메뉴 건너뛰기




Volumn , Issue , 2014, Pages 89-103

Toward strong, usable access control for shared distributed data

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CIRCUITS; DIGITAL STORAGE; FILE ORGANIZATION; SEMANTICS; SPECIFICATIONS;

EID: 84943228243     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (62)
  • 3
    • 0034459145 scopus 로고    scopus 로고
    • The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
    • M. S. Ackerman. The intellectual challenge of CSCW: The gap between social requirements and technical feasibility. Human-Computer Interaction, 15(2):179–203, 2000.
    • (2000) Human-Computer Interaction , vol.15 , Issue.2 , pp. 179-203
    • Ackerman, M.S.1
  • 4
    • 85080745890 scopus 로고    scopus 로고
    • Over-exposed? Privacy patterns and considerations in online and mobile photo sharing
    • S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair. Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In Proc. ACM CHI, 2007.
    • (2007) Proc. ACM CHI
    • Ahern, S.1    Eckles, D.2    Good, N.S.3    King, S.4    Naaman, M.5    Nair, R.6
  • 6
    • 85080801459 scopus 로고    scopus 로고
    • Apple. Apple iCloud. https://www.icloud.com/, 2013.
    • (2013) Apple iCloud
  • 8
    • 84883056526 scopus 로고    scopus 로고
    • Retrospective privacy: Managing longitudinal privacy in online social networks
    • O. Ayalon and E. Toch. Retrospective privacy: Managing longitudinal privacy in online social networks. In Proc. SOUPS, 2013.
    • (2013) Proc. SOUPS
    • Ayalon, O.1    Toch, E.2
  • 10
    • 57349096728 scopus 로고    scopus 로고
    • Efficient proving for practical distributed access-control systems
    • L. Bauer, S. Garriss, and M. K. Reiter. Efficient proving for practical distributed access-control systems. In ESORICS, 2007.
    • (2007) ESORICS
    • Bauer, L.1    Garriss, S.2    Reiter, M.K.3
  • 12
    • 79957932922 scopus 로고    scopus 로고
    • Moving beyond untagging: Photo privacy in a tagged world
    • A. Besmer and H. Richter Lipford. Moving beyond untagging: Photo privacy in a tagged world. In Proc. ACM CHI, 2010.
    • (2010) Proc. ACM CHI
    • Besmer, A.1    Lipford, H.R.2
  • 13
    • 42549104363 scopus 로고    scopus 로고
    • Yours, mine and ours? Sharing and use of technology in domestic environments
    • A. J. Brush and K. Inkpen. Yours, mine and ours? Sharing and use of technology in domestic environments. In Proc. UbiComp. 2007.
    • (2007) Proc. UbiComp.
    • Brush, A.J.1    Inkpen, K.2
  • 14
    • 85040515478 scopus 로고    scopus 로고
    • Facebook & your privacy: Who sees the data you share on the biggest social network?
    • June
    • Facebook & your privacy: Who sees the data you share on the biggest social network? Consumer Reports Magazine, June 2012.
    • (2012) Consumer Reports Magazine
  • 15
    • 85047120276 scopus 로고    scopus 로고
    • Google apologizes for Buzz privacy issues
    • Feb. 15
    • D. Coursey. Google apologizes for Buzz privacy issues. PCWorld. Feb. 15, 2010.
    • (2010) PCWorld
    • Coursey, D.1
  • 19
    • 0345578185 scopus 로고
    • A semi-functional implementation of a higher-order logic programming language
    • Lee, editor, MIT Press
    • C. Elliott and F. Pfenning. A semi-functional implementation of a higher-order logic programming language. In P. Lee, editor, Topics in Advanced Language Implementation. MIT Press, 1991.
    • (1991) Topics in Advanced Language Implementation
    • Elliott, C.1    Pfenning, F.2
  • 24
    • 85080636796 scopus 로고    scopus 로고
    • Teacher accidentally puts racy photo on students’ iPad
    • Forbes, October
    • K. Hill. Teacher accidentally puts racy photo on students’ iPad. School bizarrely suspends students. Forbes, October 2012.
    • (2012) School Bizarrely Suspends Students
    • Hill, K.1
  • 27
    • 77954011711 scopus 로고    scopus 로고
    • Can I borrow your phone? Understanding concerns when sharing mobile phones
    • A. K. Karlson, A. J. B. Brush, and S. Schechter. Can I borrow your phone? Understanding concerns when sharing mobile phones. In Proc. ACM CHI, 2009.
    • (2009) Proc. ACM CHI
    • Karlson, A.K.1    Brush, A.J.B.2    Schechter, S.3
  • 29
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst., 10(4):265–310, 1992.
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 32
    • 70449397328 scopus 로고    scopus 로고
    • Ubiquitous systems and the family: Thoughts about the networked home
    • L. Little, E. Sillence, and P. Briggs. Ubiquitous systems and the family: Thoughts about the networked home. In Proc. SOUPS, 2009.
    • (2009) Proc. SOUPS
    • Little, L.1    Sillence, E.2    Briggs, P.3
  • 33
    • 84877949595 scopus 로고    scopus 로고
    • Privacy settings in social networking systems: What you cannot control
    • A. Masoumzadeh and J. Joshi. Privacy settings in social networking systems: What you cannot control. In Proc. ACM ASIACCS, 2013.
    • (2013) Proc. ACM ASIACCS
    • Masoumzadeh, A.1    Joshi, J.2
  • 37
    • 85080647621 scopus 로고    scopus 로고
    • Microsoft. Windows SkyDrive. http://windows.microsoft.com/en-us/skydrive/, 2013.
    • (2013) Windows SkyDrive
  • 40
    • 51249087659 scopus 로고    scopus 로고
    • A study of preferences for sharing and privacy
    • J. S. Olson, J. Grudin, and E. Horvitz. A study of preferences for sharing and privacy. In Proc. CHI EA, 2005.
    • (2005) Proc. CHI EA
    • Olson, J.S.1    Grudin, J.2    Horvitz, E.3
  • 41
    • 84874802830 scopus 로고    scopus 로고
    • Ensemblue: Integrating distributed storage and consumer electronics
    • D. Peek and J. Flinn. EnsemBlue: Integrating distributed storage and consumer electronics. In Proc. OSDI, 2006.
    • (2006) Proc. OSDI
    • Peek, D.1    Flinn, J.2
  • 42
    • 82155188100 scopus 로고    scopus 로고
    • PodBase: Transparent storage management for personal devices
    • A. Post, P. Kuznetsov, and P. Druschel. PodBase: Transparent storage management for personal devices. In Proc. IPTPS, 2008.
    • (2008) Proc. IPTPS
    • Post, A.1    Kuznetsov, P.2    Druschel, P.3
  • 44
    • 34547169479 scopus 로고    scopus 로고
    • A grounded theory of information sharing behavior in a personal learning space
    • M. N. Razavi and L. Iverson. A grounded theory of information sharing behavior in a personal learning space. In Proc. ACM CSCW, 2006.
    • (2006) Proc. ACM CSCW
    • Razavi, M.N.1    Iverson, L.2
  • 54
    • 84868245647 scopus 로고    scopus 로고
    • Out of sight, out of mind: Effects of displaying access-control information near the item it controls
    • K. Vaniea, L. Bauer, L. F. Cranor, and M. K. Reiter. Out of sight, out of mind: Effects of displaying access-control information near the item it controls. In Proc. IEEE PST, 2012.
    • (2012) Proc. IEEE PST
    • Vaniea, K.1    Bauer, L.2    Cranor, L.F.3    Reiter, M.K.4
  • 56
    • 85080781562 scopus 로고    scopus 로고
    • McAfee’s rookie mistake gives away his location
    • December
    • B. Weitzenkorn. McAfee’s rookie mistake gives away his location. Scientific American, December 2012.
    • (2012) Scientific American
    • Weitzenkorn, B.1
  • 57
    • 73849097622 scopus 로고    scopus 로고
    • Easy on that trigger dad: A study of long term family photo retrieval
    • S. Whittaker, O. Bergman, and P. Clough. Easy on that trigger dad: a study of long term family photo retrieval. Personal and Ubiquitous Computing, 14(1):31–43, 2010.
    • (2010) Personal and Ubiquitous Computing , vol.14 , Issue.1 , pp. 31-43
    • Whittaker, S.1    Bergman, O.2    Clough, P.3
  • 58
    • 85080721051 scopus 로고    scopus 로고
    • Fighting for my space: Coping mechanisms for SNS boundary regulation
    • P. J. Wisniewski, H. Richter Lipford, and D. C. Wilson. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proc. ACM CHI, 2012.
    • (2012) Proc. ACM CHI
    • Wisniewski, P.J.1    Lipford, H.R.2    Wilson, D.C.3
  • 60
    • 77954593401 scopus 로고    scopus 로고
    • Policy-based access control for weakly consistent replication
    • T. Wobber, T. L. Rodeheffer, and D. B. Terry. Policy-based access control for weakly consistent replication. In Proc. Eurosys, 2010.
    • (2010) Proc. Eurosys
    • Wobber, T.1    Rodeheffer, T.L.2    Terry, D.B.3
  • 61
    • 85080635840 scopus 로고    scopus 로고
    • Income, race, and class: Exploring socioeconomic differences in family technology use
    • S. Yardi and A. Bruckman. Income, race, and class: Exploring socioeconomic differences in family technology use. In Proc. ACM CHI, 2012.
    • (2012) Proc. ACM CHI
    • Yardi, S.1    Bruckman, A.2
  • 62
    • 41849090098 scopus 로고    scopus 로고
    • Accessible design and testing in the application development process: Considerations for an integrated approach
    • G. Zimmermann and G. Vanderheiden. Accessible design and testing in the application development process: Considerations for an integrated approach. Universal Access in the Information Society, 7(1-2):117–128, 2008.
    • (2008) Universal Access in the Information Society , vol.7 , Issue.1-2 , pp. 117-128
    • Zimmermann, G.1    Vanderheiden, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.