-
1
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
Acquisti Alessandro, Gross Ralph. Imagined communities: awareness, information sharing, and privacy on the facebook. In: Privacy enhancing technologies, pp. 36-58; 2006.
-
(2006)
Privacy Enhancing Technologies
, pp. 36-58
-
-
Alessandro, A.1
Ralph, G.2
-
2
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
Baden Randolph, Bender Adam, Spring Neil, Bhattacharjee Bobby, Starin Daniel. Persona: an online social network with user-defined privacy. In: SIGCOMM, pp. 135-146; 2009.
-
(2009)
SIGCOMM
, pp. 135-146
-
-
Randolph, B.1
Adam, B.2
Neil, S.3
Bobby, B.4
Daniel, S.5
-
3
-
-
70350728911
-
Social applications: Exploring a more secure framework
-
ACM New York, NY, USA
-
Andrew Besmer, Heather Richter Lipford, Mohamed Shehab, and Gorrell Cheek Social applications: exploring a more secure framework Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS'09 2009 ACM New York, NY, USA 2:1 2:10
-
(2009)
Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS'09
, pp. 21-210
-
-
Besmer, A.1
Richter Lipford, H.2
Shehab, M.3
Cheek, G.4
-
5
-
-
33845467743
-
Rule-based access control for social networks
-
Carminati Barbara, Ferrari Elena, Perego Andrea. Rule-based access control for social networks. In: OTM Workshops (2), pp. 1734-1744; 2006.
-
(2006)
OTM Workshops
, Issue.2
, pp. 1734-1744
-
-
Barbara, C.1
Elena, F.2
Andrea, P.3
-
8
-
-
85001697848
-
A fine-grained access control system for XML documents
-
E. Damiani, S. Vimercati, S. Paraboschi, and P. Samarati A fine-grained access control system for XML documents ACM Transactions on Information and System Security 5 2 2002 169 202
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
14
-
-
33749074958
-
Using a rigorous approach for engineering web service compositions: A case study
-
July 2005
-
Foster H, Uchitel S, Magee J, Kramer J, Hu M. Using a rigorous approach for engineering web service compositions: a case study. In: 2005 IEEE international conference on services computing, vol. 1, pp. 217-224, July 2005.
-
2005 IEEE International Conference on Services Computing
, vol.1
, pp. 217-224
-
-
Foster, H.1
Uchitel, S.2
Magee, J.3
Kramer, J.4
Hu, M.5
-
15
-
-
33750544462
-
Ltsa-ws: A tool for model-based verification of web service compositions and choreography
-
May 2006
-
Foster H, Uchitel S, Magee J, Kramer J. Ltsa-ws: a tool for model-based verification of web service compositions and choreography. In: Proceeding of the 28th international conference on software engineering, pp. 771-774, May 2006.
-
Proceeding of the 28th International Conference on Software Engineering
, pp. 771-774
-
-
Foster, H.1
Uchitel, S.2
Magee, J.3
Kramer, J.4
-
16
-
-
84870299221
-
Access control requirements for Web 2.0 security and privacy
-
Gates Carrie E. Access control requirements for Web 2.0 security and privacy. In: W2SP 2007: Web 2.0 security & privacy, p. 3, 2007.
-
(2007)
W2SP 2007: Web 2.0 Security & Privacy
, pp. 3
-
-
Gates Carrie, E.1
-
18
-
-
33845467053
-
Inferring binary trust relationships in web-based social networks
-
Jennifer Golbeck, and James A. Hendler Inferring binary trust relationships in web-based social networks ACM Transactions on Internet Technology 6 4 2006 497 529
-
(2006)
ACM Transactions on Internet Technology
, vol.6
, Issue.4
, pp. 497-529
-
-
Golbeck, J.1
Hendler, J.A.2
-
30
-
-
33645830920
-
-
O'Reilly Network pp. 169-202 [Online]
-
T. O'Reilly What is Web 2.0 September 2005 O'Reilly Network pp. 169-202 [Online]
-
(2005)
What Is Web 2.0
-
-
O'Reilly, T.1
-
31
-
-
84871097080
-
-
OASIS
-
OASIS OASIS WSBPEL TC Webpage 2008 http://www.oasis-open.org/committees/ tc-home.php?wg-abbrev=wsbpel
-
(2008)
OASIS WSBPEL TC Webpage
-
-
-
32
-
-
80755172898
-
The effectiveness of application permissions
-
USENIX Association Berkeley, CA, USA pp. 1-12
-
Adrienne Porter Felt, Kate Greenwood, and David Wagner The effectiveness of application permissions Proceedings of the 2nd USENIX conference on Web application development, WebApps'11 2011 USENIX Association Berkeley, CA, USA pp. 1-12
-
(2011)
Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps'11
-
-
Porter Felt, A.1
Greenwood, K.2
Wagner, D.3
-
33
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
ACM New York, NY, USA
-
S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy Extending query rewriting techniques for fine-grained access control SIGMOD'04: proceedings of the 2004 ACM SIGMOD international conference on management of data 2004 ACM New York, NY, USA 551 562
-
(2004)
SIGMOD'04: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
35
-
-
0016555241
-
The protection of information in computer systems
-
J. Saltzer, and M. Schroeder The protection of information in computer systems Proceedings of the IEEE 63 9 Sept 1975 1278 1308
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
37
-
-
57049132798
-
Beyond user-to-user access control for online social networks
-
Shehab Mohamed, Squicciarini Anna Cinzia, Ahn Gail-Joon. Beyond user-to-user access control for online social networks. In: ICICS, pp. 174-189; 2008.
-
(2008)
ICICS
, pp. 174-189
-
-
Mohamed, S.1
Anna Cinzia, S.2
Gail-Joon, A.3
-
40
-
-
70249140248
-
Lockr: Social access control for Web 2.0
-
ACM New York, NY, USA
-
Amin Tootoonchian, Kiran Kumar Gollu, Stefan Saroiu, Yashar Ganjali, and Alec Wolman Lockr: social access control for Web 2.0 WOSP'08: proceedings of the first workshop on online social networks 2008 ACM New York, NY, USA 43 48
-
(2008)
WOSP'08: Proceedings of the First Workshop on Online Social Networks
, pp. 43-48
-
-
Tootoonchian, A.1
Kumar Gollu, K.2
Saroiu, S.3
Ganjali, Y.4
Wolman, A.5
-
41
-
-
79955572011
-
Content-based filtering in on-line social networks
-
Springer-Verlag Berlin, Heidelberg
-
Marco Vanetti, Elisabetta Binaghi, Barbara Carminati, Moreno Carullo, and Elena Ferrari Content-based filtering in on-line social networks Proceedings of the international ECML/PKDD conference on privacy and security issues in data mining and machine learning, PSDML'10 2011 Springer-Verlag Berlin, Heidelberg 127 140
-
(2011)
Proceedings of the International ECML/PKDD Conference on Privacy and Security Issues in Data Mining and Machine Learning, PSDML'10
, pp. 127-140
-
-
Vanetti, M.1
Binaghi, E.2
Carminati, B.3
Carullo, M.4
Ferrari, E.5
|