메뉴 건너뛰기




Volumn , Issue , 2010, Pages 239-246

Trust-involved access control in collaborative open social networks

Author keywords

Access control; Privacy; Purpose

Indexed keywords

ACCESS CONTROL MODELS; ACCESS CONTROL POLICIES; ACCESS POLICIES; ACCESS RIGHTS; KEY COMPONENT; MANAGEMENT FRAMEWORKS; PERSONALLY IDENTIFIABLE INFORMATION; PRIVACY; PRIVACY PRESERVING; PURPOSE; SOCIAL NETWORKS;

EID: 78650361076     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2010.13     Document Type: Conference Paper
Times cited : (49)

References (25)
  • 4
    • 70350406398 scopus 로고    scopus 로고
    • Enforcing access control in Web-based social networks
    • Oct. 2009
    • Carminati, B., Ferrari, E., and Perego, A. 2009. Enforcing access control in Web-based social networks. ACM Trans. Inf. Syst. Secur. 13, 1 (Oct. 2009), 1-38.
    • (2009) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.1 , pp. 1-38
    • Carminati, B.1    Ferrari, E.2    Perego, A.3
  • 5
    • 78650354352 scopus 로고    scopus 로고
    • the Amherst Student. Available at, October
    • Chen, L: Facebooks Feeds Cause Privacy Concerns. the Amherst Student. Available at: http://halogen.note.amherst.edu/astudent/2006-2007/issue02/news/ 01.html, October 2006.
    • (2006) Facebooks Feeds Cause Privacy Concerns
    • Chen, L.1
  • 7
    • 70349334415 scopus 로고    scopus 로고
    • Social network privacy via evolving access control
    • Proceedings of the 4th international Conference on Wireless Algorithms, Systems, and Applications (Boston, MA, August 16-18, 2009). B. Liu, A. Bestavros, D. Du, and J. Wang, Eds. Springer-Verlag
    • Crescenzo, G. and Lipton, R. J. 2009. Social Network Privacy via Evolving Access Control. In Proceedings of the 4th international Conference on Wireless Algorithms, Systems, and Applications (Boston, MA, August 16-18, 2009). B. Liu, A. Bestavros, D. Du, and J. Wang, Eds. LCSN, vol. 5682. Springer-Verlag, 551-560.
    • (2009) LCSN , vol.5682 , pp. 551-560
    • Crescenzo, G.1    Lipton, R.J.2
  • 8
    • 84873621535 scopus 로고    scopus 로고
    • Access control requirements for web 2.0 security and privacy
    • Position paper accepted to the. Oakland, California, United States
    • Gates, C. 2007. Access Control Requirements for Web 2.0 Security and Privacy. Position paper accepted to the Workshop on Web 2.0 Security and Privacy. Oakland, California, United States.
    • (2007) Workshop on Web 2.0 Security and Privacy
    • Gates, C.1
  • 9
    • 85009714348 scopus 로고    scopus 로고
    • Trust and nuanced profi le similarity in online social networks
    • Sep. 2009
    • Golbeck, J. 2009. Trust and nuanced profi le similarity in online social networks. ACM Trans. Web 3, 4 (Sep. 2009), 1-33. DOI= http://doi.acm.org/10. 1145/1594173.1594174
    • (2009) ACM Trans. Web , vol.3 , Issue.4 , pp. 1-33
    • Golbeck, J.1
  • 11
    • 85009714348 scopus 로고    scopus 로고
    • Trust and nuanced profi le similarity in online social networks
    • Golbeck, J. 2009. Trust and nuanced profi le similarity in online social networks, ACM Trans. Web, vol. 3 (4), 133.
    • (2009) ACM Trans. Web , vol.3 , Issue.4 , pp. 133
    • Golbeck, J.1
  • 14
    • 33750231847 scopus 로고    scopus 로고
    • D-FOAF: Distributed identity management with access rights delegation
    • Mizoguchi, R.; Shi, Z.; Giunchiglia, F., Eds.; Springer Berlin Heidelberg
    • Kruk, S.; Grzonkowski, S.; Gzella, A.; Woroniecki, T.; Choi, H.-C. D-FOAF: Distributed Identity Management with Access Rights Delegation. In The Semantic Web ASWC 2006, Vol. 4185; Mizoguchi, R.; Shi, Z.; Giunchiglia, F., Eds.; Springer Berlin Heidelberg: 2006.
    • (2006) The Semantic Web ASWC 2006 , vol.4185
    • Kruk, S.1    Grzonkowski, S.2    Gzella, A.3    Woroniecki, T.4    Choi, H.-C.5
  • 17
    • 38049002527 scopus 로고    scopus 로고
    • Conditional privacy-aware role based access control
    • Ni, Q., Lin, D., Bertino, E. and Lobo, J. 2007. Conditional privacy-aware role based access control. ESORICS, 72-89.
    • (2007) ESORICS , pp. 72-89
    • Ni, Q.1    Lin, D.2    Bertino, E.3    Lobo, J.4
  • 21
    • 85056545124 scopus 로고    scopus 로고
    • Limiting the disclosure of access control policies during automated trust negotiation
    • Seamons, K., Winslett, M. and Yu, T. 2001. Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. Proc. of NDSS01. 109-125.
    • (2001) Proc. of NDSS01 , pp. 109-125
    • Seamons, K.1    Winslett, M.2    Yu, T.3
  • 23
    • 66149170246 scopus 로고    scopus 로고
    • TKDE09. Effective collaboration with information sharing in virtual universities
    • Wang, H., Zhang Y. and Cao, J. TKDE09. Effective collaboration with information sharing in virtual universities, IEEE Transactions on Knowledge and Data Engineering, Vol. 21(6), 840-853.
    • IEEE Transactions on Knowledge and Data Engineering , vol.21 , Issue.6 , pp. 840-853
    • Wang, H.1    Zhang, Y.2    Cao, J.3
  • 24
    • 46849089265 scopus 로고    scopus 로고
    • Access control management for ubiquitous computing
    • October, 2008
    • Wang, H., Cao, J. and Zhang, Y. 2008b. Access control management for ubiquitous computing, Future Generation Computer Systems, Vol. 24, Issue 8, Pages: 870-878, October, 2008
    • (2008) Future Generation Computer Systems , vol.24 , Issue.8 , pp. 870-878
    • Wang, H.1    Cao, J.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.