D. AND MILLER, L. 2007. FOAF vocabulary specification 0.91. Namespace Document. http://xmlns.com/foaf/0.1.
-
(2007)
Namespace Document
-
-
Brickley, D.1
Miller, L.2
-
10
-
-
50249111261
-
-
CANADIAN PRIVACY COMMISSION
-
CANADIAN PRIVACY COMMISSION. 2007. Social Networking and Privacy. http://www.privcom.gc.ca/information/social/index e.asp.
-
(2007)
Social Networking and Privacy
-
-
-
11
-
-
70350520397
-
Access control and privacy in Web-based social networks
-
CARMINATI, B. AND FERRARI, E. 2008. Access control and privacy in Web-based social networks. Int. J. Web Inf. Syst. 4, 4, 395-415.
-
(2008)
Int. J. Web Inf. Syst.
, vol.4
, Issue.4
, pp. 395-415
-
-
Carminati, B.1
Ferrari, E.2
-
12
-
-
33845467743
-
Rule-based access control for social networks
-
Springer, Berlin
-
CARMINATI, B., FERRARI, E., AND PEREGO, A. 2006. Rule-based access control for social networks. In On the Move to Meaningful Internet Systems: OTM'06 Workshops. Springer, Berlin, 1734-1744.
-
(2006)
On the Move to Meaningful Internet Systems: OTM'06 Workshops
, pp. 1734-1744
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
13
-
-
84868382928
-
Facebook's feeds cause privacy concerns
-
CHEN, L. 2006. Facebook's feeds cause privacy concerns. The Amherst Student. http://halogen.note.amherst.edu/~astudent/2006-2007/issue02/news/01. html.
-
(2006)
The Amherst Student
-
-
Chen, L.1
-
14
-
-
84885912107
-
Trust models for community-aware identity management
-
CHOI, H.-C., KRUK, S. R., GRZONKOWSKI, S., STANKIEWICZ, K., DAVIS, B., AND BRESLIN, J. G. 2006. Trust models for community-aware identity management. In Proceedings of the Identity, Reference, and the Web Workshop (IRW'06). http://www.ibiblio.org/hhalpin/irw2006/skruk.pdf.
-
(2006)
Proceedings of the Identity, Reference, and the Web Workshop (IRW'06)
-
-
Choi, H.-C.1
Kruk, S.R.2
Grzonkowski, S.3
Stankiewicz, K.4
Davis, B.5
Breslin, J.G.6
-
16
-
-
84868377202
-
RELATIONSHIP: A vocabulary for describing relationships between people
-
DAVIS, I. AND VITIELLO JR, E. 2005. RELATIONSHIP: A vocabulary for describing relationships between people. Namespace Document. http://purl.org/vocab/relationship.
-
(2005)
Namespace Document
-
-
Davis, I.1
Vitiello Jr, E.2
-
17
-
-
27544439248
-
How the semantic web is being used: An analysis of FOAF documents
-
IEEE, Los Alamitos, CA, 113c
-
DING, L., ZHOU, L., FININ, T. W., AND JOSHI, A. 2005. How the Semantic Web is being used: An analysis of FOAF documents. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05). IEEE, Los Alamitos, CA, 113c.
-
(2005)
Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05)
-
-
Ding, L.1
Zhou, L.2
Finin, T.W.3
Joshi, A.4
-
18
-
-
0003593599
-
-
IETF RFC 2693, Internet Engineering Task Force
-
ELLISON, C. M., FRANTZ, B., LAMPSON, B., RIVEST, R. L., THOMAS, B. M., AND YLÖNEN, T. 1999. SPKI certificate theory. IETF RFC 2693, Internet Engineering Task Force. http://www.ietf. org/rfc/rfc2693.txt.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.M.5
Ylönen, T.6
-
19
-
-
84868346659
-
-
EPIC. 2008a. Facebook Privacy Page. http://epic.org/privacy/facebook/.
-
(2008)
Facebook Privacy Page
-
-
-
20
-
-
50249119347
-
-
EPIC. 2008b. Social Networking Privacy. http://epic.org/privacy/ socialnet/default.html.
-
(2008)
Social Networking Privacy
-
-
-
21
-
-
50249137990
-
-
FEDERAL TRADE COMMISSION
-
FEDERAL TRADE COMMISSION. 2007. Social Networking Sites: A Parent's Guide. http://www.ftc. gov/bcp/edu/pubs/consumer/tech/tec13.shtm.
-
(2007)
Social Networking Sites: A Parent's Guide
-
-
-
22
-
-
0242528869
-
Secure database systems
-
M. Piattini and O. Diaz, Eds. Artech House, Norwood, MA
-
FERRARI, E. AND THURAISINGHAM, B. 2000. Secure database systems. In Advanced Database Technology and Design, M. Piattini and O. Diaz, Eds. Artech House, Norwood, MA, 353-403.
-
(2000)
Advanced Database Technology and Design
, pp. 353-403
-
-
Ferrari, E.1
Thuraisingham, B.2
-
25
-
-
33845467053
-
Inferring binary trust relationships in Web-based social networks
-
DOI 10.1145/1183463.1183470
-
GOLBECK, J. A. AND HENDLER, J. 2006. Inferring binary trust relationships in Web-based social networks. ACM Trans. Inter. Tech. 6, 4, 497-529. (Pubitemid 44893437)
-
(2006)
ACM Transactions on Internet Technology
, vol.6
, Issue.4
, pp. 497-529
-
-
Golbeck, J.1
Hendler, J.2
-
27
-
-
72449167636
-
Security issues and recommendations for online social networks
-
European Network and Information Security Agency
-
HOGBEN, G. 2007. Security issues and recommendations for online social networks. ENISA Position Paper 1, European Network and Information Security Agency. http://www.enisa.europa. eu/doc/pdf/deliverables/enisa pp social networks.pdf.
-
(2007)
ENISA Position Paper 1
-
-
Hogben, G.1
-
28
-
-
18744404327
-
-
W3C Member Submission, World Wide Web Consortium
-
HORROCKS, I., PATEL-SCHNEIDER, P. F., BOLEY, H., TABET, S., GROSOF, B., AND DEAN, M. 2004. SWRL: A Semantic Web rule language combining OWL and RuleML. W3C Member Submission, World Wide Web Consortium. http://www.w3.org/Submission/ SWRL.
-
(2004)
SWRL: A Semantic Web Rule Language Combining OWL and RuleML
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
-
30
-
-
33744773886
-
Simplification and analysis of transitive trust networks
-
JøSANG, A., GRAY, E., AND KINATEDER, M. 2006. Simplification and analysis of transitive trust networks. Web Intell. Agent Syst. 4, 2, 139-161.
-
(2006)
Web Intell. Agent Syst.
, vol.4
, Issue.2
, pp. 139-161
-
-
Jøsang, A.1
Gray, E.2
Kinateder, M.3
-
31
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
JøSANG, A., ISMAIL, R., AND BOYD, C. 2007. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 2, 618-644.
-
(2007)
Decis. Support Syst.
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
32
-
-
84880467894
-
The Eigentrust algorithm for reputation management in P2P networks
-
ACM, New York
-
KAMVAR, S. D., SCHLOSSER, M. T., AND GARCIA-MOLINA, H. 2003. The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of 12th International Conference on World Wide Web (WWW'03). ACM, New York, 640-651.
-
(2003)
Proceedings of 12th International Conference on World Wide Web (WWW'03)
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
34
-
-
33750231847
-
D-FOAF: Distributed identity management with access rights delegation
-
Springer, Berlin
-
KRUK, S. R., GRZONKOWSKI, S., CHOI, H.-C., WORONIECKI, T., AND GZELLA, A. 2006. D-FOAF: Distributed identity management with access rights delegation. In Proceedings of the Asian Semantic Web Conference (ASWC'06). Springer, Berlin, 140-154.
-
(2006)
Proceedings of the Asian Semantic Web Conference (ASWC'06)
, pp. 140-154
-
-
Kruk, S.R.1
Grzonkowski, S.2
Choi, H.-C.3
Woroniecki, T.4
Gzella, A.5
-
36
-
-
0030671980
-
Toward acceptable metrics of authentication
-
IEEE, Los Alamitos, CA
-
REITER, M. K. AND STUBBLEBINE, S. G. 1997. Toward acceptable metrics of authentication. In Proceedings of the IEEE Symposium on Security and Privacy (SP'97). IEEE, Los Alamitos, CA, 10-20.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy (SP'97)
, pp. 10-20
-
-
Reiter, M.K.1
Stubblebine, S.G.2
-
37
-
-
0018545449
-
How to share a secret
-
SHAMIR, A. 1979. How to share a secret. Comm. ACM 22, 11, 612-613.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
39
-
-
84899266027
-
Creating a policy-aware Web: Discretionary, rule-based access for the World Wide Web
-
E. Ferrari and B. Thuraisingham, Eds. IDEA Group Publishing, Hershey, PA
-
WEITZNER, D. J., HENDLER, J., BERNERS-LEE, T., AND CONNOLLY, D. 2006. Creating a policy-aware Web: Discretionary, rule-based access for the World Wide Web. In Web & Information Security, E. Ferrari and B. Thuraisingham, Eds. IDEA Group Publishing, Hershey, PA, 1-31.
-
(2006)
Web & Information Security
, pp. 1-31
-
-
Weitzner, D.J.1
Hendler, J.2
Berners-Lee, T.3
Connolly, D.4
-
40
-
-
3142738238
-
PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
XIONG, L. AND LIU, L. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 7, 843-857.
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
|