메뉴 건너뛰기




Volumn , Issue , 2013, Pages 32-65

Access control models for online social networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; SOCIAL NETWORKING (ONLINE); SURVEYS;

EID: 84898374541     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-3926-3.ch003     Document Type: Chapter
Times cited : (22)

References (143)
  • 4
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision-making
    • Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision-making. IEEE Security and Privacy, 3(1), 26-33. doi:10.1109/MSP.2005.22.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 5
    • 84856657264 scopus 로고    scopus 로고
    • IEEE. Alessandra, M., Kristen, L., & Eytan, A. (Last Updated April 2011.). The PVIZ comprehension tool for social network privacy settings. UM
    • Ahmad, A., & Whitworth, B. (2011). Distributed access control for social networks. Information Assurance and Security (IAS) (pp. 68-73). IEEE. Alessandra, M., Kristen, L., & Eytan, A. (Last Updated April 2011.). The PVIZ comprehension tool for social network privacy settings. UM Tech Report #CSE-TR-570-11.
    • (2011) Distributed access control for social networks. Information Assurance and Security (IAS) , pp. 68-73
    • Ahmad, A.1    Whitworth, B.2
  • 8
    • 33644998913 scopus 로고    scopus 로고
    • Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems: Special topic section on soft approaches to information retrieval and information access on the web
    • Aringhieri, R., Damiani, E., Di Vimercati, S. D. C., Paraboschi, S., & Samarati, P. (2006, February). Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems: Special topic section on soft approaches to information retrieval and information access on the web. Journal of the American Society for Information Science and Technology, 57(4), 528-537. doi:10.1002/asi.20307.
    • (2006) Journal of the American Society for Information Science and Technology , vol.57 , Issue.4 , pp. 528-537
    • Aringhieri, R.1    Damiani, E.2    Di Vimercati, S.D.C.3    Paraboschi, S.4    Samarati, P.5
  • 9
    • 84898379658 scopus 로고    scopus 로고
    • Enterprise privacy authorization language (EPAL 1.1)
    • Retrieved March, 2012
    • Ashley, P. (2003). Enterprise privacy authorization language (EPAL 1.1). W3C Working Group. Retrieved March, 2012, from http://www.zurich. ibm.com/security/enterprise-privacy/epal/Specification/.
    • (2003) W3C Working Group
    • Ashley, P.1
  • 10
    • 84871397634 scopus 로고    scopus 로고
    • 29 October. Retrieved March, 2012
    • Australian broadcasting corporation (ABC). (2007, 29 October). ABC media watch, filleting facebook. Retrieved March, 2012, from http://www.abc.net.au/mediawatch/transcripts/s2074079.htm.
    • (2007) ABC media watch, filleting facebook
  • 13
    • 80053137331 scopus 로고    scopus 로고
    • Simulating the effect of privacy concerns in online social networks
    • IEEE International Conference.
    • Baracaldo, N., López, C., Anwar, M., & Lewis, M. (2011). Simulating the effect of privacy concerns in online social networks (pp. 519-524). Information Reuse and Integration (IRI), IEEE International Conference.
    • (2011) Information Reuse and Integration (IRI) , pp. 519-524
    • Baracaldo, N.1    López, C.2    Anwar, M.3    Lewis, M.4
  • 14
    • 33745267229 scopus 로고    scopus 로고
    • Composing security policies with Polymer
    • Bauer, L., Ligatti, J., & Walker, D. (2005, June). Composing security policies with Polymer. SIGPLAN Notices, 40, 305-314. doi:10.1145/1064978.1065047.
    • (2005) SIGPLAN Notices , vol.40 , pp. 305-314
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 22
    • 65449147584 scopus 로고    scopus 로고
    • The cost of privacy: Destruction of data-mining utility in anonymized data publishing
    • Li, Y., Liu, B., & Sarawagi, S. (Eds.), ACM
    • Brickell, J., & Shmatikov, V. (2008). The cost of privacy: Destruction of data-mining utility in anonymized data publishing. In Li, Y., Liu, B., & Sarawagi, S. (Eds.), KDD (pp. 70-78). ACM. doi:10.1145/1401890.1401904.
    • (2008) KDD , pp. 70-78
    • Brickell, J.1    Shmatikov, V.2
  • 23
    • 84944583235 scopus 로고    scopus 로고
    • FOAF Vocabulary Specification 0.91
    • (Computer software manual No. November)
    • Brickley, D., & Miller, L. (2007). FOAF Vocabulary Specification 0.91. Retrieved March, 2012, from http://xmlns.com/foaf/spec/20071002.html (Computer software manual No. November).
    • (2007) Retrieved March , vol.2012
    • Brickley, D.1    Miller, L.2
  • 24
    • 32544446344 scopus 로고    scopus 로고
    • FOAF Vocabulary Specification 0.97 (Namespace document)
    • January. Retrieved March, 2012
    • Brickley, D., & Miller, L. (2010, January). FOAF Vocabulary Specification 0.97 (Namespace document). Retrieved March, 2012, from http://xmlns. com/foaf/spec/20100101.html.
    • (2010)
    • Brickley, D.1    Miller, L.2
  • 25
    • 70349645707 scopus 로고    scopus 로고
    • Pharmacy students' Facebook activity and opinions regarding accountability and e-professionalism
    • Cain, J., Scott, D. R., & Akers, P. (2009, October). Pharmacy students' Facebook activity and opinions regarding accountability and e-professionalism. American Journal of Pharmaceutical Education, 73(6), 104. doi:10.5688/aj7306104.
    • (2009) American Journal of Pharmaceutical Education , vol.73 , Issue.6 , pp. 104
    • Cain, J.1    Scott, D.R.2    Akers, P.3
  • 26
    • 27244460655 scopus 로고    scopus 로고
    • Access control lists
    • van Tilborg, H. C. A., & Jajodia, S. (Eds.), (2nd ed.). Springer.
    • Cankaya, H. C. (2011). Access control lists. In van Tilborg, H. C. A., & Jajodia, S. (Eds.), Encyclopedia of cryptography and security (2nd ed., pp. 9-12). Springer.
    • (2011) Encyclopedia of cryptography and security , pp. 9-12
    • Cankaya, H.C.1
  • 28
    • 33845418806 scopus 로고    scopus 로고
    • The REL-X vocabulary
    • Retrieved March, 2012
    • Carminati, B., Ferrari, E., & Perego, A. (2006a). The REL-X vocabulary. OWL Vocabulary. Retrieved March, 2012, from http://www.dicom. uninsubria.it/andrea.perego/vocs/relx.owl.
    • (2006) OWL Vocabulary
    • Carminati, B.1    Ferrari, E.2    Perego, A.3
  • 37
    • 34250446073 scopus 로고
    • Multipart pricing of public goods
    • Clarke, E. H. (1971). Multipart pricing of public goods. Star, 11(1), 17-33.
    • (1971) Star , vol.11 , Issue.1 , pp. 17-33
    • Clarke, E.H.1
  • 40
    • 72949088489 scopus 로고    scopus 로고
    • Safebook: A privacy-preserving online social network leveraging on real-life trust
    • Cutillo, L., Molva, R., & Strufe, T. (2009). Safebook: A privacy-preserving online social network leveraging on real-life trust. Communications Magazine, IEEE, 47(12), 94-101. doi:10.1109/MCOM.2009.5350374.
    • (2009) Communications Magazine, IEEE , vol.47 , Issue.12 , pp. 94-101
    • Cutillo, L.1    Molva, R.2    Strufe, T.3
  • 42
    • 70450206356 scopus 로고    scopus 로고
    • Facebook and online privacy: Attitudes, behaviors, and unintended consequences
    • Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108. doi:10.1111/j.1083-6101.2009.01494.x.
    • (2009) Journal of Computer-Mediated Communication , vol.15 , Issue.1 , pp. 83-108
    • Debatin, B.1    Lovejoy, J.P.2    Horn, A.-K.3    Hughes, B.N.4
  • 43
    • 0000338326 scopus 로고
    • Programming semantics for multi-programmed computations
    • Dennis, J. B., & Van Horn, E. C. (1966). Programming semantics for multi-programmed computations. Communications of the ACM, 9(3), 143-155. doi:10.1145/365230.365252.
    • (1966) Communications of the ACM , vol.9 , Issue.3 , pp. 143-155
    • Dennis, J.B.1    Van Horn, E.C.2
  • 45
    • 8644231057 scopus 로고    scopus 로고
    • Public displays of connection
    • Donath, J., & Boyd, D. (2004). Public displays of connection. BT Technology Journal, 22, 71-82. doi:10.1023/B:BTTJ.0000047585.06264.cc.
    • (2004) BT Technology Journal , vol.22 , pp. 71-82
    • Donath, J.1    Boyd, D.2
  • 46
    • 84870159064 scopus 로고    scopus 로고
    • Trust and privacy concern within social networking sites: A comparison of Facebook and Myspace
    • Hoxmeier, J. A., & Hayne, S. (Eds.). Association for Information Systems.
    • Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and Myspace. In Hoxmeier, J. A., & Hayne, S. (Eds.), AMCIS (p. 339). Association for Information Systems.
    • (2007) AMCIS , pp. 339
    • Dwyer, C.1    Hiltz, S.R.2    Passerini, K.3
  • 48
    • 85032555332 scopus 로고    scopus 로고
    • Website
    • Facebook. (2011). Website. Retrieved March, 2012, from http://www.facebook.com.
    • (2011) Retrieved March , vol.2012
  • 49
    • 85032527680 scopus 로고    scopus 로고
    • Facebook Stat. Page. Website. Retrieved March, 2012
    • Facebook Stat. Page. (2011). Website. Retrieved March, 2012, from http://www.socialtechnologyreview. com/articles/50-facebook-stats-everymarketer-should-know.
    • (2011)
  • 54
    • 84856186856 scopus 로고    scopus 로고
    • Access control requirements for Web 2.0 Security and Privacy
    • Gates, C. (2007). Access control requirements for Web 2.0 Security and Privacy. IEEE Web, 2, 2-4.
    • (2007) IEEE Web , vol.2 , pp. 2-4
    • Gates, C.1
  • 57
    • 33750077260 scopus 로고    scopus 로고
    • Combining provenance with trust in social networks for semantic web content filtering
    • Springer.
    • Golbeck, J. (2006). Combining provenance with trust in social networks for semantic web content filtering. In IPAW'06 (p. 101-108). Springer.
    • (2006) In IPAW'06 , pp. 101-108
    • Golbeck, J.1
  • 58
    • 85009714348 scopus 로고    scopus 로고
    • Trust and nuanced profile similarity in online social networks
    • ACM.
    • Golbeck, J. (2009). Trust and nuanced profile similarity in online social networks. TWEB, 3(4). ACM.
    • (2009) TWEB , vol.3 , Issue.4
    • Golbeck, J.1
  • 59
    • 34247960076 scopus 로고
    • The strength of weak ties
    • Granovetter, M. S. (1973, January). The strength of weak ties. JSTOR. American Journal of Sociology, 78(6), 1360-1380. doi:10.1086/225469.
    • (1973) JSTOR. American Journal of Sociology , vol.78 , Issue.6 , pp. 1360-1380
    • Granovetter, M.S.1
  • 61
    • 0001314984 scopus 로고
    • Incentives in teams
    • Groves, T. (1973). Incentives in teams. Econometrica, 41, 617-631. doi:10.2307/1914085.
    • (1973) Econometrica , vol.41 , pp. 617-631
    • Groves, T.1
  • 64
    • 84985847320 scopus 로고
    • On the measurement of perceived consumer risk
    • Havlena, W. J., & DeSarbo, W. S. (1991). On the measurement of perceived consumer risk. Decision Sciences, 22(4), 927-939. doi:10.1111/j.1540-5915.1991.tb00372.x.
    • (1991) Decision Sciences , vol.22 , Issue.4 , pp. 927-939
    • Havlena, W.J.1    DeSarbo, W.S.2
  • 68
    • 84862334846 scopus 로고
    • On the Chinese wall model. In Proceedings of the second European symposium on research in computer security
    • London, UK: Springer-Verlag.
    • Kessler, V. (1992). On the Chinese wall model. In Proceedings of the second European symposium on research in computer security (pp. 41-54). London, UK: Springer-Verlag.
    • (1992) , pp. 41-54
    • Kessler, V.1
  • 69
    • 26844521066 scopus 로고    scopus 로고
    • FOAF-realm-control your friends' access to the resourc
    • Kruk, S. (2004). FOAF-realm-control your friends' access to the resource. FOAF Workshop proceedings 186. Retrieved March, 2012, from http://www.w3.org/2001/sw/Europe/events/foafgalway/papers/fp/foaf realm/.
    • (2004) FOAF Workshop proceedings 186. Retrieved March , vol.2012
    • Kruk, S.1
  • 70
    • 84898342466 scopus 로고    scopus 로고
    • D-FOAF: Distributed identity management with access rights delegation
    • Kruk, S., Grzonkowski, S., Gzella, A., Woroniecki, T., & Choi, H. (2006). D-FOAF: Distributed identity management with access rights delegation. The Semantic Web-ASWC 2006(4), 140-154.
    • (2006) The Semantic Web-ASWC , vol.2006 , Issue.4 , pp. 140-154
    • Kruk, S.1    Grzonkowski, S.2    Gzella, A.3    Woroniecki, T.4    Choi, H.5
  • 72
    • 78449236464 scopus 로고    scopus 로고
    • Attack-resistant trust metrics
    • Springer.
    • Levien, R. (2009). Attack-resistant trust metrics. In Computing with social trust (pp. 121-132). Springer. doi:10.1007/978-1-84800-356-9_5.
    • (2009) In Computing with social trust , pp. 121-132
    • Levien, R.1
  • 74
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • Li, N., Grosof, B. N., & Feigenbaum, J. (2003, February). Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security, 6(1), 128-171. doi:10.1145/605434.605438.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 76
    • 70350634219 scopus 로고    scopus 로고
    • On the tradeoff between privacy and utility in data publishing
    • Elder, J. F. IV, Fogelman-Soulie, F., Flach, P. A., & Zaki, M. (Eds.), ACM
    • Li, T., & Li, N. (2009). On the tradeoff between privacy and utility in data publishing. In Elder, J. F. IV, Fogelman-Soulie, F., Flach, P. A., & Zaki, M. (Eds.), KDD (pp. 517-526). ACM. doi:10.1145/1557019.1557079.
    • (2009) KDD , pp. 517-526
    • Li, T.1    Li, N.2
  • 77
    • 33646066871 scopus 로고    scopus 로고
    • Enforcing non-safety security policies with program monitors
    • Ligatti, J., Bauer, L., & Walker, D. (2005). Enforcing non-safety security policies with program monitors. Computer Security ESORICS, 3679, 355-373.
    • (2005) Computer Security ESORICS , vol.3679 , pp. 355-373
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 83
    • 33646389513 scopus 로고    scopus 로고
    • Ontologies are us: A unified model of social networks and semantics
    • Gil, Y., Motta, E., Benjamins, V. R., & Musen, M. A. (Eds.), Springer
    • Mika, P. (2005). Ontologies are us: A unified model of social networks and semantics. In Gil, Y., Motta, E., Benjamins, V. R., & Musen, M. A. (Eds.), The Semantic Web - ISWC 2005 (pp. 522-536). Springer. doi:10.1007/11574620_38.
    • (2005) The Semantic Web - ISWC 2005 , pp. 522-536
    • Mika, P.1
  • 88
    • 84944592945 scopus 로고    scopus 로고
    • Website. Retrieved March, 2012
    • New Myspace and Facebook worms target social networks. (2008). Website. Retrieved March, 2012, from http://www.darknet.org.uk/2008/08/new-myspace-and-facebook-worm-target-socialnetworks/.
    • (2008)
  • 90
    • 33847382472 scopus 로고    scopus 로고
    • The privacy paradox: Personal information disclosure intentions versus behaviors
    • Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. The Journal of Consumer Affairs, 41(1), 100-126. doi:10.1111/j.1745-6606.2006.00070.x.
    • (2007) The Journal of Consumer Affairs , vol.41 , Issue.1 , pp. 100-126
    • Norberg, P.A.1    Horne, D.R.2    Horne, D.A.3
  • 91
    • 84944610661 scopus 로고    scopus 로고
    • Website. Retrieved March, 2012
    • Oasis committee. XACML 2.0 specification. (2012). Website. Retrieved March, 2012, from http://www.oasisopen.org/committees/tchome. php?wgabbrev= xacmlXACML20.
    • (2012)
  • 92
    • 0002690288 scopus 로고
    • A comparative analysis of three consumer decision strategies
    • Peter, J. P., Tarpey, S., & Lawrence, X. (1975, June). A comparative analysis of three consumer decision strategies. The Journal of Consumer Research, 2(1), 29-37. doi:10.1086/208613.
    • (1975) The Journal of Consumer Research , vol.2 , Issue.1 , pp. 29-37
    • Peter, J.P.1    Tarpey, S.2    Lawrence, X.3
  • 94
    • 34250001672 scopus 로고    scopus 로고
    • What anyone can know: The privacy risks of social networking sites
    • Rosenblum, D. (2007, May-June). What anyone can know: The privacy risks of social networking sites. Security Privacy, IEEE, 5(3), 40-49. doi:10.1109/MSP.2007.75.
    • (2007) Security Privacy, IEEE , vol.5 , Issue.3 , pp. 40-49
    • Rosenblum, D.1
  • 95
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • R. Focardi & R. Gorrieri (Eds.). Springer
    • Samarati, P., & Vimercati, S. D. C. D. (2000). Access control: Policies, models, and mechanisms. In R. Focardi & R. Gorrieri (Eds.), FOSAD (LNCS Vol. 2171, p. 137-196). Springer.
    • (2000) FOSAD. LNCS , vol.2171 , pp. 137-196
    • Samarati, P.1    Vimercati, S.D.C.D.2
  • 99
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. (1979, November). How to share a secret. Communications of the ACM, 22(11), 612-613. doi:10.1145/359168.359176.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 101
    • 84944556270 scopus 로고
    • Models of bounded rationality. Trustme: Anonymous management of trust relationships in decentralized P2P systems
    • N. Shahmehri, R. L. Graham, & G. Caronni (Eds.). IEEE Computer Society.
    • Simon, H. A. (1982). Models of bounded rationality. Trustme: Anonymous management of trust relationships in decentralized P2P systems. In N. Shahmehri, R. L. Graham, & G. Caronni (Eds.), Peer-to-peer computing (p. 142-149). IEEE Computer Society.
    • (1982) Peer-to-peer computing , pp. 142-149
    • Simon, H.A.1
  • 104
    • 78650520974 scopus 로고    scopus 로고
    • Privacy policies for shared content in social network sites
    • Squicciarini, A. C., Shehab, M., & Wede, J. (2010, June). Privacy policies for shared content in social network sites. The VLDB Journal, 19(6), 777-796. doi:10.1007/s00778-010-0193-7.
    • (2010) The VLDB Journal , vol.19 , Issue.6 , pp. 777-796
    • Squicciarini, A.C.1    Shehab, M.2    Wede, J.3
  • 105
    • 76449113515 scopus 로고    scopus 로고
    • Web-traveler policies for images on social networks
    • Squicciarini, A. C., & Sundareswaran, S. (2009, December). Web-traveler policies for images on social networks. World Wide Web (Bussum), 12, 461-484. doi:10.1007/s11280-009-0070-8.
    • (2009) World Wide Web (Bussum) , vol.12 , pp. 461-484
    • Squicciarini, A.C.1    Sundareswaran, S.2
  • 108
  • 109
    • 84944547312 scopus 로고    scopus 로고
    • The Google+ project. Website. Retrieved March, 2012
    • The Google+ project. (2011). Website. Retrieved March, 2012, from https://plus.google.com.
    • (2011)
  • 110
    • 84944610906 scopus 로고    scopus 로고
    • The state of social media 2011: Social is the new normal
    • Website. Retrieved March, 2012
    • The state of social media 2011: Social is the new normal. (2012). Website. Retrieved March, 2012, from http://www.briansolis.com/2011/10/http://www.briansolis.com/2011/10/state-of-socialmedia-2011/.
    • (2012)
  • 111
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
    • ACM.
    • Thomas, R. K. (1997). Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In Second ACM workshop on role-based access control (pp. 13-19). ACM.
    • (1997) In Second ACM workshop on role-based access control , pp. 13-19
    • Thomas, R.K.1
  • 112
    • 84988789822 scopus 로고
    • Conceptual foundations for a model of task-based authorizations
    • IEEE Computer Society Press.
    • Thomas, R. K., & Sandhu, R. S. (1994). Conceptual foundations for a model of task-based authorizations. In 7th IEEE computer security foundations workshop (pp. 66-79). IEEE Computer Society Press.
    • (1994) In 7th IEEE computer security foundations workshop , pp. 66-79
    • Thomas, R.K.1    Sandhu, R.S.2
  • 114
    • 24344501341 scopus 로고    scopus 로고
    • Access control in collaborative systems
    • Tolone, W., Ahn, G.-J., Pai, T., & Hong, S.-P. (2005). Access control in collaborative systems. ACM Computing Surveys, 37(1), 29-41. doi:10.1145/1057977.1057979.
    • (2005) ACM Computing Surveys , vol.37 , Issue.1 , pp. 29-41
    • Tolone, W.1    Ahn, G.-J.2    Pai, T.3    Hong, S.-P.4
  • 119
    • 85032546197 scopus 로고    scopus 로고
    • Status for resource description framework (RDF) model and syntax specification
    • W3C. (2009a). Status for resource description framework (RDF) model and syntax specification. Retrieved March, 2012, from http://www. w3.org/1999/status/PR-rdf-syntax-19990105/status.
    • (2009) Retrieved March , vol.2012
  • 120
    • 49049083997 scopus 로고    scopus 로고
    • Retrieved March, 2012
    • W3C. (2009b). W3C semantic web activity. Retrieved March, 2012, from http://www. w3.org/2001/sw/.
    • (2009) W3C semantic web activity
  • 124
    • 84899266027 scopus 로고    scopus 로고
    • Creating a policy-aware web: Discretionary, rule-based access for the world wide web
    • Ferrari, E., & Thuraisingham, B. (Eds.), Idea Group Inc
    • Weitzner, D. J., Hendler, J., Berners-Lee, T., & Connolly, D. (2006). Creating a policy-aware web: Discretionary, rule-based access for the world wide web. In Ferrari, E., & Thuraisingham, B. (Eds.), Web and information security (pp. 1-31). Idea Group Inc. doi:10.4018/978-1-59140-588-7. ch001.
    • (2006) Web and information security , pp. 1-31
    • Weitzner, D.J.1    Hendler, J.2    Berners-Lee, T.3    Connolly, D.4
  • 126
    • 3142738238 scopus 로고    scopus 로고
    • Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities
    • Xiong, L., & Liu, L. (2004, July 8-10). Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), 843-857. doi:10.1109/TKDE.2004.1318566.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 127
    • 79960159841 scopus 로고    scopus 로고
    • A reachability-based access control model for online social networks
    • New York, NY, USA: ACM.
    • Abdessalem, T., & Dhia, I. B. (2011). A reachability-based access control model for online social networks. In Databases and social networks (pp. 31-36). New York, NY, USA: ACM. doi:10.1145/1996413.1996419.
    • (2011) In Databases and social networks , pp. 31-36
    • Abdessalem, T.1    Dhia, I.B.2
  • 129
    • 70350520397 scopus 로고    scopus 로고
    • Access control and privacy in web-based social networks
    • Emerald Group Publishing Limited
    • Carminati, B., & Ferrari, E. (2008). Access control and privacy in web-based social networks. Access Control and Privacy in Web-based Social Networks, 4(4), 395-415. Emerald Group Publishing Limited.
    • (2008) Access Control and Privacy in Web-based Social Networks , vol.4 , Issue.4 , pp. 395-415
    • Carminati, B.1    Ferrari, E.2
  • 131
    • 33745255702 scopus 로고    scopus 로고
    • License script: A logical language for digital rights management
    • Chong, C., Corin, R., Doumen, J., & Etalle, S. (2006). License script: A logical language for digital rights management. Annales des Télécommunications, 61(3), 284-331. doi:10.1007/BF03219910.
    • (2006) Annales des Télécommunications , vol.61 , Issue.3 , pp. 284-331
    • Chong, C.1    Corin, R.2    Doumen, J.3    Etalle, S.4
  • 133
    • 70450206356 scopus 로고    scopus 로고
    • Facebook and online privacy: Attitudes, behaviors, and unintended consequences
    • Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108. doi:10.1111/j.1083-6101.2009.01494.x.
    • (2009) Journal of Computer-Mediated Communication , vol.15 , Issue.1 , pp. 83-108
    • Debatin, B.1    Lovejoy, J.P.2    Horn, A.-K.3    Hughes, B.N.4
  • 138
    • 0001862139 scopus 로고
    • Friendship as a social process: A substantive and methodological analysis
    • Berger, M., Abel, T., & Page, C. (Eds.), New York: Van Nostrand
    • Lazarsfeld, P. F., & Merton, R. K. (1954). Friendship as a social process: A substantive and methodological analysis. In Berger, M., Abel, T., & Page, C. (Eds.), Freedom and control in modern society (pp. 18-66). New York: Van Nostrand.
    • (1954) Freedom and control in modern society , pp. 18-66
    • Lazarsfeld, P.F.1    Merton, R.K.2
  • 139
  • 142
    • 80052620039 scopus 로고    scopus 로고
    • Useractivity centric framework for access control in online social networks
    • Park, J., Sandhu, R., & Cheng, Y. (2011). Useractivity centric framework for access control in online social networks. IEEE Internet Computing, 1-9.
    • (2011) IEEE Internet Computing , pp. 1-9
    • Park, J.1    Sandhu, R.2    Cheng, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.