-
1
-
-
51849123990
-
What is Web 2.0: Design patterns and business models for the next generation of software
-
T. Oreilly, "What is Web 2.0: Design patterns and business models for the next generation of software," Communications and Strategies, No.1, p. 17, 2007.
-
(2007)
Communications and Strategies
, Issue.1
, pp. 17
-
-
Oreilly, T.1
-
3
-
-
0003593599
-
-
September Online. Available
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, "SPKI certificate theory," September 1999. [Online]. Available: http://www.ietf.org/rfc/rfc2693.txt
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
4
-
-
0036085965
-
Design of a role-based trust-management framework
-
N. Li, J. C. Mitchell, and W. H. Winsborough, "Design of a role-based trust-management framework," in SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002, p. 114.
-
SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
, pp. 114
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
5
-
-
33745858717
-
Share and share alike: Exploring the user interface affordances of file sharing
-
New York, NY, USA: ACM
-
S. Voida, W. K. Edwards, M. W. Newman, R. E. Grinter, and N. Ducheneaut, "Share and share alike: exploring the user interface affordances of file sharing," in Proceedings of the SIGCHI conference on Human Factors in computing systems CHI '06:. New York, NY, USA: ACM, 2006, pp. 221-230.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems CHI '06
, pp. 221-230
-
-
Voida, S.1
Edwards, W.K.2
Newman, M.W.3
Grinter, R.E.4
Ducheneaut, N.5
-
6
-
-
70849095240
-
-
Ph.D. Dissertation, Dalhousie University, Canada, Online. Available
-
T. Whalen, "Supporting file sharing through improved awareness," Ph.D. Dissertation, Dalhousie University, Canada, 2008. [Online]. Available: http://www.proquest.com/
-
(2008)
Supporting File Sharing Through Improved Awareness
-
-
Whalen, T.1
-
7
-
-
35348892168
-
Give and take: A study of consumer photo-sharing culture and practice
-
A. D. Miller and W. K. Edwards, "Give and take: A study of consumer photo-sharing culture and practice," in Proceedings of the CHI 2007, San Jose, California, USA, April 28 -May 3 2007, pp. 347-356.
-
Proceedings of the CHI 2007, San Jose, California, USA, April 28 -May 3 2007
, pp. 347-356
-
-
Miller, A.D.1
Edwards, W.K.2
-
9
-
-
84869136735
-
A study of preferences for sharing and privacy
-
New York, NY, USA: ACM
-
J. S. Olson, J. Grudin, and E. Horvitz, "A study of preferences for sharing and privacy," in CHI '05 extended abstracts on Human factors in computing systems (CHI '05). New York, NY, USA: ACM, 2005, pp. 1985-1988.
-
(2005)
CHI '05 Extended Abstracts on Human Factors in Computing Systems (CHI '05)
, pp. 1985-1988
-
-
Olson, J.S.1
Grudin, J.2
Horvitz, E.3
-
10
-
-
35348884906
-
A large-scale study of web password habits
-
New York, NY, USA: ACM
-
D. Florencio and C. Herley, "A large-scale study of web password habits," in WWW '07: Proceedings of the 16th international conference on World Wide Web. New York, NY, USA: ACM, 2007, pp. 657-666.
-
(2007)
WWW '07: Proceedings of the 16th International Conference on World Wide Web
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
11
-
-
0242456748
-
Models for coalition-based access control (cbac)
-
E. Cohen, R. K. Thomas, W. Winsborough, and D. Shands, "Models for coalition-based access control (cbac)," in Proceedings of the seventh ACM symposium on access control models and technologies, Monterey, California, USA, 2002, pp. 97-106.
-
Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, Monterey, California, USA, 2002
, pp. 97-106
-
-
Cohen, E.1
Thomas, R.K.2
Winsborough, W.3
Shands, D.4
-
12
-
-
76549094940
-
-
Internet2, "Shibboleth System," http://shibboleth.internet2. edu/, 2008.
-
(2008)
Shibboleth System
-
-
-
14
-
-
78751527658
-
EmID: Web authentication by email address
-
B. Adida, "EmID: Web authentication by email address," in Proceedings of Web 2.0 Security and Privacy Workshop 2008, Oakland, California, USA, 2008.
-
Proceedings of Web 2.0 Security and Privacy Workshop 2008, Oakland, California, USA, 2008
-
-
Adida, B.1
-
15
-
-
0029700344
-
Decentralized trust management
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in the 1996 IEEE Symposium on Security and Privacy, Washington DC, USA, 1996, pp. 164-173.
-
The 1996 IEEE Symposium on Security and Privacy, Washington DC, USA, 1996
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
16
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-based access control models," IEEE Computer, vol.29, no.2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
17
-
-
77950821443
-
-
Microsoft Corporation
-
Microsoft Corporation, "Microsoft Live Mesh," https://www.mesh.com/, 2009.
-
(2009)
Microsoft Live Mesh
-
-
-
19
-
-
2942747447
-
YouServ: A web-hosting and content sharing tool for the masses
-
New York, NY, USA: ACM
-
R. J. Bayardo Jr., R. Agrawal, D. Gruhl, and A. Somani, "YouServ: a web-hosting and content sharing tool for the masses," in Proceedings of the 11th international conference on World Wide Web. New York, NY, USA: ACM, 2002, pp. 345-354.
-
(2002)
Proceedings of the 11th International Conference on World Wide Web
, pp. 345-354
-
-
Bayardo Jr., R.J.1
Agrawal, R.2
Gruhl, D.3
Somani, A.4
-
22
-
-
58049120066
-
Rule-based access control for social networks
-
LNCS, Springer-Verlag
-
B. Carminati, E. Ferrari, and A. Perego, "Rule-based access control for social networks," in On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. LNCS, Springer-Verlag, 2006.
-
(2006)
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
23
-
-
70249140248
-
Lockr: Social access control for web 2.0
-
A. Tootoonchian, K. K. Gollu, S. Saroiu, Y. Ganjali, and A. Wolman, "Lockr: social access control for web 2.0," in Proceedings of the first workshop on Online social networks, Seattle, WA, USA, 2008, pp. 43-48.
-
Proceedings of the First Workshop on Online Social Networks, Seattle, WA, USA, 2008
, pp. 43-48
-
-
Tootoonchian, A.1
Gollu, K.K.2
Saroiu, S.3
Ganjali, Y.4
Wolman, A.5
-
24
-
-
77950838306
-
Open problems in Web 2.0 user content sharing
-
S.-T. Sun and K. Beznosov, "Open problems in Web 2.0 user content sharing," in Proceedings of the iNetSec Workshop, Zurich, Switzerland, April 23th 2009.
-
Proceedings of the INetSec Workshop, Zurich, Switzerland, April 23th 2009
-
-
Sun, S.-T.1
Beznosov, K.2
-
25
-
-
77950839369
-
-
June
-
D. Fuelling and W. Norris, "Email Address to URL Transformation 1.0," http://eaut.org/specs/1.0/, June 2008.
-
(2008)
-
-
Fuelling, D.1
Norris, W.2
-
27
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
N. Li, W. H. Winsborough, , and J. C. Mitchell, "Distributed credential chain discovery in trust management," Journal of Computer Security, vol.11, no.1, pp. 35-86, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
28
-
-
34548786769
-
The emperor's new security indicators
-
Washington, DC, USA: IEEE Computer Society
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, "The emperor's new security indicators," in Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2007, pp. 51-65.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
29
-
-
33745816410
-
Why phishing works
-
New York, NY, USA: ACM
-
R. Dhamija, J. D. Tygar, and M. Hearst, "Why phishing works," in CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems. New York, NY, USA: ACM, 2006, pp. 581-590.
-
(2006)
CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
30
-
-
54049142548
-
Security and identification indicators for browsers against spoofing and phishing attacks
-
A. Herzberg and A. Jbara, "Security and identification indicators for browsers against spoofing and phishing attacks," ACM Trans. Interet Technology., vol.8, no.4, pp. 1-36, 2008.
-
(2008)
ACM Trans. Interet Technology
, vol.8
, Issue.4
, pp. 1-36
-
-
Herzberg, A.1
Jbara, A.2
-
31
-
-
77953804362
-
The battle against phishing: Dynamic security skins
-
New York, NY, USA: ACM
-
R. Dhamija and J. D. Tygar, "The battle against phishing: Dynamic security skins," in SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security. New York, NY, USA: ACM, 2005, pp. 77-88.
-
(2005)
SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.D.2
-
32
-
-
34250786200
-
Web wallet: Preventing phishing attacks by revealing user intentions
-
New York, NY, USA: ACM
-
M. Wu, R. C. Miller, and G. Little, "Web wallet: preventing phishing attacks by revealing user intentions," in SOUPS '06: Proceedings of the second symposium on Usable privacy and security. New York, NY, USA: ACM, 2006, pp. 102-113.
-
(2006)
SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
-
34
-
-
84898190494
-
Phinding phish: Evaluating anti-phishing tools
-
Y. Zhang, S. Egelma, L. Cranor, and J. Hong, "Phinding phish: Evaluating anti-phishing tools," in Proceedings of the 14th Annual Network and Distibuted System Security Symposium (NDSS 2007), 2007.
-
Proceedings of the 14th Annual Network and Distibuted System Security Symposium (NDSS 2007), 2007
-
-
Zhang, Y.1
Egelma, S.2
Cranor, L.3
Hong, J.4
-
35
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
New York, NY, USA: ACM
-
M. Wu, R. C. Miller, and S. L. Garfinkel, "Do security toolbars actually prevent phishing attacks?" in Proceedings of the SIGCHI conference on Human Factors in computing systems(CHI '06). New York, NY, USA: ACM, 2006, pp. 601-610.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '06)
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
36
-
-
77950854725
-
-
J. Bufu, "Openid4java," http://code.sxip.com/openid4java/, 2009.
-
(2009)
Openid4java
-
-
Bufu, J.1
-
37
-
-
57349189402
-
Authorization recycling in RBAC systems
-
Estes Park, Colorado, USA: ACM, June 11-13 Online. Available
-
Q. Wei, J. Crampton, K. Beznosov, and M. Ripeanu, "Authorization recycling in RBAC systems," in Proceedings of the thirteenth ACM Symposium on Access Control Models and Technologies (SACMAT). Estes Park, Colorado, USA: ACM, June 11-13 2008, pp. 63-72. [Online]. Available: http://doi.acm.org/10. 1145/1377836.1377848
-
(2008)
Proceedings of the Thirteenth ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 63-72
-
-
Wei, Q.1
Crampton, J.2
Beznosov, K.3
Ripeanu, M.4
|