메뉴 건너뛰기




Volumn 31, Issue 8, 2012, Pages 897-911

Access control for online social networks third party applications

Author keywords

Access control; Applications; Attribute generalization; Finite state machine; Social networks

Indexed keywords

APPLICATION EXECUTION; APPLICATION SERVICES; ATTRIBUTE GENERALIZATION; CONTROL FRAMEWORK; DATA ATTRIBUTES; DEGREE OF SPECIFICITY; MODEL APPLICATION; ONLINE SOCIAL NETWORKS; OPEN INTERFACE; PRIVACY CONCERNS; PROFILE DATA; PROOF OF CONCEPT; SHORTEST PATH PROBLEM; SOCIAL NETWORK SERVICES; SOCIAL NETWORKS; THIRD PARTY APPLICATION (APPS); USER PROFILE; USER STUDY; WEB 2.0;

EID: 84870302029     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2012.07.008     Document Type: Article
Times cited : (48)

References (42)
  • 1
    • 77049099362 scopus 로고    scopus 로고
    • Imagined communities: Awareness, information sharing, and privacy on the facebook
    • Acquisti Alessandro, Gross Ralph. Imagined communities: awareness, information sharing, and privacy on the facebook. In: Privacy enhancing technologies, pp. 36-58; 2006.
    • (2006) Privacy Enhancing Technologies , pp. 36-58
    • Alessandro, A.1    Ralph, G.2
  • 2
    • 70450257780 scopus 로고    scopus 로고
    • Persona: An online social network with user-defined privacy
    • Baden Randolph, Bender Adam, Spring Neil, Bhattacharjee Bobby, Starin Daniel. Persona: an online social network with user-defined privacy. In: SIGCOMM, pp. 135-146; 2009.
    • (2009) SIGCOMM , pp. 135-146
    • Randolph, B.1    Adam, B.2    Neil, S.3    Bobby, B.4    Daniel, S.5
  • 5
    • 33845467743 scopus 로고    scopus 로고
    • Rule-based access control for social networks
    • Carminati Barbara, Ferrari Elena, Perego Andrea. Rule-based access control for social networks. In: OTM Workshops (2), pp. 1734-1744; 2006.
    • (2006) OTM Workshops , Issue.2 , pp. 1734-1744
    • Barbara, C.1    Elena, F.2    Andrea, P.3
  • 16
    • 84870299221 scopus 로고    scopus 로고
    • Access control requirements for Web 2.0 security and privacy
    • Gates Carrie E. Access control requirements for Web 2.0 security and privacy. In: W2SP 2007: Web 2.0 security & privacy, p. 3, 2007.
    • (2007) W2SP 2007: Web 2.0 Security & Privacy , pp. 3
    • Gates Carrie, E.1
  • 17
    • 35449006761 scopus 로고    scopus 로고
    • Homeviews: Peer-to-peer middleware for personal data sharing applications
    • Geambasu Roxana, Balazinska Magdalena, Gribble Steven D, Levy Henry M. Homeviews: peer-to-peer middleware for personal data sharing applications. In: SIGMOD conference, pp. 235-246; 2007.
    • (2007) SIGMOD Conference , pp. 235-246
    • Roxana, G.1    Magdalena, B.2    Gribble Steven, D.3    Levy Henry, M.4
  • 18
    • 33845467053 scopus 로고    scopus 로고
    • Inferring binary trust relationships in web-based social networks
    • Jennifer Golbeck, and James A. Hendler Inferring binary trust relationships in web-based social networks ACM Transactions on Internet Technology 6 4 2006 497 529
    • (2006) ACM Transactions on Internet Technology , vol.6 , Issue.4 , pp. 497-529
    • Golbeck, J.1    Hendler, J.A.2
  • 30
    • 33645830920 scopus 로고    scopus 로고
    • O'Reilly Network pp. 169-202 [Online]
    • T. O'Reilly What is Web 2.0 September 2005 O'Reilly Network pp. 169-202 [Online]
    • (2005) What Is Web 2.0
    • O'Reilly, T.1
  • 31
    • 84871097080 scopus 로고    scopus 로고
    • OASIS
    • OASIS OASIS WSBPEL TC Webpage 2008 http://www.oasis-open.org/committees/ tc-home.php?wg-abbrev=wsbpel
    • (2008) OASIS WSBPEL TC Webpage
  • 35
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. Saltzer, and M. Schroeder The protection of information in computer systems Proceedings of the IEEE 63 9 Sept 1975 1278 1308
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 37
    • 57049132798 scopus 로고    scopus 로고
    • Beyond user-to-user access control for online social networks
    • Shehab Mohamed, Squicciarini Anna Cinzia, Ahn Gail-Joon. Beyond user-to-user access control for online social networks. In: ICICS, pp. 174-189; 2008.
    • (2008) ICICS , pp. 174-189
    • Mohamed, S.1    Anna Cinzia, S.2    Gail-Joon, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.