-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi, M., Burrows, M., Lampson, B., & Plotkin, G. (1993). A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4), 706-734. doi:10.1145/155183.155225.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
20844435621
-
The Lowell database research self-assessment
-
Abiteboul, S., Agrawal, R., Bernstein, P., Carey, M., Ceri, S., & Croft, B. (2005, May). The Lowell database research self-assessment. Communications of the ACM, 48(5), 111-118. doi:10.1145/1060710.1060718.
-
(2005)
Communications of the ACM
, vol.48
, Issue.5
, pp. 111-118
-
-
Abiteboul, S.1
Agrawal, R.2
Bernstein, P.3
Carey, M.4
Ceri, S.5
Croft, B.6
-
3
-
-
50249103030
-
-
ENISA
-
Acquisti, A., Carrara, E., Stutzman, F., Callas, J., Schimmer, K., & Nadjm, M. (2007). Security issues and recommendations for online social networks. ENISA.
-
(2007)
Security issues and recommendations for online social networks
-
-
Acquisti, A.1
Carrara, E.2
Stutzman, F.3
Callas, J.4
Schimmer, K.5
Nadjm, M.6
-
4
-
-
14744275332
-
Privacy and rationality in individual decision-making
-
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision-making. IEEE Security and Privacy, 3(1), 26-33. doi:10.1109/MSP.2005.22.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
5
-
-
84856657264
-
-
IEEE. Alessandra, M., Kristen, L., & Eytan, A. (Last Updated April 2011.). The PVIZ comprehension tool for social network privacy settings. UM
-
Ahmad, A., & Whitworth, B. (2011). Distributed access control for social networks. Information Assurance and Security (IAS) (pp. 68-73). IEEE. Alessandra, M., Kristen, L., & Eytan, A. (Last Updated April 2011.). The PVIZ comprehension tool for social network privacy settings. UM Tech Report #CSE-TR-570-11.
-
(2011)
Distributed access control for social networks. Information Assurance and Security (IAS)
, pp. 68-73
-
-
Ahmad, A.1
Whitworth, B.2
-
6
-
-
70349085043
-
A trust based approach for protecting user data in social networks
-
New York, NY, USA: ACM.
-
Ali, B., Villegas, W., & Maheswaran, M. (2007). A trust based approach for protecting user data in social networks. In Proceedings of the 2007 conference of the center for advanced studies on collaborative research (pp. 288-293). New York, NY, USA: ACM.
-
(2007)
In Proceedings of the 2007 conference of the center for advanced studies on collaborative research
, pp. 288-293
-
-
Ali, B.1
Villegas, W.2
Maheswaran, M.3
-
7
-
-
79952792326
-
-
Department of Computer Science, University of Calgary, Calgary, Alberta, Canada.
-
Anwar, M., & Fong, P. W. L. (2010). An access control model for Facebook-style social network systems (Tech. Rep. No. 2010-959-08). Department of Computer Science, University of Calgary, Calgary, Alberta, Canada.
-
(2010)
An access control model for Facebook-style social network systems
-
-
Anwar, M.1
Fong, P.W.L.2
-
8
-
-
33644998913
-
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems: Special topic section on soft approaches to information retrieval and information access on the web
-
Aringhieri, R., Damiani, E., Di Vimercati, S. D. C., Paraboschi, S., & Samarati, P. (2006, February). Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems: Special topic section on soft approaches to information retrieval and information access on the web. Journal of the American Society for Information Science and Technology, 57(4), 528-537. doi:10.1002/asi.20307.
-
(2006)
Journal of the American Society for Information Science and Technology
, vol.57
, Issue.4
, pp. 528-537
-
-
Aringhieri, R.1
Damiani, E.2
Di Vimercati, S.D.C.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
84898379658
-
Enterprise privacy authorization language (EPAL 1.1)
-
Retrieved March, 2012
-
Ashley, P. (2003). Enterprise privacy authorization language (EPAL 1.1). W3C Working Group. Retrieved March, 2012, from http://www.zurich. ibm.com/security/enterprise-privacy/epal/Specification/.
-
(2003)
W3C Working Group
-
-
Ashley, P.1
-
10
-
-
84871397634
-
-
29 October. Retrieved March, 2012
-
Australian broadcasting corporation (ABC). (2007, 29 October). ABC media watch, filleting facebook. Retrieved March, 2012, from http://www.abc.net.au/mediawatch/transcripts/s2074079.htm.
-
(2007)
ABC media watch, filleting facebook
-
-
-
11
-
-
0003727420
-
-
Cambridge University Press.
-
Baader, F., Calvanese, D., McGuinness, D., Nardi, D., & Patel-Schneider, P. (2003). The description logic handbook: Theory, implementation and applications. Cambridge University Press.
-
(2003)
The description logic handbook: Theory, implementation and applications
-
-
Baader, F.1
Calvanese, D.2
McGuinness, D.3
Nardi, D.4
Patel-Schneider, P.5
-
12
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
New York, NY, USA, ACM.
-
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., & Starin, D. (2009). Persona: An online social network with user-defined privacy. In Proceedings of the ACM SIGCOMM 2009 conference on data communication (pp. 135-146). New York, NY, USA, ACM.
-
(2009)
In Proceedings of the ACM SIGCOMM 2009 conference on data communication
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
13
-
-
80053137331
-
Simulating the effect of privacy concerns in online social networks
-
IEEE International Conference.
-
Baracaldo, N., López, C., Anwar, M., & Lewis, M. (2011). Simulating the effect of privacy concerns in online social networks (pp. 519-524). Information Reuse and Integration (IRI), IEEE International Conference.
-
(2011)
Information Reuse and Integration (IRI)
, pp. 519-524
-
-
Baracaldo, N.1
López, C.2
Anwar, M.3
Lewis, M.4
-
14
-
-
33745267229
-
Composing security policies with Polymer
-
Bauer, L., Ligatti, J., & Walker, D. (2005, June). Composing security policies with Polymer. SIGPLAN Notices, 40, 305-314. doi:10.1145/1064978.1065047.
-
(2005)
SIGPLAN Notices
, vol.40
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
15
-
-
84898351115
-
Watermarking social networking relational data using non-numeric attribute
-
Bedi, R., Wadhai, V.M., Sugandhi, R., & Mirajkar, A.(2005). Watermarking social networking relational data using non-numeric attribute. International Journal of Computer Science 9.
-
(2005)
International Journal of Computer Science
, pp. 9
-
-
Bedi, R.1
Wadhai, V.M.2
Sugandhi, R.3
Mirajkar, A.4
-
18
-
-
16444368611
-
Privacy in e-commerce: Stated preferences vs
-
Berendt, B., Gunther, O., & Spiekermann, S. (2005, April). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48, 101-106. doi:10.1145/1053291.1053295.
-
(2005)
actual behavior. Communications of the ACM
, vol.48
, pp. 101-106
-
-
Berendt, B.1
Gunther, O.2
Spiekermann, S.3
-
20
-
-
0029700344
-
Decentralized trust management
-
Washington, DC, USA: IEEE Computer Society.
-
Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. In Proceedings of the 1996 IEEE symposium on security and privacy (pp. 164-173). Washington, DC, USA: IEEE Computer Society.
-
(1996)
In Proceedings of the 1996 IEEE symposium on security and privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
21
-
-
85025424440
-
An algebra for composing access control policies
-
Bonatti, P., De Capitani Di Vimercati, S., & Samarati, P. (2002). An algebra for composing access control policies. ACM Transactions on Information and System Security, 5(1), 1-35. doi:10.1145/504909.504910.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
22
-
-
65449147584
-
The cost of privacy: Destruction of data-mining utility in anonymized data publishing
-
Li, Y., Liu, B., & Sarawagi, S. (Eds.), ACM
-
Brickell, J., & Shmatikov, V. (2008). The cost of privacy: Destruction of data-mining utility in anonymized data publishing. In Li, Y., Liu, B., & Sarawagi, S. (Eds.), KDD (pp. 70-78). ACM. doi:10.1145/1401890.1401904.
-
(2008)
KDD
, pp. 70-78
-
-
Brickell, J.1
Shmatikov, V.2
-
23
-
-
84944583235
-
FOAF Vocabulary Specification 0.91
-
(Computer software manual No. November)
-
Brickley, D., & Miller, L. (2007). FOAF Vocabulary Specification 0.91. Retrieved March, 2012, from http://xmlns.com/foaf/spec/20071002.html (Computer software manual No. November).
-
(2007)
Retrieved March
, vol.2012
-
-
Brickley, D.1
Miller, L.2
-
24
-
-
32544446344
-
FOAF Vocabulary Specification 0.97 (Namespace document)
-
January. Retrieved March, 2012
-
Brickley, D., & Miller, L. (2010, January). FOAF Vocabulary Specification 0.97 (Namespace document). Retrieved March, 2012, from http://xmlns. com/foaf/spec/20100101.html.
-
(2010)
-
-
Brickley, D.1
Miller, L.2
-
25
-
-
70349645707
-
Pharmacy students' Facebook activity and opinions regarding accountability and e-professionalism
-
Cain, J., Scott, D. R., & Akers, P. (2009, October). Pharmacy students' Facebook activity and opinions regarding accountability and e-professionalism. American Journal of Pharmaceutical Education, 73(6), 104. doi:10.5688/aj7306104.
-
(2009)
American Journal of Pharmaceutical Education
, vol.73
, Issue.6
, pp. 104
-
-
Cain, J.1
Scott, D.R.2
Akers, P.3
-
26
-
-
27244460655
-
Access control lists
-
van Tilborg, H. C. A., & Jajodia, S. (Eds.), (2nd ed.). Springer.
-
Cankaya, H. C. (2011). Access control lists. In van Tilborg, H. C. A., & Jajodia, S. (Eds.), Encyclopedia of cryptography and security (2nd ed., pp. 9-12). Springer.
-
(2011)
Encyclopedia of cryptography and security
, pp. 9-12
-
-
Cankaya, H.C.1
-
27
-
-
70450255117
-
A semantic web based framework for social network access control
-
New York, NY, USA: ACM.
-
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., & Thuraisingham, B. (2009). A semantic web based framework for social network access control. In Proceedings of the 14th ACM symposium on access control models and technologies (pp. 177-186). New York, NY, USA: ACM.
-
(2009)
In Proceedings of the 14th ACM symposium on access control models and technologies
, pp. 177-186
-
-
Carminati, B.1
Ferrari, E.2
Heatherly, R.3
Kantarcioglu, M.4
Thuraisingham, B.5
-
28
-
-
33845418806
-
The REL-X vocabulary
-
Retrieved March, 2012
-
Carminati, B., Ferrari, E., & Perego, A. (2006a). The REL-X vocabulary. OWL Vocabulary. Retrieved March, 2012, from http://www.dicom. uninsubria.it/andrea.perego/vocs/relx.owl.
-
(2006)
OWL Vocabulary
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
29
-
-
33845467743
-
Rule-based access control for social networks
-
Springer.
-
Carminati, B., Ferrari, E., & Perego, A. (2006b). Rule-based access control for social networks. In On the Move to Meaningful Internet Systems 2006: OTM Workshops (2), (pp. 1734-1744). Springer.
-
(2006)
In On the Move to Meaningful Internet Systems 2006: OTM Workshops (2)
, pp. 1734-1744
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
30
-
-
57049188320
-
Enhancing Java-ME security support with resource usage monitoring
-
Berlin, Germany: Springer-Verlag.
-
Castrucci, A., Martinelli, F., Mori, P., & Roperti, F. (2008). Enhancing Java-ME security support with resource usage monitoring. In Proceedings of the 10th international conference on information and communications security, 5308 (pp. 256-266). Berlin, Germany: Springer-Verlag.
-
(2008)
In Proceedings of the 10th international conference on information and communications security
, vol.5308
, pp. 256-266
-
-
Castrucci, A.1
Martinelli, F.2
Mori, P.3
Roperti, F.4
-
31
-
-
0033340192
-
Searching near-replicas of images via clustering
-
Chang, E., Li, C., Wang, J., Mork, P., & Wiederhold, G. (1999). Searching near-replicas of images via clustering. In Proc. SPIE symposium of voice, video, and data communications (pp. 281-292).
-
(1999)
In Proc. SPIE symposium of voice, video, and data communications
, pp. 281-292
-
-
Chang, E.1
Li, C.2
Wang, J.3
Mork, P.4
Wiederhold, G.5
-
33
-
-
33748060530
-
Constraint generation for separation of duty
-
New York, NY, USA: ACM.
-
Chen, H., & Li, N. (2006). Constraint generation for separation of duty. In Proceedings of the eleventh ACM symposium on access control models and technologies (pp. 130-138). New York, NY, USA: ACM.
-
(2006)
In Proceedings of the eleventh ACM symposium on access control models and technologies
, pp. 130-138
-
-
Chen, H.1
Li, N.2
-
34
-
-
84898114661
-
Comparison of access control administration models
-
Chinaei, A. H., Barker, K. & Tompa, K. (2009). Comparison of access control administration models. Ubiquitous Communication and Computing Journal (UBICC), 4(3).
-
(2009)
Ubiquitous Communication and Computing Journal (UBICC)
, vol.4
, Issue.3
-
-
Chinaei, A.H.1
Barker, K.2
Tompa, K.3
-
36
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., & Rivest, R. L. (2002, February). Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4), 285-322.
-
(2002)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
37
-
-
34250446073
-
Multipart pricing of public goods
-
Clarke, E. H. (1971). Multipart pricing of public goods. Star, 11(1), 17-33.
-
(1971)
Star
, vol.11
, Issue.1
, pp. 17-33
-
-
Clarke, E.H.1
-
38
-
-
0035791053
-
Securing context-aware applications using environment roles
-
New York, NY, USA: ACM Press.
-
Covington, M. J., Long, W., Srinivasan, S., Dev, A. K., Ahamad, M., & Abowd, G. D. (2001). Securing context-aware applications using environment roles. In SACMAT '01: Proceedings of the sixth ACM symposium on access control models and technologies (pp. 10-20). New York, NY, USA: ACM Press.
-
(2001)
In SACMAT '01: Proceedings of the sixth ACM symposium on access control models and technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dev, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
39
-
-
70349334415
-
Social network privacy via evolving access control
-
Berlin, Germany: Springer-Verlag.
-
Crescenzo, G., & Lipton, R. J. (2009). Social network privacy via evolving access control. In Proceedings of the 4th international conference on wireless algorithms, systems, and applications (pp. 551-560). Berlin, Germany: Springer-Verlag.
-
(2009)
In Proceedings of the 4th international conference on wireless algorithms, systems, and applications
, pp. 551-560
-
-
Crescenzo, G.1
Lipton, R.J.2
-
40
-
-
72949088489
-
Safebook: A privacy-preserving online social network leveraging on real-life trust
-
Cutillo, L., Molva, R., & Strufe, T. (2009). Safebook: A privacy-preserving online social network leveraging on real-life trust. Communications Magazine, IEEE, 47(12), 94-101. doi:10.1109/MCOM.2009.5350374.
-
(2009)
Communications Magazine, IEEE
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.1
Molva, R.2
Strufe, T.3
-
41
-
-
84875664448
-
Access control policies and languages in open environments
-
Springer.
-
De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., & Samarati, P. (2007). Access control policies and languages in open environments. In Secure Data Management in Decentralized Systems (pp. 21-58). Springer. doi:10.1007/978-0-387-27696-0_2.
-
(2007)
In Secure Data Management in Decentralized Systems
, pp. 21-58
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Samarati, P.4
-
42
-
-
70450206356
-
Facebook and online privacy: Attitudes, behaviors, and unintended consequences
-
Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108. doi:10.1111/j.1083-6101.2009.01494.x.
-
(2009)
Journal of Computer-Mediated Communication
, vol.15
, Issue.1
, pp. 83-108
-
-
Debatin, B.1
Lovejoy, J.P.2
Horn, A.-K.3
Hughes, B.N.4
-
43
-
-
0000338326
-
Programming semantics for multi-programmed computations
-
Dennis, J. B., & Van Horn, E. C. (1966). Programming semantics for multi-programmed computations. Communications of the ACM, 9(3), 143-155. doi:10.1145/365230.365252.
-
(1966)
Communications of the ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
45
-
-
8644231057
-
Public displays of connection
-
Donath, J., & Boyd, D. (2004). Public displays of connection. BT Technology Journal, 22, 71-82. doi:10.1023/B:BTTJ.0000047585.06264.cc.
-
(2004)
BT Technology Journal
, vol.22
, pp. 71-82
-
-
Donath, J.1
Boyd, D.2
-
46
-
-
84870159064
-
Trust and privacy concern within social networking sites: A comparison of Facebook and Myspace
-
Hoxmeier, J. A., & Hayne, S. (Eds.). Association for Information Systems.
-
Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and Myspace. In Hoxmeier, J. A., & Hayne, S. (Eds.), AMCIS (p. 339). Association for Information Systems.
-
(2007)
AMCIS
, pp. 339
-
-
Dwyer, C.1
Hiltz, S.R.2
Passerini, K.3
-
48
-
-
85032555332
-
Website
-
Facebook. (2011). Website. Retrieved March, 2012, from http://www.facebook.com.
-
(2011)
Retrieved March
, vol.2012
-
-
-
49
-
-
85032527680
-
-
Facebook Stat. Page. Website. Retrieved March, 2012
-
Facebook Stat. Page. (2011). Website. Retrieved March, 2012, from http://www.socialtechnologyreview. com/articles/50-facebook-stats-everymarketer-should-know.
-
(2011)
-
-
-
50
-
-
38049153158
-
The semantic web in action
-
Feigenbaum, L., Herman, I., Hongsermeier, T., Neumann, E., & Stephens, S. (2007, December). The semantic web in action. Scientific American, 297, 90-97. doi:10.1038/scientificamerican1207-90.
-
(2007)
Scientific American
, vol.297
, pp. 90-97
-
-
Feigenbaum, L.1
Herman, I.2
Hongsermeier, T.3
Neumann, E.4
Stephens, S.5
-
51
-
-
23444436856
-
Social networking on the semantic web
-
Finin, T., Ding, L., Zhou, L., & Joshi, A. (2005). Social networking on the semantic web. The Learning Organization, 12(5). doi:10.1108/09696470510611384.
-
(2005)
The Learning Organization
, vol.12
, Issue.5
-
-
Finin, T.1
Ding, L.2
Zhou, L.3
Joshi, A.4
-
53
-
-
79960192002
-
Relationshipbased access control policies and their policy languages
-
New York, NY, USA: ACM.
-
Fong, P. W. L., & Siahaan, I. (2011). Relationshipbased access control policies and their policy languages. In Proceedings of the 16th ACM symposium on access control models and technologies (pp. 51-60). New York, NY, USA: ACM.
-
(2011)
In Proceedings of the 16th ACM symposium on access control models and technologies
, pp. 51-60
-
-
Fong, P.W.L.1
Siahaan, I.2
-
54
-
-
84856186856
-
Access control requirements for Web 2.0 Security and Privacy
-
Gates, C. (2007). Access control requirements for Web 2.0 Security and Privacy. IEEE Web, 2, 2-4.
-
(2007)
IEEE Web
, vol.2
, pp. 2-4
-
-
Gates, C.1
-
56
-
-
60849133641
-
RELBAC: Relation based access control
-
Washington, DC, USA: IEEE Computer Society.
-
Giunchiglia, F., Zhang, R., & Crispo, B. (2008). RELBAC: Relation based access control. In Proceedings of the 2008 fourth international conference on semantics, knowledge and grid (pp. 3-11). Washington, DC, USA: IEEE Computer Society.
-
(2008)
In Proceedings of the 2008 fourth international conference on semantics, knowledge and grid
, pp. 3-11
-
-
Giunchiglia, F.1
Zhang, R.2
Crispo, B.3
-
57
-
-
33750077260
-
Combining provenance with trust in social networks for semantic web content filtering
-
Springer.
-
Golbeck, J. (2006). Combining provenance with trust in social networks for semantic web content filtering. In IPAW'06 (p. 101-108). Springer.
-
(2006)
In IPAW'06
, pp. 101-108
-
-
Golbeck, J.1
-
58
-
-
85009714348
-
Trust and nuanced profile similarity in online social networks
-
ACM.
-
Golbeck, J. (2009). Trust and nuanced profile similarity in online social networks. TWEB, 3(4). ACM.
-
(2009)
TWEB
, vol.3
, Issue.4
-
-
Golbeck, J.1
-
59
-
-
34247960076
-
The strength of weak ties
-
Granovetter, M. S. (1973, January). The strength of weak ties. JSTOR. American Journal of Sociology, 78(6), 1360-1380. doi:10.1086/225469.
-
(1973)
JSTOR. American Journal of Sociology
, vol.78
, Issue.6
, pp. 1360-1380
-
-
Granovetter, M.S.1
-
61
-
-
0001314984
-
Incentives in teams
-
Groves, T. (1973). Incentives in teams. Econometrica, 41, 617-631. doi:10.2307/1914085.
-
(1973)
Econometrica
, vol.41
, pp. 617-631
-
-
Groves, T.1
-
63
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
Hamlen, K. W., Morrisett, G., & Schneider, F. B. (2006). Computability classes for enforcement mechanisms. ACM Transactions on Programming Languages and Systems, 28(1), 175-205. doi:10.1145/1111596.1111601.
-
(2006)
ACM Transactions on Programming Languages and Systems
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
64
-
-
84985847320
-
On the measurement of perceived consumer risk
-
Havlena, W. J., & DeSarbo, W. S. (1991). On the measurement of perceived consumer risk. Decision Sciences, 22(4), 927-939. doi:10.1111/j.1540-5915.1991.tb00372.x.
-
(1991)
Decision Sciences
, vol.22
, Issue.4
, pp. 927-939
-
-
Havlena, W.J.1
DeSarbo, W.S.2
-
67
-
-
79956030125
-
EASiER: Encryption-based access control in social networks with efficient revocation
-
ACM.
-
Jahid, S., Mittal, P., & Borisov, N. (2011). EASiER: Encryption-based access control in social networks with efficient revocation. In Proceedings of the 6th ACM symposium on information, computer and communications security (pp. 411-415). ACM.
-
(2011)
In Proceedings of the 6th ACM symposium on information, computer and communications security
, pp. 411-415
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
68
-
-
84862334846
-
On the Chinese wall model. In Proceedings of the second European symposium on research in computer security
-
London, UK: Springer-Verlag.
-
Kessler, V. (1992). On the Chinese wall model. In Proceedings of the second European symposium on research in computer security (pp. 41-54). London, UK: Springer-Verlag.
-
(1992)
, pp. 41-54
-
-
Kessler, V.1
-
69
-
-
26844521066
-
FOAF-realm-control your friends' access to the resourc
-
Kruk, S. (2004). FOAF-realm-control your friends' access to the resource. FOAF Workshop proceedings 186. Retrieved March, 2012, from http://www.w3.org/2001/sw/Europe/events/foafgalway/papers/fp/foaf realm/.
-
(2004)
FOAF Workshop proceedings 186. Retrieved March
, vol.2012
-
-
Kruk, S.1
-
70
-
-
84898342466
-
D-FOAF: Distributed identity management with access rights delegation
-
Kruk, S., Grzonkowski, S., Gzella, A., Woroniecki, T., & Choi, H. (2006). D-FOAF: Distributed identity management with access rights delegation. The Semantic Web-ASWC 2006(4), 140-154.
-
(2006)
The Semantic Web-ASWC
, vol.2006
, Issue.4
, pp. 140-154
-
-
Kruk, S.1
Grzonkowski, S.2
Gzella, A.3
Woroniecki, T.4
Choi, H.5
-
72
-
-
78449236464
-
Attack-resistant trust metrics
-
Springer.
-
Levien, R. (2009). Attack-resistant trust metrics. In Computing with social trust (pp. 121-132). Springer. doi:10.1007/978-1-84800-356-9_5.
-
(2009)
In Computing with social trust
, pp. 121-132
-
-
Levien, R.1
-
73
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
April. ACM.
-
Leyla, B., Thorsten, S., Davide, B., & Engin, K. (2009, April). All your contacts are belong to us: Automated identity theft attacks on social networks. In 18th international world wide web conference. ACM.
-
(2009)
In 18th international world wide web conference
-
-
Leyla, B.1
Thorsten, S.2
Davide, B.3
Engin, K.4
-
74
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Li, N., Grosof, B. N., & Feigenbaum, J. (2003, February). Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security, 6(1), 128-171. doi:10.1145/605434.605438.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
75
-
-
0036085965
-
Design of a role-based trust-management framework
-
Washington, DC, USA: IEEE Computer Society.
-
Li, N., Mitchell, J. C., & Winsborough, W. H. (2002). Design of a role-based trust-management framework. In Proceedings of the 2002 IEEE symposium on security and privacy (pp. 114-130). Washington, DC, USA: IEEE Computer Society.
-
(2002)
In Proceedings of the 2002 IEEE symposium on security and privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
76
-
-
70350634219
-
On the tradeoff between privacy and utility in data publishing
-
Elder, J. F. IV, Fogelman-Soulie, F., Flach, P. A., & Zaki, M. (Eds.), ACM
-
Li, T., & Li, N. (2009). On the tradeoff between privacy and utility in data publishing. In Elder, J. F. IV, Fogelman-Soulie, F., Flach, P. A., & Zaki, M. (Eds.), KDD (pp. 517-526). ACM. doi:10.1145/1557019.1557079.
-
(2009)
KDD
, pp. 517-526
-
-
Li, T.1
Li, N.2
-
77
-
-
33646066871
-
Enforcing non-safety security policies with program monitors
-
Ligatti, J., Bauer, L., & Walker, D. (2005). Enforcing non-safety security policies with program monitors. Computer Security ESORICS, 3679, 355-373.
-
(2005)
Computer Security ESORICS
, vol.3679
, pp. 355-373
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
78
-
-
85091951704
-
Understanding privacy settings in Facebook with an audience view
-
Berkeley, CA, USA: USENIX Association.
-
Lipford, H. R., Besmer, A., & Watson, J. (2008). Understanding privacy settings in Facebook with an audience view. In Proceedings of the 1st conference on usability, psychology, and security (pp. 2:1-2:8). Berkeley, CA, USA: USENIX Association.
-
(2008)
In Proceedings of the 1st conference on usability, psychology, and security
, pp. 21-28
-
-
Lipford, H.R.1
Besmer, A.2
Watson, J.3
-
79
-
-
35948974761
-
Towards a gravity-based trust model for social networking systems
-
Washington, DC, USA: IEEE Computer Society.
-
Maheswaran, M., Tang, H. C., & Ghunaim, A. (2007). Towards a gravity-based trust model for social networking systems. In Proceedings of the 27th international conference on distributed computing systems workshops (pp. 24-24). Washington, DC, USA: IEEE Computer Society.
-
(2007)
In Proceedings of the 27th international conference on distributed computing systems workshops
, pp. 24-24
-
-
Maheswaran, M.1
Tang, H.C.2
Ghunaim, A.3
-
80
-
-
84856178503
-
-
Department of Computer Science, Columbia University.
-
Majeski, M., Johnson, M., & Bellovin, S. M. (2011). The failure of online social network privacy settings (Tech. Rep. No. CUCS-010-11). Department of Computer Science, Columbia University.
-
(2011)
The failure of online social network privacy settings
-
-
Majeski, M.1
Johnson, M.2
Bellovin, S.M.3
-
82
-
-
78649313265
-
OSNAC: An ontology-based access control model for social networking systems
-
Washington, DC, USA: IEEE Computer Society.
-
Masoumzadeh, A., & Joshi, J. (2010). OSNAC: An ontology-based access control model for social networking systems. In Proceedings of the 2010 IEEE second international conference on social computing (pp. 751-759). Washington, DC, USA: IEEE Computer Society.
-
(2010)
In Proceedings of the 2010 IEEE second international conference on social computing
, pp. 751-759
-
-
Masoumzadeh, A.1
Joshi, J.2
-
83
-
-
33646389513
-
Ontologies are us: A unified model of social networks and semantics
-
Gil, Y., Motta, E., Benjamins, V. R., & Musen, M. A. (Eds.), Springer
-
Mika, P. (2005). Ontologies are us: A unified model of social networks and semantics. In Gil, Y., Motta, E., Benjamins, V. R., & Musen, M. A. (Eds.), The Semantic Web - ISWC 2005 (pp. 522-536). Springer. doi:10.1007/11574620_38.
-
(2005)
The Semantic Web - ISWC 2005
, pp. 522-536
-
-
Mika, P.1
-
84
-
-
85032547576
-
Capability myths demolished (Tech
-
Miller, M. S., Yee, K.-P., & Shapiro, J. (2011). Capability myths demolished (Tech. Rep.). Systems Research Laboratory, Johns Hopkins University. Retrieved March, 2012, from http://srl.cs.jhu.edu/pubs/SRL2003-02.pdf.
-
(2011)
Rep.). Systems Research Laboratory, Johns Hopkins University. Retrieved March
, vol.2012
-
-
Miller, M.S.1
Yee, K.-P.2
Shapiro, J.3
-
85
-
-
84942776290
-
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing service
-
IEEE Computer Society
-
Mont, M. C., Pearson, S., & Bramhall, P. (2003). Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, (pp. 377-382). IEEE Computer Society.
-
(2003)
14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic
, pp. 377-382
-
-
Mont, M.C.1
Pearson, S.2
Bramhall, P.3
-
87
-
-
84944319284
-
Efficient trace and revoke scheme
-
London, UK: Springer-Verlag
-
Naor, M., & Pinkas, B. (2001). Efficient trace and revoke schemes. In Proceedings of the 4th international conference on Financial Cryptography, 9(6), 1-20. London, UK: Springer-Verlag.
-
(2001)
In Proceedings of the 4th international conference on Financial Cryptography
, vol.9
, Issue.6
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
88
-
-
84944592945
-
-
Website. Retrieved March, 2012
-
New Myspace and Facebook worms target social networks. (2008). Website. Retrieved March, 2012, from http://www.darknet.org.uk/2008/08/new-myspace-and-facebook-worm-target-socialnetworks/.
-
(2008)
-
-
-
89
-
-
77955210831
-
Privacy-aware role-based access control
-
Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.-M., Karat, J. et al. (2010, July). Privacy-aware role-based access control. ACM Transactions of Information System Security, 13(3), 24:1-24:31.
-
(2010)
ACM Transactions of Information System Security
, vol.13
, Issue.3
, pp. 241-2431
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
Brodie, C.4
Karat, C.-M.5
Karat, J.6
-
90
-
-
33847382472
-
The privacy paradox: Personal information disclosure intentions versus behaviors
-
Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. The Journal of Consumer Affairs, 41(1), 100-126. doi:10.1111/j.1745-6606.2006.00070.x.
-
(2007)
The Journal of Consumer Affairs
, vol.41
, Issue.1
, pp. 100-126
-
-
Norberg, P.A.1
Horne, D.R.2
Horne, D.A.3
-
91
-
-
84944610661
-
-
Website. Retrieved March, 2012
-
Oasis committee. XACML 2.0 specification. (2012). Website. Retrieved March, 2012, from http://www.oasisopen.org/committees/tchome. php?wgabbrev= xacmlXACML20.
-
(2012)
-
-
-
92
-
-
0002690288
-
A comparative analysis of three consumer decision strategies
-
Peter, J. P., Tarpey, S., & Lawrence, X. (1975, June). A comparative analysis of three consumer decision strategies. The Journal of Consumer Research, 2(1), 29-37. doi:10.1086/208613.
-
(1975)
The Journal of Consumer Research
, vol.2
, Issue.1
, pp. 29-37
-
-
Peter, J.P.1
Tarpey, S.2
Lawrence, X.3
-
93
-
-
78650881707
-
A digital rights management approach to privacy in online social network
-
IDT Series
-
Rodriguez, E., Rodriguez, V., Carreras, A., & Delgado, J. (2009). A digital rights management approach to privacy in online social networks. In Workshop on privacy and protection in web-based social networks (within ICAIL'09), Barcelona, Spain, 2009. IDT Series, vol. 3, ISSN 2013-5017.
-
(2009)
In Workshop on privacy and protection in web-based social networks (within ICAIL'09), Barcelona, Spain, 2009
, vol.3
-
-
Rodriguez, E.1
Rodriguez, V.2
Carreras, A.3
Delgado, J.4
-
94
-
-
34250001672
-
What anyone can know: The privacy risks of social networking sites
-
Rosenblum, D. (2007, May-June). What anyone can know: The privacy risks of social networking sites. Security Privacy, IEEE, 5(3), 40-49. doi:10.1109/MSP.2007.75.
-
(2007)
Security Privacy, IEEE
, vol.5
, Issue.3
, pp. 40-49
-
-
Rosenblum, D.1
-
95
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
R. Focardi & R. Gorrieri (Eds.). Springer
-
Samarati, P., & Vimercati, S. D. C. D. (2000). Access control: Policies, models, and mechanisms. In R. Focardi & R. Gorrieri (Eds.), FOSAD (LNCS Vol. 2171, p. 137-196). Springer.
-
(2000)
FOSAD. LNCS
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
Vimercati, S.D.C.D.2
-
96
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
London, UK: Springer-Verlag.
-
Samarati, P., & Vimercati, S. D. C. D. (2001). Access control: Policies, models, and mechanisms. In Revised versions of lectures given during the IFIP WG 1.7 international school on foundations of security analysis and design on foundations of security analysis and design: Tutorial lectures, 2171 (pp. 137-196). London, UK: Springer-Verlag.
-
(2001)
In Revised versions of lectures given during the IFIP WG 1.7 international school on foundations of security analysis and design on foundations of security analysis and design: Tutorial lectures
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
Vimercati, S.D.C.D.2
-
97
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
Sandhu, R., Bhamidipati, V., & Munawer, Q. (1999). The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security, 2(1), 105-135. doi:10.1145/300830.300839.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
99
-
-
0018545449
-
How to share a secret
-
Shamir, A. (1979, November). How to share a secret. Communications of the ACM, 22(11), 612-613. doi:10.1145/359168.359176.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
100
-
-
38949168454
-
An attribute-based access control model for web services
-
Washington, DC, USA: IEEE Computer Society.
-
Shen, H.-B., & Hong, F. (2006). An attribute-based access control model for web services. In Proceedings of the seventh international conference on parallel and distributed computing, applications and technologies (pp. 74-79). Washington, DC, USA: IEEE Computer Society.
-
(2006)
In Proceedings of the seventh international conference on parallel and distributed computing, applications and technologies
, pp. 74-79
-
-
Shen, H.-B.1
Hong, F.2
-
101
-
-
84944556270
-
Models of bounded rationality. Trustme: Anonymous management of trust relationships in decentralized P2P systems
-
N. Shahmehri, R. L. Graham, & G. Caronni (Eds.). IEEE Computer Society.
-
Simon, H. A. (1982). Models of bounded rationality. Trustme: Anonymous management of trust relationships in decentralized P2P systems. In N. Shahmehri, R. L. Graham, & G. Caronni (Eds.), Peer-to-peer computing (p. 142-149). IEEE Computer Society.
-
(1982)
Peer-to-peer computing
, pp. 142-149
-
-
Simon, H.A.1
-
102
-
-
0038588436
-
E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior
-
Spiekermann, S., Grossklags, J., & Berendt, B. (2001). E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior. World Wide Web Internet And Web Information Systems, 38-47.
-
(2001)
World Wide Web Internet And Web Information Systems
, pp. 38-47
-
-
Spiekermann, S.1
Grossklags, J.2
Berendt, B.3
-
103
-
-
84944529309
-
K-anonymous attribute-based access control
-
Squicciarini, A., Trombetta, A., Bhargav-Spantzel, A., & Bertino, E. (2007). K-anonymous attribute-based access control. E. International Conference on Information and Computer Security (ICICS'07).
-
(2007)
E. International Conference on Information and Computer Security (ICICS'07).
-
-
Squicciarini, A.1
Trombetta, A.2
Bhargav-Spantzel, A.3
Bertino, E.4
-
104
-
-
78650520974
-
Privacy policies for shared content in social network sites
-
Squicciarini, A. C., Shehab, M., & Wede, J. (2010, June). Privacy policies for shared content in social network sites. The VLDB Journal, 19(6), 777-796. doi:10.1007/s00778-010-0193-7.
-
(2010)
The VLDB Journal
, vol.19
, Issue.6
, pp. 777-796
-
-
Squicciarini, A.C.1
Shehab, M.2
Wede, J.3
-
105
-
-
76449113515
-
Web-traveler policies for images on social networks
-
Squicciarini, A. C., & Sundareswaran, S. (2009, December). Web-traveler policies for images on social networks. World Wide Web (Bussum), 12, 461-484. doi:10.1007/s11280-009-0070-8.
-
(2009)
World Wide Web (Bussum)
, vol.12
, pp. 461-484
-
-
Squicciarini, A.C.1
Sundareswaran, S.2
-
107
-
-
77951285579
-
Role based access control for social network sites
-
December
-
Tang, Y., Mao, C., Lai, H., & Zhu, J. (2009, December). Role based access control for social network sites. 2009 Joint Conferences on Pervasive Computing (JCPC), 389-394.
-
(2009)
2009 Joint Conferences on Pervasive Computing (JCPC)
, pp. 389-394
-
-
Tang, Y.1
Mao, C.2
Lai, H.3
Zhu, J.4
-
108
-
-
84856676999
-
Tie-RBAC: An application of RBAC to social networks
-
Oakland, California.
-
Tapiador, A., Carrera, D., & Joaquin, S. (2011). Tie-RBAC: An application of RBAC to social networks. Web 2.0 security and privacy. Oakland, California.
-
(2011)
Web 2.0 security and privacy
-
-
Tapiador, A.1
Carrera, D.2
Joaquin, S.3
-
109
-
-
84944547312
-
-
The Google+ project. Website. Retrieved March, 2012
-
The Google+ project. (2011). Website. Retrieved March, 2012, from https://plus.google.com.
-
(2011)
-
-
-
110
-
-
84944610906
-
The state of social media 2011: Social is the new normal
-
Website. Retrieved March, 2012
-
The state of social media 2011: Social is the new normal. (2012). Website. Retrieved March, 2012, from http://www.briansolis.com/2011/10/http://www.briansolis.com/2011/10/state-of-socialmedia-2011/.
-
(2012)
-
-
-
111
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
ACM.
-
Thomas, R. K. (1997). Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In Second ACM workshop on role-based access control (pp. 13-19). ACM.
-
(1997)
In Second ACM workshop on role-based access control
, pp. 13-19
-
-
Thomas, R.K.1
-
112
-
-
84988789822
-
Conceptual foundations for a model of task-based authorizations
-
IEEE Computer Society Press.
-
Thomas, R. K., & Sandhu, R. S. (1994). Conceptual foundations for a model of task-based authorizations. In 7th IEEE computer security foundations workshop (pp. 66-79). IEEE Computer Society Press.
-
(1994)
In 7th IEEE computer security foundations workshop
, pp. 66-79
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
113
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
London, UK: Chapman & Hall, Ltd.
-
Thomas, R. K., & Sandhu, R. S. (1998). Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In Proceedings of the IFIP TC11 WG11.3 eleventh international conference on database security xi: Status and prospects (pp. 166-181). London, UK: Chapman & Hall, Ltd.
-
(1998)
In Proceedings of the IFIP TC11 WG11.3 eleventh international conference on database security xi: Status and prospects
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
114
-
-
24344501341
-
Access control in collaborative systems
-
Tolone, W., Ahn, G.-J., Pai, T., & Hong, S.-P. (2005). Access control in collaborative systems. ACM Computing Surveys, 37(1), 29-41. doi:10.1145/1057977.1057979.
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.-J.2
Pai, T.3
Hong, S.-P.4
-
115
-
-
84925944858
-
-
Slovenia: Bled.
-
Tuunainen, V. K., Pitkanen, O., & Hovi, M. (2009). Users' awareness of privacy on online social networking sites - case Facebook. 22nd Bled eConference eEnablement: Facilitating an Open, Effective and Representative eSociety. Slovenia: Bled.
-
(2009)
Users' awareness of privacy on online social networking sites - case Facebook. 22nd Bled eConference eEnablement: Facilitating an Open, Effective and Representative eSociety
-
-
Tuunainen, V.K.1
Pitkanen, O.2
Hovi, M.3
-
117
-
-
33746100395
-
Uniform application-level access control enforcement of organization wide policies
-
Washington, DC, USA: IEEE Computer Society.
-
Verhanneman, T., Piessens, F., De Win, B., & Joosen, W. (2005). Uniform application-level access control enforcement of organization wide policies. In Proceedings of the 21st annual computer security applications conference (pp. 431-440). Washington, DC, USA: IEEE Computer Society.
-
(2005)
In Proceedings of the 21st annual computer security applications conference
, pp. 431-440
-
-
Verhanneman, T.1
Piessens, F.2
De Win, B.3
Joosen, W.4
-
118
-
-
67650080223
-
An access control scheme for protecting personal data
-
Washington, DC, USA: IEEE Computer Society.
-
Villegas, W., Ali, B., & Maheswaran, M. (2008). An access control scheme for protecting personal data. In Proceedings of the 2008 sixth annual conference on privacy, security and trust (pp. 24-35). Washington, DC, USA: IEEE Computer Society.
-
(2008)
In Proceedings of the 2008 sixth annual conference on privacy, security and trust
, pp. 24-35
-
-
Villegas, W.1
Ali, B.2
Maheswaran, M.3
-
119
-
-
85032546197
-
Status for resource description framework (RDF) model and syntax specification
-
W3C. (2009a). Status for resource description framework (RDF) model and syntax specification. Retrieved March, 2012, from http://www. w3.org/1999/status/PR-rdf-syntax-19990105/status.
-
(2009)
Retrieved March
, vol.2012
-
-
-
120
-
-
49049083997
-
-
Retrieved March, 2012
-
W3C. (2009b). W3C semantic web activity. Retrieved March, 2012, from http://www. w3.org/2001/sw/.
-
(2009)
W3C semantic web activity
-
-
-
121
-
-
77954467397
-
A secure and private Clarke tax voting protocol without trusted authorities
-
New York, NY, USA: ACM.
-
Wang, C., & Leung, H.-F. (2004). A secure and private Clarke tax voting protocol without trusted authorities. In Proceedings of the 6th international conference on electronic commerce (pp. 556-565). New York, NY, USA: ACM.
-
(2004)
In Proceedings of the 6th international conference on electronic commerce
, pp. 556-565
-
-
Wang, C.1
Leung, H.-F.2
-
122
-
-
78650361076
-
Trust-involved access control in collaborative open social networks
-
Washington, DC, USA: IEEE Computer Society.
-
Wang, H., & Sun, L. (2010). Trust-involved access control in collaborative open social networks. In Proceedings of the 2010 fourth international conference on network and system security (pp. 239-246). Washington, DC, USA: IEEE Computer Society.
-
(2010)
In Proceedings of the 2010 fourth international conference on network and system security
, pp. 239-246
-
-
Wang, H.1
Sun, L.2
-
124
-
-
84899266027
-
Creating a policy-aware web: Discretionary, rule-based access for the world wide web
-
Ferrari, E., & Thuraisingham, B. (Eds.), Idea Group Inc
-
Weitzner, D. J., Hendler, J., Berners-Lee, T., & Connolly, D. (2006). Creating a policy-aware web: Discretionary, rule-based access for the world wide web. In Ferrari, E., & Thuraisingham, B. (Eds.), Web and information security (pp. 1-31). Idea Group Inc. doi:10.4018/978-1-59140-588-7. ch001.
-
(2006)
Web and information security
, pp. 1-31
-
-
Weitzner, D.J.1
Hendler, J.2
Berners-Lee, T.3
Connolly, D.4
-
125
-
-
0032178082
-
Secure group communications using key graphs
-
Wong, C. K., Gouda, M. G., & Lam, S. S. (1998). Secure group communications using key graphs. ACM SIGCOMM Computer Communication Review, 28(4), 68-79. doi:10.1145/285243.285260.
-
(1998)
ACM SIGCOMM Computer Communication Review
, vol.28
, Issue.4
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
126
-
-
3142738238
-
Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
Xiong, L., & Liu, L. (2004, July 8-10). Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), 843-857. doi:10.1109/TKDE.2004.1318566.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
127
-
-
79960159841
-
A reachability-based access control model for online social networks
-
New York, NY, USA: ACM.
-
Abdessalem, T., & Dhia, I. B. (2011). A reachability-based access control model for online social networks. In Databases and social networks (pp. 31-36). New York, NY, USA: ACM. doi:10.1145/1996413.1996419.
-
(2011)
In Databases and social networks
, pp. 31-36
-
-
Abdessalem, T.1
Dhia, I.B.2
-
128
-
-
79952799348
-
Enforcing access control in social network sites
-
Beato, F., Kohlweiss, M., & Wouters, K. (2009). Enforcing access control in social network sites. Hot Topics in Privacy Enhancing Technologies (HotPETS), 1-11.
-
(2009)
Hot Topics in Privacy Enhancing Technologies (HotPETS)
, pp. 1-11
-
-
Beato, F.1
Kohlweiss, M.2
Wouters, K.3
-
129
-
-
70350520397
-
Access control and privacy in web-based social networks
-
Emerald Group Publishing Limited
-
Carminati, B., & Ferrari, E. (2008). Access control and privacy in web-based social networks. Access Control and Privacy in Web-based Social Networks, 4(4), 395-415. Emerald Group Publishing Limited.
-
(2008)
Access Control and Privacy in Web-based Social Networks
, vol.4
, Issue.4
, pp. 395-415
-
-
Carminati, B.1
Ferrari, E.2
-
131
-
-
33745255702
-
License script: A logical language for digital rights management
-
Chong, C., Corin, R., Doumen, J., & Etalle, S. (2006). License script: A logical language for digital rights management. Annales des Télécommunications, 61(3), 284-331. doi:10.1007/BF03219910.
-
(2006)
Annales des Télécommunications
, vol.61
, Issue.3
, pp. 284-331
-
-
Chong, C.1
Corin, R.2
Doumen, J.3
Etalle, S.4
-
133
-
-
70450206356
-
Facebook and online privacy: Attitudes, behaviors, and unintended consequences
-
Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108. doi:10.1111/j.1083-6101.2009.01494.x.
-
(2009)
Journal of Computer-Mediated Communication
, vol.15
, Issue.1
, pp. 83-108
-
-
Debatin, B.1
Lovejoy, J.P.2
Horn, A.-K.3
Hughes, B.N.4
-
134
-
-
0033489650
-
SASI enforcement of security policies: A retrospective
-
New York, NY, USA: ACM.
-
Erlingsson, U., & Schneider, F. B. (2000). SASI enforcement of security policies: A retrospective. In Proceedings of the 1999 workshop on new security paradigms (pp. 87-95). New York, NY, USA: ACM.
-
(2000)
In Proceedings of the 1999 workshop on new security paradigms
, pp. 87-95
-
-
Erlingsson, U.1
Schneider, F.B.2
-
135
-
-
85025662258
-
-
Social Networks
-
Fernandez, E. B., Marin, C., & Petrie, M. M. L. (2010). Handbook of social network technologies and applications. Social Networks, 569-582.
-
(2010)
Handbook of social network technologies and applications
, pp. 569-582
-
-
Fernandez, E.B.1
Marin, C.2
Petrie, M.M.L.3
-
137
-
-
17444406680
-
A generalized temporal role-based access control model
-
Joshi, J. B. D., Bertino, E., Latif, U., & Ghafoor, A. (2005). A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering, 17, 4-23. doi:10.1109/TKDE.2005.1.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
138
-
-
0001862139
-
Friendship as a social process: A substantive and methodological analysis
-
Berger, M., Abel, T., & Page, C. (Eds.), New York: Van Nostrand
-
Lazarsfeld, P. F., & Merton, R. K. (1954). Friendship as a social process: A substantive and methodological analysis. In Berger, M., Abel, T., & Page, C. (Eds.), Freedom and control in modern society (pp. 18-66). New York: Van Nostrand.
-
(1954)
Freedom and control in modern society
, pp. 18-66
-
-
Lazarsfeld, P.F.1
Merton, R.K.2
-
139
-
-
33646066871
-
Enforcing non-safety security policies with program monitor
-
Ligatti, J., Bauer, L., & Walker, D. (2005). Enforcing non-safety security policies with program monitors. Computer Security ESORICS 2005. LNCS, 3679, 355-373.
-
(2005)
Computer Security ESORICS 2005. LNCS
, vol.3679
, pp. 355-373
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
141
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
New York, NY, USA: ACM.
-
Palen, L., & Dourish, P. (2003). Unpacking "privacy" for a networked world. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 129-136). New York, NY, USA: ACM.
-
(2003)
In Proceedings of the SIGCHI conference on human factors in computing systems
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
142
-
-
80052620039
-
Useractivity centric framework for access control in online social networks
-
Park, J., Sandhu, R., & Cheng, Y. (2011). Useractivity centric framework for access control in online social networks. IEEE Internet Computing, 1-9.
-
(2011)
IEEE Internet Computing
, pp. 1-9
-
-
Park, J.1
Sandhu, R.2
Cheng, Y.3
-
143
-
-
77954519375
-
PriMa: An effective privacy protection mechanism for social networks
-
ACM.
-
Squicciarini, A., Paci, F., & Sundareswaran, S. (2010). PriMa: An effective privacy protection mechanism for social networks. In Proceedings of the 5th ACM symposium on information, computer and communications security (pp. 320-323). ACM.
-
(2010)
In Proceedings of the 5th ACM symposium on information, computer and communications security
, pp. 320-323
-
-
Squicciarini, A.1
Paci, F.2
Sundareswaran, S.3
|