-
1
-
-
0242674432
-
Hippocratic atabases
-
Agrawal, R., Kiernan, J., Srikant, R. and Xu,Y. 2002. Hippocratic atabases. Proceedings of the 28th International Conference on Very Large Databases (VLDB).
-
(2002)
Proceedings of the 28th International Conference on Very Large Databases (VLDB)
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
70349085043
-
A trust based approach for protecting user data in social networks
-
Richmond Hill, Ontario, Canada
-
Ali, B., Villegas,W. and Maheswaran, M. (2007). A trust based approach for protecting user data in social networks. Proceedings of Conference of the Center for Advanced Studies on Collaborative research (CASCON07), Richmond Hill, Ontario, Canada.
-
(2007)
Proceedings of Conference of the Center for Advanced Studies on Collaborative Research (CASCON07)
-
-
Ali, B.1
Villegas, W.2
Maheswaran, M.3
-
4
-
-
70350406398
-
Enforcing access control in Web-based social networks
-
Oct. 2009
-
Carminati, B., Ferrari, E., and Perego, A. 2009. Enforcing access control in Web-based social networks. ACM Trans. Inf. Syst. Secur. 13, 1 (Oct. 2009), 1-38.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.1
, pp. 1-38
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
5
-
-
78650354352
-
-
the Amherst Student. Available at, October
-
Chen, L: Facebooks Feeds Cause Privacy Concerns. the Amherst Student. Available at: http://halogen.note.amherst.edu/astudent/2006-2007/issue02/news/ 01.html, October 2006.
-
(2006)
Facebooks Feeds Cause Privacy Concerns
-
-
Chen, L.1
-
7
-
-
70349334415
-
Social network privacy via evolving access control
-
Proceedings of the 4th international Conference on Wireless Algorithms, Systems, and Applications (Boston, MA, August 16-18, 2009). B. Liu, A. Bestavros, D. Du, and J. Wang, Eds. Springer-Verlag
-
Crescenzo, G. and Lipton, R. J. 2009. Social Network Privacy via Evolving Access Control. In Proceedings of the 4th international Conference on Wireless Algorithms, Systems, and Applications (Boston, MA, August 16-18, 2009). B. Liu, A. Bestavros, D. Du, and J. Wang, Eds. LCSN, vol. 5682. Springer-Verlag, 551-560.
-
(2009)
LCSN
, vol.5682
, pp. 551-560
-
-
Crescenzo, G.1
Lipton, R.J.2
-
8
-
-
84873621535
-
Access control requirements for web 2.0 security and privacy
-
Position paper accepted to the. Oakland, California, United States
-
Gates, C. 2007. Access Control Requirements for Web 2.0 Security and Privacy. Position paper accepted to the Workshop on Web 2.0 Security and Privacy. Oakland, California, United States.
-
(2007)
Workshop on Web 2.0 Security and Privacy
-
-
Gates, C.1
-
9
-
-
85009714348
-
Trust and nuanced profi le similarity in online social networks
-
Sep. 2009
-
Golbeck, J. 2009. Trust and nuanced profi le similarity in online social networks. ACM Trans. Web 3, 4 (Sep. 2009), 1-33. DOI= http://doi.acm.org/10. 1145/1594173.1594174
-
(2009)
ACM Trans. Web
, vol.3
, Issue.4
, pp. 1-33
-
-
Golbeck, J.1
-
11
-
-
85009714348
-
Trust and nuanced profi le similarity in online social networks
-
Golbeck, J. 2009. Trust and nuanced profi le similarity in online social networks, ACM Trans. Web, vol. 3 (4), 133.
-
(2009)
ACM Trans. Web
, vol.3
, Issue.4
, pp. 133
-
-
Golbeck, J.1
-
14
-
-
33750231847
-
D-FOAF: Distributed identity management with access rights delegation
-
Mizoguchi, R.; Shi, Z.; Giunchiglia, F., Eds.; Springer Berlin Heidelberg
-
Kruk, S.; Grzonkowski, S.; Gzella, A.; Woroniecki, T.; Choi, H.-C. D-FOAF: Distributed Identity Management with Access Rights Delegation. In The Semantic Web ASWC 2006, Vol. 4185; Mizoguchi, R.; Shi, Z.; Giunchiglia, F., Eds.; Springer Berlin Heidelberg: 2006.
-
(2006)
The Semantic Web ASWC 2006
, vol.4185
-
-
Kruk, S.1
Grzonkowski, S.2
Gzella, A.3
Woroniecki, T.4
Choi, H.-C.5
-
15
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y. and DeWitt, D. 2004. Limiting disclosure in hippocratic databases. Proceedings of the 13th VLDB conferenc. 108-119.
-
(2004)
Proceedings of the 13th VLDB Conferenc
, pp. 108-119
-
-
Lefevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
Dewitt, D.6
-
16
-
-
78650348520
-
Optimal privacyaware path in hippocratic databases
-
April 21-23, Brisbane, Australia
-
Li M., Sun X., Wang H. and Zhang Y., Optimal Privacyaware Path in Hippocratic Databases, The 14th International Conference on Database Systems for Advanced Applications( DASFAA2009), April 21-23, 2009, Brisbane, Australia.
-
(2009)
The 14th International Conference on Database Systems for Advanced Applications( DASFAA2009)
-
-
Li, M.1
Sun, X.2
Wang, H.3
Zhang, Y.4
-
17
-
-
38049002527
-
Conditional privacy-aware role based access control
-
Ni, Q., Lin, D., Bertino, E. and Lobo, J. 2007. Conditional privacy-aware role based access control. ESORICS, 72-89.
-
(2007)
ESORICS
, pp. 72-89
-
-
Ni, Q.1
Lin, D.2
Bertino, E.3
Lobo, J.4
-
18
-
-
34548016110
-
Privacyaware role based access control
-
France
-
Ni, Q., Trombetta, A., Bertino, E., and Lobo, J. 2007. Privacyaware role based access control. Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. France, 41-50.
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
21
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
Seamons, K., Winslett, M. and Yu, T. 2001. Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. Proc. of NDSS01. 109-125.
-
(2001)
Proc. of NDSS01
, pp. 109-125
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
-
23
-
-
66149170246
-
TKDE09. Effective collaboration with information sharing in virtual universities
-
Wang, H., Zhang Y. and Cao, J. TKDE09. Effective collaboration with information sharing in virtual universities, IEEE Transactions on Knowledge and Data Engineering, Vol. 21(6), 840-853.
-
IEEE Transactions on Knowledge and Data Engineering
, vol.21
, Issue.6
, pp. 840-853
-
-
Wang, H.1
Zhang, Y.2
Cao, J.3
-
24
-
-
46849089265
-
Access control management for ubiquitous computing
-
October, 2008
-
Wang, H., Cao, J. and Zhang, Y. 2008b. Access control management for ubiquitous computing, Future Generation Computer Systems, Vol. 24, Issue 8, Pages: 870-878, October, 2008
-
(2008)
Future Generation Computer Systems
, vol.24
, Issue.8
, pp. 870-878
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
|