-
1
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
A. Acquisti and R. Gross, "Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook," Proc. Int'l Workshop Privacy Enhancing Technologies, pp. 36-58, 2006.
-
(2006)
Proc. Int'l Workshop Privacy Enhancing Technologies
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
3
-
-
70449553983
-
Privacy-enhanced user-centric identity management
-
G.-J. Ahn, M. Ko, and M. Shehab, "Privacy-Enhanced User-Centric Identity Management," Proc. IEEE Int'l Conf. Comm. (ICC), pp. 1-5, 2009.
-
(2009)
Proc. IEEE Int'l Conf. Comm. (ICC)
, pp. 1-5
-
-
Ahn, G.-J.1
Ko, M.2
Shehab, M.3
-
5
-
-
77950965416
-
Open identity management framework for saas ecosystem
-
W. Bin, H.H. Yuan, L.X. Xi, and X.J. Min, "Open Identity Management Framework for Saas Ecosystem," Proc. IEEE Int'l Conf. e-Business Eng. (ICEBE '09), pp. 512-517, 2009.
-
(2009)
Proc. IEEE Int'l Conf. E-Business Eng. (ICEBE '09)
, pp. 512-517
-
-
Bin, W.1
Yuan, H.H.2
Xi, L.X.3
Min, X.J.4
-
8
-
-
84861130530
-
-
Facebook Facebook Press Room
-
Facebook, Facebook Press Room, http://www.facebook.com/press/info.php? statistics, 2011.
-
(2011)
-
-
-
9
-
-
77954614450
-
Privacy wizards for social networking sites
-
M. Rappa, P. Jones, J. Freire, and S. Chakrabarti, ed.
-
L. Fang and K. LeFevre, "Privacy Wizards for Social Networking Sites," Proc. Int'l Conf. World Wide Web (WWW), M. Rappa, P. Jones, J. Freire, and S. Chakrabarti, ed., pp. 351-360, 2010.
-
(2010)
Proc. Int'l Conf. World Wide Web (WWW)
, pp. 351-360
-
-
Fang, L.1
Lefevre, K.2
-
11
-
-
80755172898
-
The effectiveness of application permissions
-
A.P. Felt, K. Greenwood, and D. Wagner, "The Effectiveness of Application Permissions," Proc. Second USENIX Conf. Web Application Development (WebApps '11), p. 7, 2011.
-
(2011)
Proc. Second USENIX Conf. Web Application Development (WebApps '11)
, pp. 7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
12
-
-
84861118580
-
-
FriendCameo Inc. FriendCameo
-
FriendCameo, Inc., FriendCameo, http://friendcameo.com, 2010.
-
(2010)
-
-
-
13
-
-
70350714539
-
Challenges in supporting end-user privacy and security management with social navigation
-
J. Goecks, W.K. Edwards, and E.D. Mynatt, "Challenges in Supporting End-User Privacy and Security Management with Social Navigation," Proc. Fifth Symp. Usable Privacy and Security (SOUPS '09), pp. 5:1-5:12, 2009.
-
(2009)
Proc. Fifth Symp. Usable Privacy and Security (SOUPS '09)
, pp. 51-512
-
-
Goecks, J.1
Edwards, W.K.2
Mynatt, E.D.3
-
14
-
-
84976668719
-
Using collaborative filtering toweave an information tapestry
-
D. Goldberg, D. Nichols, B.M. Oki, and D. Terry, "Using Collaborative Filtering toWeave an Information Tapestry," Comm. ACM, vol. 35, no. 12, pp. 61-70, 1992.
-
(1992)
Comm. ACM
, vol.35
, Issue.12
, pp. 61-70
-
-
Goldberg, D.1
Nichols, D.2
Oki, B.M.3
Terry, D.4
-
18
-
-
85015559680
-
An algorithmic framework for performing collaborative filtering
-
J.L. Herlocker, J.A. Konstan, A. Borchers, and J. Riedl, "An Algorithmic Framework for Performing Collaborative Filtering," Proc. Int'l ACM SIGIR Conf. (SIGIR '99), pp. 230-237, 1999.
-
(1999)
Proc. Int'l ACM SIGIR Conf. (SIGIR '99)
, pp. 230-237
-
-
Herlocker, J.L.1
Konstan, J.A.2
Borchers, A.3
Riedl, J.4
-
19
-
-
3042697346
-
Evaluating collaborative filtering recommender systems ACM
-
Jan.
-
J.L. Herlocker, J.A. Konstan, L.G. Terveen, and J.T. Riedl, "Evaluating Collaborative Filtering Recommender Systems," ACM Trans. Information Systems, vol. 22, pp. 5-53, Jan. 2004.
-
(2004)
Trans. Information Systems
, vol.22
, pp. 5-53
-
-
Herlocker, J.L.1
Konstan, J.A.2
Terveen, L.G.3
Riedl, J.T.4
-
21
-
-
0031610985
-
A plugin-based privacy scheme for world-wide web file distribution
-
Jan.
-
M. Jenkin and P. Dymond, "A Plugin-Based Privacy Scheme for World-Wide Web File Distribution," Proc. 31st Hawaii Int'l Conf. System Sciences, vol. 7, pp. 621-627, Jan. 1998.
-
(1998)
Proc. 31st Hawaii Int'l Conf. System Sciences
, vol.7
, pp. 621-627
-
-
Jenkin, M.1
Dymond, P.2
-
22
-
-
77952402462
-
Mitigating man in the middle attack over secure sockets layer
-
Dec.
-
Y. Joshi, D. Das, and S. Saha, "Mitigating Man in the Middle Attack over Secure Sockets Layer," Proc. IEEE Int'l Conf. Internet Multimedia Services Architecture and Applications (IMSAA), pp. 1-5, Dec. 2009.
-
(2009)
Proc. IEEE Int'l Conf. Internet Multimedia Services Architecture and Applications (IMSAA)
, pp. 1-5
-
-
Joshi, Y.1
Das, D.2
Saha, S.3
-
23
-
-
70349246372
-
User-Controllable learning of security and privacy policies
-
P.G. Kelley, P. Hankes Drielsma, N. Sadeh, and L.F. Cranor, "User-Controllable Learning of Security and Privacy Policies," AISec '08: Proc. First ACM Workshop Workshop AISec, pp. 11-18, 2008.
-
(2008)
AISec '08: Proc. First ACM Workshop Workshop AISec
, pp. 11-18
-
-
Kelley, P.G.1
Hankes Drielsma, P.2
Sadeh, N.3
Cranor, L.F.4
-
25
-
-
42149141236
-
A probabilistic model for item-based recommender systems
-
DOI 10.1145/1297231.1297253, RecSys'07: Proceedings of the 2007 ACM Conference on Recommender Systems
-
M. Li, B. Dias, W. El-Deredy, and P.J.G. Lisboa, "A Probabilistic Model for Item-Based Recommender Systems," Proc. ACM Conf. Recommender Systems (RecSys '07), pp. 129-132, 2007. (Pubitemid 351528422)
-
(2007)
RecSys'07: Proceedings of the 2007 ACM Conference on Recommender Systems
, pp. 129-132
-
-
Li, M.1
Dias, B.2
El-Deredy, W.3
Lisboa, P.J.G.4
-
26
-
-
77951151486
-
A framework for computing the privacy scores of users in online social networks
-
W. Wang, H. Kargupta, S. Ranka, P.S. Yu, and X. Wu, ed.
-
K. Liu and E. Terzi, "A Framework for Computing the Privacy Scores of Users in Online Social Networks," Proc. IEEE Int'l Conf. Data Mining (ICDM), W. Wang, H. Kargupta, S. Ranka, P.S. Yu, and X. Wu, ed., pp. 288-297, 2009.
-
(2009)
Proc. IEEE Int'l Conf. Data Mining (ICDM)
, pp. 288-297
-
-
Liu, K.1
Terzi, E.2
-
28
-
-
84861122002
-
-
OAuth 2.0.The OAuth 2.0 Protocol
-
OAuth 2.0. The OAuth 2.0 Protocol, http://tools.ietf.org/html/draft-ietf- oauth-v2-22, 2011.
-
(2011)
-
-
-
29
-
-
0035509452
-
Privacy risks in recommender systems
-
Nov./Dec.
-
N. Ramakrishnan, B. Keller, B. Mirza, A. Grama, and G. Karypis, "Privacy Risks in Recommender Systems," IEEE Internet Computing, vol. 5, no. 6, pp. 54-63, Nov./Dec. 2001.
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.6
, pp. 54-63
-
-
Ramakrishnan, N.1
Keller, B.2
Mirza, B.3
Grama, A.4
Karypis, G.5
-
30
-
-
85030174634
-
Grouplens: An open architecture for collaborative filtering of netnews
-
P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl, "Grouplens: An Open Architecture for Collaborative Filtering of Netnews," CSCW '94: Proc. ACM Conf. Computer Supported Cooperative Work, pp. 175-186, 1994.
-
(1994)
CSCW '94: Proc. ACM Conf. Computer Supported Cooperative Work
, pp. 175-186
-
-
Resnick, P.1
Iacovou, N.2
Suchak, M.3
Bergstrom, P.4
Riedl, J.5
-
31
-
-
0035510303
-
Personalization and privacy
-
Nov./Dec.
-
J. Riedl, "Personalization and Privacy," IEEE Internet Computing, vol. 5, no. 6, pp. 29-31, Nov./Dec. 2001.
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.6
, pp. 29-31
-
-
Riedl, J.1
-
32
-
-
57049132798
-
Beyond user-to-user access control for online social networks
-
M. Shehab, A.C. Squicciarini, and G.-J. Ahn, "Beyond User-to-User Access Control for Online Social Networks," Proc. 10th Int'l Conf. Information and Comm. Security (ICICS '08), pp. 174-189, 2008.
-
(2008)
Proc. 10th Int'l Conf. Information and Comm. Security (ICICS '08)
, pp. 174-189
-
-
Shehab, M.1
Squicciarini, A.C.2
Ahn, G.-J.3
|