메뉴 건너뛰기




Volumn , Issue , 2009, Pages 11-19

Key allocation schemes for private social networks

Author keywords

Access control; Key management; Privacy; Social networks

Indexed keywords

ACCESS CONTROL MODELS; ACCESS POLICIES; COLLUSION RESISTANT; INDISTINGUISHABILITY; KEY MANAGEMENT; PRIVACY; RANDOM VALUES; SOCIAL NETWORKING; SOCIAL NETWORKS; TRUSTED THIRD PARTIES;

EID: 74049157366     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1655188.1655191     Document Type: Conference Paper
Times cited : (9)

References (18)
  • 3
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
    • L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In International Conference on World Wide Web (WWW'08), pages 181-190, 2007.
    • (2007) International Conference on World Wide Web (WWW'08) , pp. 181-190
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.3
  • 4
    • 50249104379 scopus 로고    scopus 로고
    • B. Carminati and E.: Ferrari. Privacy-aware collaborative access control in web-based social networks. In V, editor, Atluri, pages 81-96. Springer, V., ed.: DBSec. 5094 of Lecture Notes in Com-puter Science., : DBSec. 5094 of Lecture Notes in Com-puter Science., Springer, 2008.
    • B. Carminati and E.: Ferrari. Privacy-aware collaborative access control in web-based social networks. In V, editor, Atluri, pages 81-96. Springer, V., ed.: DBSec. Volume 5094 of Lecture Notes in Com-puter Science., : DBSec. Volume 5094 of Lecture Notes in Com-puter Science., Springer, 2008.
  • 5
    • 33845467743 scopus 로고    scopus 로고
    • B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In Proc. of the OTM Workshops number, pages 1734-1744, 2006.
    • B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In Proc. of the OTM Workshops number, pages 1734-1744, 2006.
  • 6
    • 48349137689 scopus 로고    scopus 로고
    • Private relationships in social networks
    • B. Carminati, E. Ferrari, and A. Perego. Private relationships in social networks. in ICDE Workshops, pages 163-171, 2007.
    • (2007) ICDE Workshops , pp. 163-171
    • Carminati, B.1    Ferrari, E.2    Perego, A.3
  • 8
    • 27544439248 scopus 로고    scopus 로고
    • L. Ding, L. Zhou, T. Finin, and A. Joshi. How the semantic web is being used: An analysis of foaf documents. In Proc. of the, 113(3), 2005.
    • L. Ding, L. Zhou, T. Finin, and A. Joshi. How the semantic web is being used: An analysis of foaf documents. In Proc. of the, 113(3), 2005.
  • 9
    • 37249047452 scopus 로고    scopus 로고
    • A public-key protocol for social networks with private relationships. in
    • August
    • J. Domingo-Ferrer. A public-key protocol for social networks with private relationships. in Lecture Notes in Computer Science, pages 373-379, August 2007.
    • (2007) Lecture Notes in Computer Science , pp. 373-379
    • Domingo-Ferrer, J.1
  • 15
    • 74049112106 scopus 로고    scopus 로고
    • Privacy preserving in social networks against sensitive edge disclosure
    • 006-08, Department of Computer Science, University of Kentucky
    • L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preserving in social networks against sensitive edge disclosure. Technical Report CMIDA-HiPSCCS 006-08, Department of Computer Science, University of Kentucky, 2008.
    • (2008) Technical Report CMIDA-HiPSCCS
    • Liu, L.1    Wang, J.2    Liu, J.3    Zhang, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.