메뉴 건너뛰기




Volumn , Issue , 2011, Pages 113-122

Modeling data flow in socio-information networks: A risk estimation approach

Author keywords

Access control; Risk estimation; Social network

Indexed keywords

BLOGOSPHERES; CONFIGURABLE; FACEBOOK; INFORMATION FLOWS; INFORMATION LEAKAGE; INSIDER THREAT; MALICIOUS INSIDERS; MODELING DATA; NETWORK EVOLUTION; NETWORK-CENTRIC; OBJECT O; REAL LIFE DATASETS; RISK ESTIMATION; SOCIAL NETWORKS; SOCIAL RELATIONSHIPS; STATISTICAL RISK;

EID: 79960177943     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1998441.1998458     Document Type: Conference Paper
Times cited : (11)

References (25)
  • 1
    • 79960162405 scopus 로고    scopus 로고
    • Network-centric access control: Models and techniques
    • Network-centric access control: models and techniques. Georgia Tech Technical Report, GIT-CERCS-10-08, http://www.cercs.gatech.edu/tech-reports/.
    • Georgia Tech Technical Report, GIT-CERCS-10-08
  • 4
    • 70449625216 scopus 로고    scopus 로고
    • Automatic discovery and quantification of information leaks
    • M. Backes, B. Kopf, and A. Rybalchenko. Automatic discovery and quantification of information leaks. In SP, 2009.
    • (2009) SP
    • Backes, M.1    Kopf, B.2    Rybalchenko, A.3
  • 5
    • 56349097648 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • D. E. Bell and L. J. LaPadula. Secure computer system: unified exposition and multics interpretation. In MITRE Corporation, 1976.
    • (1976) MITRE Corporation
    • Bell, D.E.1    Lapadula, L.J.2
  • 7
    • 36648999518 scopus 로고
    • The chinese wall security policy
    • D. D. F. Brewer and D. M. J. Nash. The chinese wall security policy. SP, 1989.
    • (1989) SP
    • Brewer, D.D.F.1    Nash, D.M.J.2
  • 8
    • 79952798687 scopus 로고    scopus 로고
    • A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks
    • B. Carminati, E. Ferrari, S. Morasca, and D. Taibi. A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks. In CODASPY, 2011.
    • (2011) CODASPY
    • Carminati, B.1    Ferrari, E.2    Morasca, S.3    Taibi, D.4
  • 11
    • 33745801960 scopus 로고    scopus 로고
    • Understanding and developing role-based administrative models
    • J. Crampton. Understanding and developing role-based administrative models. In CCS, 2005.
    • (2005) CCS
    • Crampton, J.1
  • 13
    • 0015330635 scopus 로고
    • Theoretical improvements in algorithmic efficiency for network flow problems
    • J. Edmonds and R. M. Karp. Theoretical improvements in algorithmic efficiency for network flow problems. J. ACM, 19(2):248-264, 1972.
    • (1972) J. ACM , vol.19 , Issue.2 , pp. 248-264
    • Edmonds, J.1    Karp, R.M.2
  • 15
    • 84924122981 scopus 로고    scopus 로고
    • Towards scaling fully personalized pagerank: Algorithms, lower bounds, and experiments
    • D. Fogaras, B. Rácz, K. Csalogány, and T. Sarlós. Towards scaling fully personalized pagerank: Algorithms, lower bounds, and experiments. Internet Mathematics, 2(3), 2005.
    • (2005) Internet Mathematics , vol.2 , Issue.3
    • Fogaras, D.1    Ŕacz, B.2    Csaloǵany, K.3    Sarĺos, T.4
  • 16
  • 18
    • 67649643417 scopus 로고    scopus 로고
    • Smallblue: Social network analysis for expertise search and collective intelligence
    • C.-Y. Lin, N. Cao, S. X. Liu, S. Papadimitriou, J. Sun, and X. Yan. Smallblue: Social network analysis for expertise search and collective intelligence. In ICDE, 2009.
    • (2009) ICDE
    • Lin, C.-Y.1    Cao, N.2    Liu, S.X.3    Papadimitriou, S.4    Sun, J.5    Yan, X.6
  • 19
    • 57349180506 scopus 로고    scopus 로고
    • Quantitative information flow as network flow capacity
    • S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In PLDI, 2008.
    • (2008) PLDI
    • McCamant, S.1    Ernst, M.D.2
  • 20
    • 80052077852 scopus 로고    scopus 로고
    • Trading in risk: Using markets to improve access control
    • I. Molloy, P.-C. Cheng, and P. Rohatgi. Trading in risk: using markets to improve access control. In NSPW, 2008.
    • (2008) NSPW
    • Molloy, I.1    Cheng, P.-C.2    Rohatgi, P.3
  • 21
    • 79951738724 scopus 로고    scopus 로고
    • Scalable proximity estimation and link prediction in online social networks
    • H. H. Song, T. W. Cho, V. Dave, Y. Zhang, and L. Qiu. Scalable proximity estimation and link prediction in online social networks. In IMC, 2009.
    • (2009) IMC
    • Song, H.H.1    Cho, T.W.2    Dave, V.3    Zhang, Y.4    Qiu, L.5
  • 22
    • 74049162371 scopus 로고    scopus 로고
    • A metadata calculus for secure information sharing
    • M. Srivatsa, D. Agrawal, and S. Reidt. A metadata calculus for secure information sharing. In CCS, 2009.
    • (2009) CCS
    • Srivatsa, M.1    Agrawal, D.2    Reidt, S.3
  • 23
    • 79960155975 scopus 로고    scopus 로고
    • Securing information flows: A metadata framework
    • M. Srivatsa, P. Rohatgi, S. Balfe, and S. Reidt. Securing information flows: A metadata framework. In QoISN, 2008.
    • (2008) QoISN
    • Srivatsa, M.1    Rohatgi, P.2    Balfe, S.3    Reidt, S.4
  • 24
    • 34748827346 scopus 로고    scopus 로고
    • Fast random walk with restart and its applications
    • H. Tong, C. Faloutsos, and J.-Y. Pan. Fast random walk with restart and its applications. In ICDM, 2006.
    • (2006) ICDM
    • Tong, H.1    Faloutsos, C.2    Pan, J.-Y.3
  • 25
    • 85094632142 scopus 로고    scopus 로고
    • Securing distributed systems with information flow control
    • N. Zeldovich, S. Boyd-Wickizer, and D. Mazìeres. Securing distributed systems with information flow control. In NSDI, 2008.
    • (2008) NSDI
    • Zeldovich, N.1    Boyd-Wickizer, S.2    Mazières, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.