메뉴 건너뛰기




Volumn 2, Issue 4, 2008, Pages 22-53

A Decentralized Security Framework for Web-Based Social Networks

Author keywords

Access control; Data security; Digital Segnature; Encryption; Internet Privacy; Internet Trust; Social Networks

Indexed keywords


EID: 85001842932     PISSN: 19301650     EISSN: 19301669     Source Type: Journal    
DOI: 10.4018/jisp.2008100102     Document Type: Article
Times cited : (14)

References (25)
  • 1
    • 22244463953 scopus 로고    scopus 로고
    • Credential-based access control for Semantic Web services
    • Retrieved from, http://www.aifb.unikarl-sruhe.de/WBS/sag/papers/Agarwal_Sprick_Wort-mannCredentialBasedAccessControlForSemantic-WebServices-AAAI_SS_SWS-04.pdf
    • Agarwal, S., Sprick, B., & Wortmann, S. (2004). Credential-based access control for Semantic Web services. In AAAI spring symposium - Semantic Web services. Retrieved from, http://www.aifb.unikarl-sruhe.de/WBS/sag/papers/Agarwal_Sprick_Wort-mannCredentialBasedAccessControlForSemantic-WebServices-AAAI_SS_SWS-04.pdf
    • (2004) In AAAI spring symposium - Semantic Web services
    • Agarwal, S.1    Sprick, B.2    Wortmann, S.3
  • 3
    • 33749386628 scopus 로고    scopus 로고
    • A privacy paradox: Social networking in the United States
    • September Retrieved from, http://www.firstmonday. org/issues/issue11_9/barnes
    • Barnes, S. B. (2006, September). A privacy paradox: Social networking in the United States. First Monday, 11(9). Retrieved from, http://www.firstmonday. org/issues/issue11_9/barnes
    • (2006) First Monday , vol.11 , Issue.9
    • Barnes, S.B.1
  • 4
    • 19944380112 scopus 로고    scopus 로고
    • Database security— Concepts, approaches, and challenges
    • Bertino, E., & Sandhu, R. (2005). Database security— Concepts, approaches, and challenges. IEEE Trans. Dependable Secur. Comput., 2(1), pp. 2-19.
    • (2005) IEEE Trans. Dependable Secur. Comput , vol.2 , Issue.1 , pp. 2-19
    • Bertino, E.1    Sandhu, R.2
  • 6
    • 33845467743 scopus 로고    scopus 로고
    • Rule-based access control for social networks
    • In R. Meersman, Z. Tari, P. Herrero, et al. (Eds.) Springer-Verlag
    • Carminati, B., Ferrari, E., & Perego, A. (2006). Rule-based access control for social networks. In R. Meersman, Z. Tari, P. Herrero, et al. (Eds.), OTM 2006 workshops proceedings (pp. 1734-1744). Springer-Verlag.
    • (2006) OTM 2006 workshops proceedings , pp. 1734-1744
    • Carminati, B.1    Ferrari, E.2    Perego, A.3
  • 8
    • 70450244195 scopus 로고    scopus 로고
    • Security and privacy in social networks
    • In M. Khosrow-Pour (Ed.) 2nd edition. Hershey, PA: IGI Publishing. (To appear)
    • Carminati, B., Ferrari, E., & Perego, A. (2008). Security and privacy in social networks. In M. Khosrow-Pour (Ed.), The encyclopedia of information science and technology, 2nd edition. Hershey, PA: IGI Publishing. (To appear)
    • (2008) The encyclopedia of information science and technology
    • Carminati, B.1    Ferrari, E.2    Perego, A.3
  • 9
    • 85001728526 scopus 로고    scopus 로고
    • The Platform for Privacy Preferences 1.1 (P3P1.1) specifcation (W3C Working Group Note)
    • November Retrieved from, http://www. w3.org/TR/P3P11/
    • Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M., et al. (2006, November). The Platform for Privacy Preferences 1.1 (P3P1.1) specifcation (W3C Working Group Note). World Wide Web Consortium. Retrieved from, http://www. w3.org/TR/P3P11/
    • (2006) World Wide Web Consortium
    • Cranor, L.1    Dobbs, B.2    Egelman, S.3    Hogben, G.4    Humphrey, J.5    Langheinrich, M.6
  • 10
    • 33750962780 scopus 로고    scopus 로고
    • A P3P Preference Exchange Language 1.0 (APPEL1.0) (W3C Working Draft)
    • April Retrieved from, http://www. w3.org/TR/P3P-preferences/
    • Cranor, L., Langheinrich, M., & Marchiori, M. (2002, April). A P3P Preference Exchange Language 1.0 (APPEL1.0) (W3C Working Draft). World Wide Web Consortium. Retrieved from, http://www. w3.org/TR/P3P-preferences/
    • (2002) World Wide Web Consortium
    • Cranor, L.1    Langheinrich, M.2    Marchiori, M.3
  • 15
    • 84873621535 scopus 로고    scopus 로고
    • Access control requirements for Web 2.0 security and privacy
    • Retrieved from, http://seclab.cs.rice.edu/w2sp/2007/ papers/paper-205-z_708.pdf
    • Gates, C. E. (2007). Access control requirements for Web 2.0 security and privacy. In Proceedings of the Web 2.0 security & privacy 2007 workshop. Retrieved from, http://seclab.cs.rice.edu/w2sp/2007/ papers/paper-205-z_708.pdf
    • (2007) In Proceedings of the Web 2.0 security & privacy 2007 workshop
    • Gates, C.E.1
  • 17
    • 50249095382 scopus 로고    scopus 로고
    • More content—less control: Access control in the Web 2.0
    • Retrieved from, http://seclab.cs.rice. edu/w2sp/2007/papers/paper-193-z_6706.pdf
    • Hart, M., Johnson, R., & Stent, A. (2007). More content—less control: Access control in the Web 2.0. In Proceedings of the Web 2.0 security & privacy 2007 workshop. Retrieved from, http://seclab.cs.rice. edu/w2sp/2007/papers/paper-193-z_6706.pdf
    • (2007) In Proceedings of the Web 2.0 security & privacy 2007 workshop
    • Hart, M.1    Johnson, R.2    Stent, A.3
  • 18
    • 41849128290 scopus 로고    scopus 로고
    • University of Massachusetts Amherst, Computer Science Department March Retrieved from, http://www.cs.umass.edu/~mhay/papers/hayet-al-tr_0719.pdf
    • Hay, M., Miklau, G., Jensen, D., Weis, P., & Srivastava, S. (2007, March). Anonymizing social networks (Tech. Rep. No. 07–19). University of Massachusetts Amherst, Computer Science Department. Retrieved from, http://www.cs.umass.edu/~mhay/papers/hayet-al-tr_0719.pdf
    • (2007) Anonymizing social networks (Tech. Rep. No. 07–19)
    • Hay, M.1    Miklau, G.2    Jensen, D.3    Weis, P.4    Srivastava, S.5
  • 24
    • 84899266027 scopus 로고    scopus 로고
    • Creating a policy-aware Web: Discretionary, rule-based access for the World Wide Web
    • In E. Ferrari & B. M. Thuraisingham (Eds.) Hershey, PA: IDEA Group Publishing
    • Weitzner, D. J., Hendler, J., Berners-Lee, T., & Connolly, D. (2006). Creating a policy-aware Web: Discretionary, rule-based access for the World Wide Web. In E. Ferrari & B. M. Thuraisingham (Eds.), Web and information security (pp. 1-31). Hershey, PA: IDEA Group Publishing.
    • (2006) Web and information security , pp. 1-31
    • Weitzner, D.J.1    Hendler, J.2    Berners-Lee, T.3    Connolly, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.