-
2
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
Computer Science Laboratory
-
J. Rushby, "Noninterference, transitivity, and channel-control security policies," Computer Science Laboratory, SRI International, Tech. Rep. CSL 92-02, 1992.
-
(1992)
SRI International, Tech. Rep. CSL 92-02
-
-
Rushby, J.1
-
3
-
-
84873621535
-
Access control requirements for web 2.0 security and privacy
-
Oakland, California, USA, May
-
C. E. Gates, "Access control requirements for Web 2.0 security and privacy," in IEEE Web 2.0 privacy and security workship (W2SP'07), Oakland, California, USA, May 2007.
-
(2007)
IEEE Web 2.0 Privacy and Security Workship (W2SP'07)
-
-
Gates, C.E.1
-
4
-
-
76349105072
-
Enforcing relationships privacy through collaborative access control in web-based social networks
-
Washington DC, USA, Nov.
-
B. Carminati and E. Ferrari, "Enforcing relationships privacy through collaborative access control in web-based social networks," in Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom'09), Washington DC, USA, Nov. 2009.
-
(2009)
Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom'09)
-
-
Carminati, B.1
Ferrari, E.2
-
5
-
-
79952791195
-
Relationship-based access control: Protection model and policy language
-
San Antonio, TX, USA, Feb.
-
P. W. L. Fong, "Relationship-based access control: protection model and policy language," in Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY'11), San Antonio, TX, USA, Feb. 2011, pp. 191-202.
-
(2011)
Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY'11)
, pp. 191-202
-
-
Fong, P.W.L.1
-
7
-
-
70350357346
-
A privacy preservation model for facebook-style social network systems
-
Saint Malo, France: Springer, Sep.
-
P. W. L. Fong, M. Anwar, and Z. Zhao, "A privacy preservation model for Facebook-style social network systems," in Proceedings of the 14th European Symposium on Research In Computer Security (ESORICS'09), ser. LNCS, vol. 5789. Saint Malo, France: Springer, Sep., pp. 303-320.
-
Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09), Ser. LNCS
, vol.5789
, pp. 303-320
-
-
Fong, P.W.L.1
Anwar, M.2
Zhao, Z.3
-
8
-
-
79952792326
-
-
Department of Computer Science, University of Calgary, Calgary, Alberta, Canada, Tech. Rep. 2010-959-08, Jul. submitted for review
-
M. Anwar, Z. Zhao, and P. W. L. Fong, "An access control model for Facebook-style social network systems," Department of Computer Science, University of Calgary, Calgary, Alberta, Canada, Tech. Rep. 2010-959-08, Jul. 2010, submitted for review.
-
(2010)
An Access Control Model for Facebook-style Social Network Systems
-
-
Anwar, M.1
Zhao, Z.2
Fong, P.W.L.3
-
9
-
-
84947273682
-
The sybil attack
-
Cambridge, MA, USA: Springer, Mar.
-
J. R. Douceur, "The Sybil attack," in Proceedings for the First International Workshop on Peer-to-Peer Systems (IPTPS'02), ser. LNCS, vol. 2429. Cambridge, MA, USA: Springer, Mar. 2002, pp. 251-260.
-
(2002)
Proceedings for the First International Workshop on Peer-to-peer Systems (IPTPS'02), Ser. LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
10
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
Madrid, Spain, Apr.
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, "All your contacts are belong to us: Automated identity theft attacks on social networks," in Proceedings of the 18th International Conference on World Wide Web (WWW'09), Madrid, Spain, Apr. 2009, pp. 551-560.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web (WWW'09)
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
11
-
-
79952797371
-
Towards active detection of identity clone attacks on online social networks
-
San Antonio, TX, USA, Feb.
-
L. Jin, H. Takabi, and J. B. D. Joshi, "Towards active detection of identity clone attacks on online social networks," in Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY'11), San Antonio, TX, USA, Feb. 2011, pp. 27-38.
-
(2011)
Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY'11)
, pp. 27-38
-
-
Jin, L.1
Takabi, H.2
Joshi, J.B.D.3
-
12
-
-
79958043518
-
Detecting social network profile cloning
-
Seattle, WA, USA, Mar.
-
G. Kontaxis, I. Polakis, S. Ioannidis, and E. P. Markatos, "Detecting social network profile cloning," in Proceedings of the 3rd IEEE International Workshop on Security and Social Networking (SESOC'11), Seattle, WA, USA, Mar. 2011.
-
(2011)
Proceedings of the 3rd IEEE International Workshop on Security and Social Networking (SESOC'11)
-
-
Kontaxis, G.1
Polakis, I.2
Ioannidis, S.3
Markatos, E.P.4
-
13
-
-
45749109010
-
SybilGuard: Defending against sybil attacks via social networks
-
Jun.
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, "SybilGuard: Defending against Sybil attacks via social networks," IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 576-589, Jun. 2008.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.3
, pp. 576-589
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.D.4
-
14
-
-
45749116664
-
SybilLimit: A near-optimal social network defense against sybil attacks
-
Oakland, CA, USA, May
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: A near-optimal social network defense against Sybil attacks," in Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P'08), Oakland, CA, USA, May 2008, pp. 3-17.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P'08)
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
15
-
-
29244445484
-
Sybilproof reputation mechanisms
-
Proceedings of ACM SIGCOMM 2005 Workshops: Conference on Computer Communications
-
A. Cheng and E. Friedman, "Sybilproof reputation mechanisms," in Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of peer-to-peer systems (P2PEcon'05), Philadelphia, PA, USA, Aug. 2005, pp. 128-132. (Pubitemid 41832959)
-
(2005)
Proceedings of ACM SIGCOMM 2005 Workshops: Conference on Computer Communications
, pp. 128-132
-
-
Cheng, A.1
Friedman, E.2
-
16
-
-
70449670722
-
DSybil: Optimal sybil-resistance for recommendation systems
-
Berkeley, CA, USA, May
-
H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao, "DSybil: Optimal Sybil-resistance for recommendation systems," in Proceedings of the 2009 IEEE Symposium on Security and Privacy (S&P'09), Berkeley, CA, USA, May 2009, pp. 283-298.
-
(2009)
Proceedings of the 2009 IEEE Symposium on Security and Privacy (S&P'09)
, pp. 283-298
-
-
Yu, H.1
Shi, C.2
Kaminsky, M.3
Gibbons, P.B.4
Xiao, F.5
-
17
-
-
0000338326
-
Programming semantics for multipro-grammed computations
-
Mar.
-
J. B. Dennis and E. C. V. Horn, "Programming semantics for multipro-grammed computations," Communications of the ACM, vol. 9, no. 3, pp. 143-155, Mar. 1966.
-
(1966)
Communications of the ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.B.1
Horn, E.C.V.2
-
18
-
-
33646166700
-
-
System Research Lab, Department of Computer Science, The John Hopkins University, Baltimore, Maryland, USA, Tech. Rep. SRL2003-02
-
M. S. Miller, K.-P. Yee, and J. Shapiro, "Capability myths demolished," System Research Lab, Department of Computer Science, The John Hopkins University, Baltimore, Maryland, USA, Tech. Rep. SRL2003-02, 2003.
-
(2003)
Capability Myths Demolished
-
-
Miller, M.S.1
Yee, K.-P.2
Shapiro, J.3
-
19
-
-
84942812332
-
Protection: Principles and practices
-
Alantic City, New Jersey, USA, May
-
G. S. Graham and P. J. Denning, "Protection: Principles and practices," in Proceedings of the 1972 AFIPS Spring Joint Computer Conference, vol. 40, Alantic City, New Jersey, USA, May 1972, pp. 417-429.
-
(1972)
Proceedings of the 1972 AFIPS Spring Joint Computer Conference
, vol.40
, pp. 417-429
-
-
Graham, G.S.1
Denning, P.J.2
-
20
-
-
27544510789
-
On safety in discretionary access control
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
N. Li and M. V. Tripunitara, "On safety in discretionary access control," in Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'05), Oakland, California, USA, May 2005, pp. 96-109. (Pubitemid 41543649)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 96-109
-
-
Li, N.1
Tripunitara, M.V.2
-
21
-
-
0017271333
-
Fault tolerant operating systems
-
Dec.
-
P. J. Denning, "Fault tolerant operating systems," ACM Computing Surveys, vol. 8, no. 4, pp. 359-389, Dec. 1976.
-
(1976)
ACM Computing Surveys
, vol.8
, Issue.4
, pp. 359-389
-
-
Denning, P.J.1
-
23
-
-
51749086409
-
Hyperproperties
-
Pittsburch, Pennsylvania, USA, Jun.
-
M. R. Clarkson and F. B. Schneider, "Hyperproperties," in Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), Pittsburch, Pennsylvania, USA, Jun. 2008, pp. 51-65.
-
(2008)
Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08)
, pp. 51-65
-
-
Clarkson, M.R.1
Schneider, F.B.2
-
24
-
-
80052002923
-
-
Department of Computer Science, University of Calgary, Calgary, Alberta, Canada, Tech. Rep. 2011-995-07, Mar.
-
P. W. L. Fong, "Preventing Sybil attacks by privilege attenuation: A design principle for social network systems," Department of Computer Science, University of Calgary, Calgary, Alberta, Canada, Tech. Rep. 2011-995-07, Mar. 2011.
-
(2011)
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems
-
-
Fong, P.W.L.1
-
25
-
-
33750231847
-
D-FOAF: Distributed identity management with access rights delegation
-
4185 LNCS, The Semantic Web - ASWC 2006 - First Asian Semantic Web Conference, Proceedings
-
S. R. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, and H.-C. Choi, "D-FOAF: Distributed identity management with access rights delegation," in Proceedings of the First Asian Semantic Web Conference (ASWC'06), ser. LNCS, vol. 4185. Beijing, China: Springer, Sep. 2006, pp. 140-154. (Pubitemid 44608591)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 140-154
-
-
Kruk, S.R.1
Grzonkowski, S.2
Gzella, A.3
Woroniecki, T.4
Choi, H.-C.5
-
26
-
-
33845467743
-
Rule-based access control for social networks
-
4278 LNCS - II, On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops - OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerS
-
B. Carminati, E. Ferrari, and A. Perego, "Rule-based access control for social networks," in Proceedings of the OTM 2006 Workshops, ser. LNCS, vol. 4278. Springer, Oct. 2006, pp. 1734-1744. (Pubitemid 44891736)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 1734-1744
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
27
-
-
85001842932
-
A decentralized security framework for web-based social networks
-
Oct.
-
-, "A decentralized security framework for web-based social networks," International Journal of Information Security and Privacy, vol. 2, no. 4, pp. 22-53, Oct. 2008.
-
(2008)
International Journal of Information Security and Privacy
, vol.2
, Issue.4
, pp. 22-53
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
28
-
-
48349137689
-
Private relationships in social networks
-
Istanbul, Turkey, Apr.
-
-, "Private relationships in social networks," in Proceedings of Workshops in Conjunction with the International Conference on Data Engineering - ICDE'07, Istanbul, Turkey, Apr. 2007, pp. 163-171.
-
(2007)
Proceedings of Workshops in Conjunction with the International Conference on Data Engineering - ICDE'07
, pp. 163-171
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
29
-
-
50249104379
-
Privacy-aware collaborative access control in web-based social networks
-
London, UK: Springer, Jul.
-
B. Carminati and E. Ferrari, "Privacy-aware collaborative access control in web-based social networks," in Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DAS'08), ser. LNCS, vol. 5094. London, UK: Springer, Jul. 2008, pp. 81-96.
-
(2008)
Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DAS'08), Ser. LNCS
, vol.5094
, pp. 81-96
-
-
Carminati, B.1
Ferrari, E.2
-
30
-
-
70350406398
-
Enforcing access control in web-based social networks
-
Oct.
-
B. Carminati, E. Ferrari, and A. Perego, "Enforcing access control in web-based social networks," ACM Transactions on Information and System Security, vol. 13, no. 1, Oct. 2009.
-
(2009)
ACM Transactions on Information and System Security
, vol.13
, Issue.1
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
31
-
-
70450255117
-
A semantic web based framework for social network access control
-
Stresa, Italy, Jun.
-
B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thurainsingham, "A semantic web based framework for social network access control," in Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT'09), Stresa, Italy, Jun. 2009, pp. 177-186.
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT'09)
, pp. 177-186
-
-
Carminati, B.1
Ferrari, E.2
Heatherly, R.3
Kantarcioglu, M.4
Thurainsingham, B.5
-
32
-
-
79951679488
-
Semantic web-based social network access control
-
Mar.
-
B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham, "Semantic web-based social network access control," Computers and Security, vol. 30, no. 2-3, pp. 108-115, Mar. 2011.
-
(2011)
Computers and Security
, vol.30
, Issue.2-3
, pp. 108-115
-
-
Carminati, B.1
Ferrari, E.2
Heatherly, R.3
Kantarcioglu, M.4
Thuraisingham, B.5
-
33
-
-
77954519375
-
PriMa: An effective privacy protection mechanism for social networks
-
Beijing, China, Apr.
-
A. Squicciarini, F. Paci, and S. Sundareswaran, "PriMa: An effective privacy protection mechanism for social networks," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS'10), Beijing, China, Apr. 2010, pp. 320-323.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS'10)
, pp. 320-323
-
-
Squicciarini, A.1
Paci, F.2
Sundareswaran, S.3
-
34
-
-
77954588562
-
Collective privacy management in social networks
-
Madrid, Spain, Apr.
-
A. C. Squicciarini, M. Shehab, and F. Paci, "Collective privacy management in social networks," in Proceedings of the 18th International Conference on World Wide Web (WWW'09), Madrid, Spain, Apr. 2009, pp. 521-530.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web (WWW'09)
, pp. 521-530
-
-
Squicciarini, A.C.1
Shehab, M.2
Paci, F.3
-
35
-
-
78650520974
-
Privacy policies for shared content in social network sites
-
to appear
-
A. C. Squicciarini, M. Shehab, and J. Wede, "Privacy policies for shared content in social network sites," The VLDB Journal, 2010, to appear.
-
(2010)
The VLDB Journal
-
-
Squicciarini, A.C.1
Shehab, M.2
Wede, J.3
-
36
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Boston, MA, USA, Dec.
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, "Secure routing for structured peer-to-peer overlay networks," in Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI'02), Boston, MA, USA, Dec. 2002.
-
(2002)
Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI'02)
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
37
-
-
85027289714
-
Computational puzzles as sybil defenses
-
Cambridge, UK, Sep.
-
N. Borisov, "Computational puzzles as sybil defenses," in Proceedings of the 6th IEEE International Conference on Peer-to-Peer Computing (P2P'06), Cambridge, UK, Sep. 2006, pp. 171-176.
-
(2006)
Proceedings of the 6th IEEE International Conference on Peer-to-peer Computing (P2P'06)
, pp. 171-176
-
-
Borisov, N.1
-
38
-
-
34548349212
-
Limiting sybil attacks in structured P2P networks
-
DOI 10.1109/INFCOM.2007.328, 4215910, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
H. Rowaihy, W. Enck, P. McDaniel, and T. L. Porta, "Limiting Sybil attacks in structured P2P networks," in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM'07), Anchorage, Alaska, USA, May 2007, pp. 2596-2600. (Pubitemid 47334528)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 2596-2600
-
-
Rowaihy, H.1
Enck, W.2
McDaniel, P.3
La Porta, T.4
-
39
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
Warsaw, Poland: Springer, May
-
L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, "CAPTCHA: Using hard AI problems for security," in Proceedings of the 22nd International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'03), ser. LNCS, vol. 2656. Warsaw, Poland: Springer, May 2003, pp. 294-311.
-
(2003)
Proceedings of the 22nd International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'03), Ser. LNCS
, vol.2656
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
40
-
-
0019713652
-
Theft and conspiracy in the take-grant protection model
-
DOI 10.1016/0022-0000(81)90069-6
-
L. Snyder, "Theft and conspiracy in the take-grant protection model," Journal of Computer and System Sciences, vol. 23, no. 3, pp. 333-347, 1981. (Pubitemid 12473231)
-
(1981)
Journal of Computer and System Sciences
, vol.23
, Issue.3
, pp. 333-347
-
-
Snyder Lawrence1
|