-
1
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
M. Atallah, M. Blanton, N. Fazio, and K. Frikken. Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur., 12(3):1-43, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur
, vol.12
, Issue.3
, pp. 1-43
-
-
Atallah, M.1
Blanton, M.2
Fazio, N.3
Frikken, K.4
-
3
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In International Conference on World Wide Web (WWW'08), pages 181-190, 2007.
-
(2007)
International Conference on World Wide Web (WWW'08)
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
4
-
-
50249104379
-
-
B. Carminati and E.: Ferrari. Privacy-aware collaborative access control in web-based social networks. In V, editor, Atluri, pages 81-96. Springer, V., ed.: DBSec. 5094 of Lecture Notes in Com-puter Science., : DBSec. 5094 of Lecture Notes in Com-puter Science., Springer, 2008.
-
B. Carminati and E.: Ferrari. Privacy-aware collaborative access control in web-based social networks. In V, editor, Atluri, pages 81-96. Springer, V., ed.: DBSec. Volume 5094 of Lecture Notes in Com-puter Science., : DBSec. Volume 5094 of Lecture Notes in Com-puter Science., Springer, 2008.
-
-
-
-
5
-
-
33845467743
-
-
B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In Proc. of the OTM Workshops number, pages 1734-1744, 2006.
-
B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In Proc. of the OTM Workshops number, pages 1734-1744, 2006.
-
-
-
-
7
-
-
70349253957
-
Preserving confidentiality of security policies in data outsourcing
-
New York, NY, USA, ACM
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, and P. Samarati. Preserving confidentiality of security policies in data outsourcing. In WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society, pages 75-84, New York, NY, USA, 2008. ACM.
-
(2008)
WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society
, pp. 75-84
-
-
De Capitani di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
8
-
-
27544439248
-
-
L. Ding, L. Zhou, T. Finin, and A. Joshi. How the semantic web is being used: An analysis of foaf documents. In Proc. of the, 113(3), 2005.
-
L. Ding, L. Zhou, T. Finin, and A. Joshi. How the semantic web is being used: An analysis of foaf documents. In Proc. of the, 113(3), 2005.
-
-
-
-
9
-
-
37249047452
-
A public-key protocol for social networks with private relationships. in
-
August
-
J. Domingo-Ferrer. A public-key protocol for social networks with private relationships. in Lecture Notes in Computer Science, pages 373-379, August 2007.
-
(2007)
Lecture Notes in Computer Science
, pp. 373-379
-
-
Domingo-Ferrer, J.1
-
12
-
-
84859194833
-
Resisting structural re-identification in anonymized social networks
-
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. Proceedings of the VLDB Endowment, 1(1):102-114, 2008.
-
(2008)
Proceedings of the VLDB Endowment
, vol.1
, Issue.1
, pp. 102-114
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.4
Weis, P.5
-
15
-
-
74049112106
-
Privacy preserving in social networks against sensitive edge disclosure
-
006-08, Department of Computer Science, University of Kentucky
-
L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preserving in social networks against sensitive edge disclosure. Technical Report CMIDA-HiPSCCS 006-08, Department of Computer Science, University of Kentucky, 2008.
-
(2008)
Technical Report CMIDA-HiPSCCS
-
-
Liu, L.1
Wang, J.2
Liu, J.3
Zhang, J.4
|