메뉴 건너뛰기




Volumn 12, Issue 4, 2009, Pages 461-484

Erratum to: Web-traveler policies for images on social networks (World Wide Web,(10.1007/s11280-009-0070-8);Web-traveler policies for images on social networks

Author keywords

Access control policy; Privacy; Social networks

Indexed keywords

ACCESS CONTROL; DATA PRIVACY;

EID: 76449113515     PISSN: 1386145X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11280-010-0085-1     Document Type: Erratum
Times cited : (11)

References (38)
  • 1
    • 84864155005 scopus 로고    scopus 로고
    • ABC Media Watch, Australian Broadcasting Corporation (ABC), 29 October 07, Accessed October
    • ABC Media Watch, Filleting Facebook. Australian Broadcasting Corporation (ABC), 29 October 07 http://www. abc. net. au/mediawatch/ transcripts/s2074079. htm. Accessed October 2008.
    • (2008) Filleting Facebook
  • 2
    • 77049099362 scopus 로고    scopus 로고
    • Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook
    • Cambridge, U. K: Robinson College, June 28-30
    • Acquisti, A., Gross, R.: Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Proceedings of 6th Workshop on Privacy Enhancing Technologies (pp. 36-58). Cambridge, U. K: Robinson College, June 28-30.
    • Proceedings of 6th Workshop on Privacy Enhancing Technologies , pp. 36-58
    • Acquisti, A.1    Gross, R.2
  • 5
    • 50249104379 scopus 로고    scopus 로고
    • Privacy-aware collaborative access control in Web-based social networks
    • Carminati, B., Ferrari, E. Privacy-aware collaborative access control in Web-based social networks. In DBSec, pp. 81-96 (2008).
    • (2008) DBSec , pp. 81-96
    • Carminati, B.1    Ferrari, E.2
  • 8
    • 50249096202 scopus 로고    scopus 로고
    • Implementation of ubiquitous personal study using Web 2.0 mash-up and OSS technologies
    • Chen, H., i Ikeuchi, N., Jin, Q.: Implementation of ubiquitous personal study using Web 2.0 mash-up and OSS technologies. AINA Workshops 1573-1578 (2008).
    • (2008) AINA Workshops , pp. 1573-1578
    • Chen, H.1    i Ikeuchi, N.2    Jin, Q.3
  • 9
    • 84864158382 scopus 로고    scopus 로고
    • "DRM vs. ERM: Battle to Control Data", Network World". Retrieved on 2008-04-02
    • "DRM vs. ERM: Battle to Control Data", Network World". Retrieved on 2008-04-02.
  • 10
    • 84870159064 scopus 로고    scopus 로고
    • Trust and Privacy concern within social networking sites: A comparison of Facebook and MySpace
    • Keystone, CO
    • Dwyer, C., Hiltz, R., Passerini K.: Trust and Privacy concern within social networking sites: A comparison of Facebook and MySpace. Proceedings of AMCIS 2007, Keystone, CO, (2007).
    • (2007) Proceedings of AMCIS 2007
    • Dwyer, C.1    Hiltz, R.2    Passerini, K.3
  • 11
    • 46249105455 scopus 로고    scopus 로고
    • Accessed December
    • Facebook. www. facebook. com. Accessed December (2008).
    • (2008) Facebook
  • 15
    • 84864156976 scopus 로고    scopus 로고
    • Google's OpenSocial could invite trouble. Forbes. com, November 14
    • Google's OpenSocial could invite trouble. Forbes. com, November 14, 2007. https://hackinthebox. org/modules. php?op=modload& name=News& file=article& sid=24852.
    • (2007)
  • 16
    • 84864156977 scopus 로고    scopus 로고
    • Google Opensocial-google code
    • A. Greenberg Google Opensocial-google code, 2007. < http://code. google. com/apis/opensocial/. >.
    • (2007)
    • Greenberg, A.1
  • 19
    • 72449167636 scopus 로고    scopus 로고
    • Security issues and recommendations for online social networks
    • Hobgen, G.: Security issues and recommendations for online social networks. Position Paper ENISA (2007).
    • (2007) Position Paper ENISA
    • Hobgen, G.1
  • 23
    • 38349087182 scopus 로고    scopus 로고
    • Control-theoretic analysis of admission control mechanisms for web server systems
    • Kihl, M., Robertsson, A., Andersson, A., Wittenmark, B.: Control-theoretic analysis of admission control mechanisms for Web server systems. World Wide Web 11(1), 93-116 (2008).
    • (2008) World Wide Web , vol.11 , Issue.1 , pp. 93-116
    • Kihl, M.1    Robertsson, A.2    Andersson, A.3    Wittenmark, B.4
  • 24
    • 36949018193 scopus 로고    scopus 로고
    • Challenges in mining social network data: Processes, privacy, and paradoxes
    • San Jose, CA
    • Kleinberg, J. M.: Challenges in mining social network data: processes, privacy, and paradoxes. In Proc. 13th ACM SIGKDD, San Jose, CA, (2007).
    • (2007) Proc. 13th ACM SIGKDD
    • Kleinberg, J.M.1
  • 25
    • 76449094294 scopus 로고    scopus 로고
    • (February 3), Retrieved on 2006-08-28
    • Levy, C. (February 3, 2003). Making Money with Streaming Media. www. streamingmedia. com. Retrieved on 2006-08-28.
    • (2003) Making Money with Streaming Media
    • Levy, C.1
  • 26
    • 57349172003 scopus 로고    scopus 로고
    • Privacy-enhanced sharing of personal content on the Web
    • Mannan, M., van Oorschot, P. C.: Privacy-enhanced sharing of personal content on the Web. In ACM World Wide Web Conference, pp. 487-496, (2008).
    • (2008) ACM World Wide Web Conference , pp. 487-496
    • Mannan, M.1    van Oorschot, P.C.2
  • 29
    • 84864158218 scopus 로고    scopus 로고
    • October 2006
    • Ort, E., Basler, M.: Ajax Design Strategies. October 2006 < http://java. sun. com/developer/technicalArticles/J2EE/AJAX/DesignStrategies >.
    • Ajax Design Strategies
    • Ort, E.1    Basler, M.2
  • 30
    • 84864155588 scopus 로고    scopus 로고
    • January
    • Ort, E.: Introduction to Ajax for page authors. January 2007. < http://java. sun. com/developer/technicalArticles/J2EE/AJAX/IntroAjaxPageAuthors. html >.
    • (2007) Introduction to Ajax for page authors
    • Ort, E.1
  • 31
    • 84899215051 scopus 로고    scopus 로고
    • Oasis Committee
    • Oasis Committee. XACML 2.0 Specification. http://www. oasis-open. org/committees/tc_home. php?wg_abbrev=xacml#XACML20.
    • XACML 2.0 Specification
  • 35
    • 3543064171 scopus 로고    scopus 로고
    • Automatic annotation and retrieval of images
    • Song, Y., Wang, W., Zhang, A.: Automatic annotation and retrieval of images. World Wide Web 6(2), 209-231 (2003).
    • (2003) World Wide Web , vol.6 , Issue.2 , pp. 209-231
    • Song, Y.1    Wang, W.2    Zhang, A.3
  • 36
    • 84864158379 scopus 로고    scopus 로고
    • The Drupal Platform, Accessed December 11
    • The Drupal Platform. www. drupal. org. Accessed December 11, 2008.
    • (2008)
  • 37
    • 3543051281 scopus 로고    scopus 로고
    • A security architecture for mobile agent based applications
    • Varadharajan, V., Foster, D.: A security architecture for mobile agent based applications. World Wide Web 6(1), 93-122 (2003).
    • (2003) World Wide Web , vol.6 , Issue.1 , pp. 93-122
    • Varadharajan, V.1    Foster, D.2
  • 38
    • 33749620015 scopus 로고    scopus 로고
    • Mining social networks for targeted advertising. 39th Hawaii International Conference on Systems Science
    • Yang, W. S., Dia, J. B., Cheng, H. C., Lin, H. T.: Mining social networks for targeted advertising. 39th Hawaii International Conference on Systems Science, IEEE Computer Society (2006).
    • (2006) IEEE Computer Society
    • Yang, W.S.1    Dia, J.B.2    Cheng, H.C.3    Lin, H.T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.