메뉴 건너뛰기




Volumn 39, Issue 4, 2009, Pages 135-146

Persona: An online social network with user-defined privacy

Author keywords

[No Author keywords available]

Indexed keywords

FACEBOOK; ONLINE SOCIAL NETWORKS; PERSONAL INFORMATION; PRIVATE DATA; USER DATA; WEB PAGE;

EID: 70450257780     PISSN: 01464833     EISSN: 01464833     Source Type: Conference Proceeding    
DOI: 10.1145/1594977.1592585     Document Type: Conference Paper
Times cited : (335)

References (40)
  • 1
    • 70450264618 scopus 로고    scopus 로고
    • A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In PET, 2006.
    • A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In PET, 2006.
  • 2
    • 84869679024 scopus 로고    scopus 로고
    • Advanced crypto software collection
    • Advanced crypto software collection. http://acsc.csl.sri.com/cpabe/.
  • 3
    • 35348839742 scopus 로고    scopus 로고
    • Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing
    • S. Ahern, et al. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Human Factors in Computing Systems, 2007.
    • (2007) Human Factors in Computing Systems
    • Ahern, S.1
  • 4
    • 84869665425 scopus 로고    scopus 로고
    • Apple iPhone SDK. http://developer.apple.com/iphone/.
    • Apple iPhone SDK
  • 6
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the web
    • P. A. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the web. Journal of Computer Security, 2002.
    • (2002) Journal of Computer Security
    • Bonatti, P.A.1    Samarati, P.2
  • 7
    • 70450246502 scopus 로고    scopus 로고
    • M. Chase. Multi-authority attribute based encryption. In TCC, 2007.
    • M. Chase. Multi-authority attribute based encryption. In TCC, 2007.
  • 8
    • 84967701397 scopus 로고
    • The design philosophy of the darpa internet protocols
    • D. Clark. The design philosophy of the darpa internet protocols. In SIGCOMM, 1988.
    • (1988) SIGCOMM
    • Clark, D.1
  • 10
    • 84869667602 scopus 로고    scopus 로고
    • Facebook statistics
    • Facebook statistics. http://www.facebook.com/press/info.php?statistics.
  • 12
  • 13
    • 33749016498 scopus 로고    scopus 로고
    • Information revelation and privacy in online social networks (the facebook case)
    • R. Gross and A. Acquisti. Information revelation and privacy in online social networks (the facebook case). In WPES, 2005.
    • (2005) WPES
    • Gross, R.1    Acquisti, A.2
  • 14
    • 70249088359 scopus 로고    scopus 로고
    • NOYB: Privacy in online social networks
    • S. Guha, K. Tang, and P. Francis. NOYB: Privacy in online social networks. In WOSN, 2008.
    • (2008) WOSN
    • Guha, S.1    Tang, K.2    Francis, P.3
  • 16
    • 70450268671 scopus 로고    scopus 로고
    • J. He, W. W. Chu, and Z. V. Liu. Inferring privacy information from social networks. In ISI, 2006.
    • J. He, W. W. Chu, and Z. V. Liu. Inferring privacy information from social networks. In ISI, 2006.
  • 17
    • 36949018193 scopus 로고    scopus 로고
    • J. Kleinberg. Challenges in social network data: Processes, privacy and paradoxes. In KDD, 2007. Invited talk.
    • J. Kleinberg. Challenges in social network data: Processes, privacy and paradoxes. In KDD, 2007. Invited talk.
  • 19
    • 66549121418 scopus 로고    scopus 로고
    • A measure of online social networks
    • B. Krishnamurthy. A measure of online social networks. In COMSNETS, 2009.
    • (2009) COMSNETS
    • Krishnamurthy, B.1
  • 20
    • 70249103846 scopus 로고    scopus 로고
    • Characterizing privacy in online social networks
    • B. Krishnamurthy and C. E. Wills. Characterizing privacy in online social networks. In WOSN, 2008.
    • (2008) WOSN
    • Krishnamurthy, B.1    Wills, C.E.2
  • 21
    • 73349092246 scopus 로고    scopus 로고
    • Involuntary information leakage in social network services
    • I.-F. Lam, K.-T. Chen, and L.-J. Chen. Involuntary information leakage in social network services. In IWSEC, 2008.
    • (2008) IWSEC
    • Lam, I.-F.1    Chen, K.-T.2    Chen, L.-J.3
  • 22
    • 70450272009 scopus 로고    scopus 로고
    • Y. Lee. Measured TCP performance in CDMA 1x EV-DO network. In PAM, 2006.
    • Y. Lee. Measured TCP performance in CDMA 1x EV-DO network. In PAM, 2006.
  • 23
    • 79959606137 scopus 로고    scopus 로고
    • Secure threshold multi authority attribute based encryption without a central authority
    • H. Lin, Z. Cao, X. Liang, and J. Shao. Secure threshold multi authority attribute based encryption without a central authority. In INDOCRYPT, 2008.
    • (2008) INDOCRYPT
    • Lin, H.1    Cao, Z.2    Liang, X.3    Shao, J.4
  • 24
    • 84869682451 scopus 로고    scopus 로고
    • Linkedin. http://www.linkedin.com/.
    • Linkedin
  • 25
    • 84869676936 scopus 로고    scopus 로고
    • Loopt. http://www.loopt.com.
    • Loopt
  • 26
    • 70450244592 scopus 로고    scopus 로고
    • M. M. Lucas and N. Borisov. flybynight: Mitigating the privacy risks of social networking. In WPES, 2008.
    • M. M. Lucas and N. Borisov. flybynight: Mitigating the privacy risks of social networking. In WPES, 2008.
  • 28
    • 42149117427 scopus 로고    scopus 로고
    • A. Mislove, et al. Measurement and analysis of online social networks. In IMC, 2007.
    • A. Mislove, et al. Measurement and analysis of online social networks. In IMC, 2007.
  • 29
    • 70450226622 scopus 로고    scopus 로고
    • Growth of the ickr social network
    • A. Mislove, et al. Growth of the ickr social network. In WOSN, 2008.
    • (2008) WOSN
    • Mislove, A.1
  • 30
    • 0003387819 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • D. Naor, M. Naor, and J. B. Lotspiech. Revocation and tracing schemes for stateless receivers. In CRYPTO, 2001.
    • (2001) CRYPTO
    • Naor, D.1    Naor, M.2    Lotspiech, J.B.3
  • 32
    • 33645998872 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • A. Sahai and B. Waters. Fuzzy identity-based encryption. In Eurocrypt, 2005.
    • (2005) Eurocrypt
    • Sahai, A.1    Waters, B.2
  • 33
    • 85084164620 scopus 로고    scopus 로고
    • Detecting format-string vulnerabilities with type qualifiers
    • U. Shankar, et al. Detecting format-string vulnerabilities with type qualifiers. In USENIX Security, 2001.
    • (2001) USENIX Security
    • Shankar, U.1
  • 34
    • 70450266732 scopus 로고    scopus 로고
    • A. Tootoonchian, et al. Lockr: Social access control for web 2.0. In WOSN, 2008.
    • A. Tootoonchian, et al. Lockr: Social access control for web 2.0. In WOSN, 2008.
  • 35
    • 85180804257 scopus 로고    scopus 로고
    • Realizing massive-scale conditional access systems through attribute-based cryptosystems
    • P. Traynor, K. Butler, W. Enck, and P. McDaniel. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In NDSS, 2008.
    • (2008) NDSS
    • Traynor, P.1    Butler, K.2    Enck, W.3    McDaniel, P.4
  • 36
    • 84869670487 scopus 로고    scopus 로고
    • Where I've been. http://apps.facebook.com/whereivebeen/.
    • Where I've been
  • 37
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • 28(4):68{79
    • C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. SIGCOMM CCR, 28(4):68{79, 1998.
    • (1998) SIGCOMM CCR
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 38
    • 50249141898 scopus 로고    scopus 로고
    • Inferring privacy information via social relations
    • W. Xu, X. Zhou, and L. Li. Inferring privacy information via social relations. In ICDEW, 2008.
    • (2008) ICDEW
    • Xu, W.1    Zhou, X.2    Li, L.3
  • 39
    • 77950788046 scopus 로고    scopus 로고
    • H. Yin, et al. Capturing system-wide information ow for malware detection and analysis. In CCS, 2007.
    • H. Yin, et al. Capturing system-wide information ow for malware detection and analysis. In CCS, 2007.
  • 40
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. Transactions on Information and System Security, 2003.
    • (2003) Transactions on Information and System Security
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.