-
1
-
-
33746261302
-
Using technology to transform communities of practice into knowledge-building communities
-
C. M. Hoadley, "Using technology to transform communities of practice into knowledge-building communities," SIGGROUP Bull, vol. 25, pp. 31-40,2005.
-
(2005)
SIGGROUP Bull
, vol.25
, pp. 31-40
-
-
Hoadley, C.M.1
-
2
-
-
84950968645
-
Privacy-aware access control in social networks: Issues and solutions
-
J. Nin and J. Herranz, Eds Springer London, vol. 0
-
B. Carminati and E. Ferrari, "Privacy-aware access control in social networks: Issues and solutions," in Privacy and Anonymity in Information Management Systems, ser. Advanced Information and Knowledge Processing, J. Nin and J. Herranz, Eds. Springer London, 2010, vol. 0, pp. 181-195.
-
(2010)
Privacy and Anonymity in Information Management Systems, ser. Advanced Information and Knowledge Processing
, pp. 181-195
-
-
Carminati, B.1
Ferrari, E.2
-
3
-
-
57349171335
-
Policy decomposition for collaborative access control
-
ser. SACMAT '08. New York, NY, USA: ACM, [Online]. Available
-
D. Lin, P. Rao, E. Bertino, N. Li, and J. Lobo, "Policy decomposition for collaborative access control," in Proceedings of the 13th ACM symposium on Access control models and technologies, ser. SACMAT '08. New York, NY, USA: ACM, 2008, pp. 103-112. [Online]. Available: http://doi.acm.org/ 10.1145/1377836.1377853
-
(2008)
Proceedings of the 13th ACM symposium on Access control models and technologies
, pp. 103-112
-
-
Lin, D.1
Rao, P.2
Bertino, E.3
Li, N.4
Lobo, J.5
-
4
-
-
0242456748
-
Models for coalition-based access control (cbac)
-
Ser. SAC MAT '02. New York, NY, USA: ACM, [Online]. Available:
-
E. Cohen, R. K. Thomas, W. Winsborough, and D. Shands, "Models for coalition-based access control (cbac)," in Proceedings of the seventh ACM symposium on Access control models and technologies, ser. SAC MAT '02. New York, NY, USA: ACM, 2002, pp. 97-106. [Online]. Available: http://doi.acm.org/10. 1145/507711.507727
-
(2002)
Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies
, pp. 97-106
-
-
Cohen, E.1
Thomas, R.K.2
Winsborough, W.3
Shands, D.4
-
5
-
-
33748077108
-
Role-based access management for ad-hoc collaborative sharing
-
ser. SACMAT '06. New York, NY, USA: ACM, [Online]. Available
-
J. Jin and G.-J. Ahn, "Role-based access management for ad-hoc collaborative sharing," in Proceedings of the eleventh ACM symposium on Access control models and technologies, ser. SACMAT '06. New York, NY, USA: ACM, 2006, pp. 200-209. [Online]. Available: http://doi.acm.org/10.1145/1133058. 1133086
-
(2006)
Proceedings of the eleventh ACM symposium on Access control models and technologies
, pp. 200-209
-
-
Jin, J.1
Ahn, G.-J.2
-
6
-
-
70350406398
-
Enforcing access control in web-based social networks
-
November, [Online]. Available
-
B. Carminati, E. Ferrari, and A. Perego, "Enforcing access control in web-based social networks," ACM Trans. Int. Syst. Secur., vol. 13, pp. 6:1-6:38, November 2009. [Online]. Available: http://doi.acm.org/10.1145/ 1609956.1609962
-
(2009)
ACM Trans. Int. Syst. Secur.
, vol.13
, pp. 61-638
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
7
-
-
33646717327
-
-
Ph.D. dissertation, College Park, MD, USA, aAI3178583
-
J. A. Golbeck, "Computing and applying trust in web-based social networks," Ph.D. dissertation, College Park, MD, USA, 2005, aAI3178583.
-
(2005)
Computing and Applying Trust in Web-Based Social Networks
-
-
Golbeck, J.A.1
-
9
-
-
32544446344
-
FOAF vocabulary specification
-
[Online]. Available: http://xmlns.comlfoaf/0.1, Jul, available at:
-
D. Brickley and L. Miller, "FOAF vocabulary specification," RDF Vocabulary Specification, Jul. 2005, available at: http://xmlns.com/foaf/0.1. [Online]. Available: http://xmlns.comlfoaf/0.1.
-
(2005)
RDF Vocabulary Specification
-
-
Brickley, D.1
Miller, L.2
-
10
-
-
77954493935
-
Foundations of sparql query optimization
-
New York,NY,USA: ACM, [Online]. Available
-
M. Schmidt, M. Meier, and G. Lausen, "Foundations of sparql query optimization," in Proceedings of the 13th 1nternational Conference on Database Theory, ser. ICDT ' 10. New York,N Y,U SA: ACM,2010,p p. 4-33. [Online]. Available: http://doi.acm.org/I0.1.145/1804669.1804675
-
(2010)
Proceedings of the 13th 1nternational Conference on Database Theory, ser. ICDT ' 10
, pp. 4-33
-
-
Schmidt, M.1
Meier, M.2
Lausen, G.3
|