-
1
-
-
84878287461
-
-
Facebook Developers
-
Facebook Developers, http://developers.facebook.com/, 2013.
-
(2013)
-
-
-
2
-
-
84878299815
-
-
Facebook Privacy Policy
-
Facebook Privacy Policy, http://www.facebook.com/policy.php/, 2013.
-
(2013)
-
-
-
3
-
-
84878273980
-
-
Facebook Statistics
-
Facebook Statistics, http://www.facebook.com/press/info. php?statistics, 2013.
-
(2013)
-
-
-
4
-
-
84878284313
-
-
Google+ Privacy Policy
-
Google+ Privacy Policy, http://http://www.google.com/intl/en/+/policy/, 2013.
-
(2013)
-
-
-
5
-
-
84878316652
-
-
The Google+ Project
-
The Google+ Project, https://plus.google.com, 2013.
-
(2013)
-
-
-
6
-
-
34548089388
-
Towards realizing a formal RBAC model in real systems
-
DOI 10.1145/1266840.1266875, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
G. Ahn and H. Hu, "Towards Realizing a Formal RBAC Model in Real Systems," Proc. 12th ACM Symp. Access Control Models and Technologies, pp. 215-224, 2007. (Pubitemid 47287492)
-
(2007)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 215-224
-
-
Ahn, G.-J.1
Hu, H.2
-
7
-
-
78751691290
-
Representing and reasoning about web access control policies
-
G. Ahn, H. Hu, J. Lee, and Y. Meng, "Representing and Reasoning about Web Access Control Policies," Proc. IEEE 34th Ann. Computer Software and Applications Conf. (COMPSAC), pp. 137-146, 2010.
-
(2010)
Proc. IEEE 34th Ann. Computer Software and Applications Conf. (COMPSAC)
, pp. 137-146
-
-
Ahn, G.1
Hu, H.2
Lee, J.3
Meng, Y.4
-
9
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, "All Your Contacts Are Belong to Us: Automated Identity theft Attacks on Social Networks," Proc. 18th Int'l Conf. World Wide Web, pp. 551-560, 2009.
-
(2009)
Proc. 18th Int'l Conf. World Wide Web
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
11
-
-
33845467743
-
Rule-based access control for social networks
-
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops - OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerS
-
B. Carminati, E. Ferrari, and A. Perego, "Rule-Based Access Control for Social Networks," Proc. Int'l Conf. On the Move to Meaningful Internet Systems, pp. 1734-1744, 2006. (Pubitemid 44891736)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4278 LNCS - II
, pp. 1734-1744
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
12
-
-
70350406398
-
Enforcing access control in web-based social networks
-
B. Carminati, E. Ferrari, and A. Perego, "Enforcing Access Control in Web-Based Social Networks," ACM Trans. Information and System Security, vol. 13, no. 1, pp. 1-38, 2009.
-
(2009)
ACM Trans. Information and System Security
, vol.13
, Issue.1
, pp. 1-38
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
14
-
-
78951478727
-
Collaborative face recognition for improved face annotation in personal photo collections shared on online social networks
-
Feb.
-
J. Choi, W. De Neve, K. Plataniotis, and Y. Ro, "Collaborative Face Recognition for Improved Face Annotation in Personal Photo Collections Shared on Online Social Networks," IEEE Trans. Multimedia, vol. 13, no. 1, pp. 14-28, Feb. 2011.
-
(2011)
IEEE Trans. Multimedia
, vol.13
, Issue.1
, pp. 14-28
-
-
Choi, J.1
De Neve, W.2
Plataniotis, K.3
Ro, Y.4
-
16
-
-
80051972853
-
Preventing sybil attacks by privilege attenuation: A design principle for social network systems
-
P. Fong, "Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems," Proc. IEEE Symp. Security and Privacy (SP), pp. 263-278, 2011.
-
(2011)
Proc. IEEE Symp. Security and Privacy (SP)
, pp. 263-278
-
-
Fong, P.1
-
18
-
-
70350357346
-
A privacy preservation model for facebook-style social network systems
-
P. Fong, M. Anwar, and Z. Zhao, "A Privacy Preservation Model for Facebook-Style Social Network Systems," Proc. 14th European Conf. Research in Computer Security, pp. 303-320, 2009.
-
(2009)
Proc. 14th European Conf. Research in Computer Security
, pp. 303-320
-
-
Fong, P.1
Anwar, M.2
Zhao, Z.3
-
19
-
-
33646717327
-
-
PhD thesis, Univ. of Maryland at College Park, College Park, MD, USA
-
J. Golbeck, "Computing and Applying Trust in Web-Based Social Networks," PhD thesis, Univ. of Maryland at College Park, College Park, MD, USA, 2005.
-
(2005)
Computing and Applying Trust in Web-Based Social Networks
-
-
Golbeck, J.1
-
20
-
-
0016984825
-
Protection in operating systems
-
M. Harrison, W. Ruzzo, and J. Ullman, "Protection in Operating Systems," Comm. ACM, vol. 19, no. 8, pp. 461-471, 1976.
-
(1976)
Comm. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
23
-
-
79960152755
-
Anomaly discovery and resolution in web access control policies
-
H. Hu, G. Ahn, and K. Kulkarni, "Anomaly Discovery and Resolution in Web Access Control Policies," Proc. 16th ACM Symp. Access Control Models and Technologies, pp. 165-174, 2011.
-
(2011)
Proc. 16th ACM Symp. Access Control Models and Technologies
, pp. 165-174
-
-
Hu, H.1
Ahn, G.2
Kulkarni, K.3
-
25
-
-
84855703428
-
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
-
H. Hu, G.-J. Ahn, and J. Jorgensen, "Detecting and Resolving Privacy Conflicts for Collaborative Data Sharing in Online Social Networks," Proc. 27th Ann. Computer Security Applications Conf, pp. 103-112, 2011.
-
(2011)
Proc. 27th Ann. Computer Security Applications Conf
, pp. 103-112
-
-
Hu, H.1
Ahn, G.-J.2
Jorgensen, J.3
-
26
-
-
84858632756
-
Detecting and resolving firewall policy anomalies
-
May
-
H. Hu, G.-J. Ahn, and K. Kulkarni, "Detecting and Resolving Firewall Policy Anomalies," IEEE Trans. Dependable and Secure Computing, vol. 9, no. 3, pp. 318-331, May 2012.
-
(2012)
IEEE Trans. Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 318-331
-
-
Hu, H.1
Ahn, G.-J.2
Kulkarni, K.3
-
27
-
-
79952797371
-
Towards active detection of identity clone attacks on online social networks
-
L. Jin, H. Takabi, and J. Joshi, "Towards Active Detection of Identity Clone Attacks on Online Social Networks," Proc. First ACM Conf. Data and Application Security and Privacy, pp. 27-38, 2011.
-
(2011)
Proc. First ACM Conf. Data and Application Security and Privacy
, pp. 27-38
-
-
Jin, L.1
Takabi, H.2
Joshi, J.3
-
28
-
-
33750231847
-
D-FOAF: Distributed identity management with access rights delegation
-
The Semantic Web - ASWC 2006 - First Asian Semantic Web Conference, Proceedings
-
S. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, and H. Choi, "D-FOAF: Distributed Identity Management with Access Rights Delegation," Proc. Asian Semantic Web Conf. (ASWC), pp. 140-154, 2006. (Pubitemid 44608591)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4185
, pp. 140-154
-
-
Kruk, S.R.1
Grzonkowski, S.2
Gzella, A.3
Woroniecki, T.4
Choi, H.-C.5
-
29
-
-
0031238275
-
Application of majority voting to pattern recognition: An analysis of its behavior and performance
-
PII S1083442797062024
-
L. Lam and C.Y. Suen, "Application of Majority Voting to Pattern Recognition: An Analysis of Its Behavior and Performance," IEEE Trans. Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 27, no. 5, pp. 553-568, Sept. 1997. (Pubitemid 127770722)
-
(1997)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.
, vol.27
, Issue.5
, pp. 553-568
-
-
Lam, L.1
Suen, C.Y.2
-
30
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
DOI 10.1145/1066100.1066103
-
N. Li, J. Mitchell, and W. Winsborough, "Beyond Proof-of-Compliance: Security Analysis in Trust Management," J. ACM, vol. 52, no. 3, pp. 474-514, 2005. (Pubitemid 43078378)
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
31
-
-
70450277229
-
Access control policy combining: Theory meets practice
-
N. Li, Q. Wang, W. Qardaji, E. Bertino, P. Rao, J. Lobo, and D. Lin, "Access Control Policy Combining: Theory Meets Practice," Proc. 14th ACM Symp. Access Control Models and Technologies, pp. 135-144, 2009.
-
(2009)
Proc. 14th ACM Symp. Access Control Models and Technologies
, pp. 135-144
-
-
Li, N.1
Wang, Q.2
Qardaji, W.3
Bertino, E.4
Rao, P.5
Lobo, J.6
Lin, D.7
-
34
-
-
77950886667
-
You are who you know: Inferring user profiles in online social networks
-
A. Mislove, B. Viswanath, K. Gummadi, and P. Druschel, "You Are Who You Know: Inferring User Profiles in Online Social Networks," Proc. Third ACM Int'l Conf. Web Search and Data Mining, pp. 251-260, 2010.
-
(2010)
Proc. Third ACM Int'l Conf. Web Search and Data Mining
, pp. 251-260
-
-
Mislove, A.1
Viswanath, B.2
Gummadi, K.3
Druschel, P.4
-
35
-
-
78249284071
-
Collusion detection and prevention with fire+ trust and reputation model
-
B. Qureshi, G Min, and D. Kouvatsos, "Collusion Detection and Prevention with Fire+ Trust and Reputation Model," Proc. IEEE 10th Int'l Conf. Computer and Information Technology (CIT), pp. 2548-2555, 2010.
-
(2010)
Proc. IEEE 10th Int'l Conf. Computer and Information Technology (CIT)
, pp. 2548-2555
-
-
Qureshi, B.1
Min, G.2
Kouvatsos, D.3
-
36
-
-
77954588562
-
Collective privacy management in social networks
-
A. Squicciarini, M. Shehab, and F. Paci, "Collective Privacy Management in Social Networks," Proc. 18th Int'l Conf. World Wide Web, pp. 521-530, 2009.
-
(2009)
Proc. 18th Int'l Conf. World Wide Web
, pp. 521-530
-
-
Squicciarini, A.1
Shehab, M.2
Paci, F.3
-
37
-
-
79960199803
-
A3p: Adaptive policy prediction for shared images over popular content sharing sites
-
A. Squicciarini, S. Sundareswaran, D. Lin, and J. Wede, "A3p: Adaptive Policy Prediction for Shared Images over Popular Content Sharing Sites," Proc. 22nd ACM Conf. Hypertext and Hypermedia, pp. 261-270, 2011.
-
(2011)
Proc. 22nd ACM Conf. Hypertext and Hypermedia
, pp. 261-270
-
-
Squicciarini, A.1
Sundareswaran, S.2
Lin, D.3
Wede, J.4
-
39
-
-
78149337076
-
An analysis of social network-based sybil defenses
-
B. Viswanath, A. Post, K. Gummadi, and A. Mislove, "An Analysis of Social Network-Based Sybil Defenses," ACM SIGCOMM Computer Comm. Rev., vol. 40, pp. 363-374, 2010.
-
(2010)
ACM SIGCOMM Computer Comm. Rev.
, vol.40
, pp. 363-374
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.3
Mislove, A.4
-
40
-
-
77955214796
-
A practical attack to de-anonymize social network users
-
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, "A Practical Attack to De-Anonymize Social Network Users," Proc. IEEE Symp. Security and Privacy, pp. 223-238, 2010.
-
(2010)
Proc. IEEE Symp. Security and Privacy
, pp. 223-238
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
41
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
E. Zheleva and L. Getoor, "To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles," Proc. 18th Int'l Conf. World Wide Web, pp. 531-540, 2009.
-
(2009)
Proc. 18th Int'l Conf. World Wide Web
, pp. 531-540
-
-
Zheleva, E.1
Getoor, L.2
|