-
1
-
-
22244463953
-
Credential-based access control for Semantic Web services
-
Retrieved from, http://www.aifb.unikarl-sruhe.de/WBS/sag/papers/Agarwal_Sprick_Wort-mannCredentialBasedAccessControlForSemantic-WebServices-AAAI_SS_SWS-04.pdf
-
Agarwal, S., Sprick, B., & Wortmann, S. (2004). Credential-based access control for Semantic Web services. In AAAI spring symposium - Semantic Web services. Retrieved from, http://www.aifb.unikarl-sruhe.de/WBS/sag/papers/Agarwal_Sprick_Wort-mannCredentialBasedAccessControlForSemantic-WebServices-AAAI_SS_SWS-04.pdf
-
(2004)
In AAAI spring symposium - Semantic Web services
-
-
Agarwal, S.1
Sprick, B.2
Wortmann, S.3
-
2
-
-
35348848696
-
Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography
-
Backstrom, L., Dwork, C., & Kleinberg, J. (2007). Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the World Wide Web conference 2007.
-
(2007)
In Proceedings of the World Wide Web conference 2007
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
3
-
-
33749386628
-
A privacy paradox: Social networking in the United States
-
September Retrieved from, http://www.firstmonday. org/issues/issue11_9/barnes
-
Barnes, S. B. (2006, September). A privacy paradox: Social networking in the United States. First Monday, 11(9). Retrieved from, http://www.firstmonday. org/issues/issue11_9/barnes
-
(2006)
First Monday
, vol.11
, Issue.9
-
-
Barnes, S.B.1
-
4
-
-
19944380112
-
Database security— Concepts, approaches, and challenges
-
Bertino, E., & Sandhu, R. (2005). Database security— Concepts, approaches, and challenges. IEEE Trans. Dependable Secur. Comput., 2(1), pp. 2-19.
-
(2005)
IEEE Trans. Dependable Secur. Comput
, vol.2
, Issue.1
, pp. 2-19
-
-
Bertino, E.1
Sandhu, R.2
-
6
-
-
33845467743
-
Rule-based access control for social networks
-
In R. Meersman, Z. Tari, P. Herrero, et al. (Eds.) Springer-Verlag
-
Carminati, B., Ferrari, E., & Perego, A. (2006). Rule-based access control for social networks. In R. Meersman, Z. Tari, P. Herrero, et al. (Eds.), OTM 2006 workshops proceedings (pp. 1734-1744). Springer-Verlag.
-
(2006)
OTM 2006 workshops proceedings
, pp. 1734-1744
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
8
-
-
70450244195
-
Security and privacy in social networks
-
In M. Khosrow-Pour (Ed.) 2nd edition. Hershey, PA: IGI Publishing. (To appear)
-
Carminati, B., Ferrari, E., & Perego, A. (2008). Security and privacy in social networks. In M. Khosrow-Pour (Ed.), The encyclopedia of information science and technology, 2nd edition. Hershey, PA: IGI Publishing. (To appear)
-
(2008)
The encyclopedia of information science and technology
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
9
-
-
85001728526
-
The Platform for Privacy Preferences 1.1 (P3P1.1) specifcation (W3C Working Group Note)
-
November Retrieved from, http://www. w3.org/TR/P3P11/
-
Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M., et al. (2006, November). The Platform for Privacy Preferences 1.1 (P3P1.1) specifcation (W3C Working Group Note). World Wide Web Consortium. Retrieved from, http://www. w3.org/TR/P3P11/
-
(2006)
World Wide Web Consortium
-
-
Cranor, L.1
Dobbs, B.2
Egelman, S.3
Hogben, G.4
Humphrey, J.5
Langheinrich, M.6
-
10
-
-
33750962780
-
A P3P Preference Exchange Language 1.0 (APPEL1.0) (W3C Working Draft)
-
April Retrieved from, http://www. w3.org/TR/P3P-preferences/
-
Cranor, L., Langheinrich, M., & Marchiori, M. (2002, April). A P3P Preference Exchange Language 1.0 (APPEL1.0) (W3C Working Draft). World Wide Web Consortium. Retrieved from, http://www. w3.org/TR/P3P-preferences/
-
(2002)
World Wide Web Consortium
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
-
12
-
-
27544439248
-
How the Semantic Web is being used: An analysis of FOAF documents
-
IEEE CS Press
-
Ding, L., Zhou, L., Finin, T., & Joshi, A. (2005). How the Semantic Web is being used: An analysis of FOAF documents. In Proceedings of the 38th annual Hawaii international conference on system sciences (HICSS'05) (p. 113.3). IEEE CS Press.
-
(2005)
In Proceedings of the 38th annual Hawaii international conference on system sciences (HICSS'05)
, pp. 113.3
-
-
Ding, L.1
Zhou, L.2
Finin, T.3
Joshi, A.4
-
15
-
-
84873621535
-
Access control requirements for Web 2.0 security and privacy
-
Retrieved from, http://seclab.cs.rice.edu/w2sp/2007/ papers/paper-205-z_708.pdf
-
Gates, C. E. (2007). Access control requirements for Web 2.0 security and privacy. In Proceedings of the Web 2.0 security & privacy 2007 workshop. Retrieved from, http://seclab.cs.rice.edu/w2sp/2007/ papers/paper-205-z_708.pdf
-
(2007)
In Proceedings of the Web 2.0 security & privacy 2007 workshop
-
-
Gates, C.E.1
-
17
-
-
50249095382
-
More content—less control: Access control in the Web 2.0
-
Retrieved from, http://seclab.cs.rice. edu/w2sp/2007/papers/paper-193-z_6706.pdf
-
Hart, M., Johnson, R., & Stent, A. (2007). More content—less control: Access control in the Web 2.0. In Proceedings of the Web 2.0 security & privacy 2007 workshop. Retrieved from, http://seclab.cs.rice. edu/w2sp/2007/papers/paper-193-z_6706.pdf
-
(2007)
In Proceedings of the Web 2.0 security & privacy 2007 workshop
-
-
Hart, M.1
Johnson, R.2
Stent, A.3
-
18
-
-
41849128290
-
-
University of Massachusetts Amherst, Computer Science Department March Retrieved from, http://www.cs.umass.edu/~mhay/papers/hayet-al-tr_0719.pdf
-
Hay, M., Miklau, G., Jensen, D., Weis, P., & Srivastava, S. (2007, March). Anonymizing social networks (Tech. Rep. No. 07–19). University of Massachusetts Amherst, Computer Science Department. Retrieved from, http://www.cs.umass.edu/~mhay/papers/hayet-al-tr_0719.pdf
-
(2007)
Anonymizing social networks (Tech. Rep. No. 07–19)
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Weis, P.4
Srivastava, S.5
-
19
-
-
38349034383
-
Certifcate-based access control in pure P2P networks
-
IEEE CS Press
-
Palomar, E., Estevez-Tapiador, J. M., Hernandez-Castro, J. C., & Ribagorda, A. (2006). Certifcate-based access control in pure P2P networks. In Proceedings of the 6th IEEE international conference on peer-to-peer computing (P2P'06) (pp. 177-184). IEEE CS Press.
-
(2006)
In Proceedings of the 6th IEEE international conference on peer-to-peer computing (P2P'06)
, pp. 177-184
-
-
Palomar, E.1
Estevez-Tapiador, J.M.2
Hernandez-Castro, J.C.3
Ribagorda, A.4
-
20
-
-
14744267724
-
Social networks applied
-
Staab, S., Domingos, P., Mika, P., Golbeck, J., Ding, L., Finin, T. W., et al. (2005). Social networks applied. IEEE Intelligent Systems, 20(1), 80-93.
-
(2005)
IEEE Intelligent Systems
, vol.20
, Issue.1
, pp. 80-93
-
-
Staab, S.1
Domingos, P.2
Mika, P.3
Golbeck, J.4
Ding, L.5
Finin, T.W.6
-
21
-
-
85084164318
-
Certifcate based access control for widely distributed resources
-
Retrieved from, http://dsd.lbl.gov/~mrt/papers/AkentiUsenixSec.pdf
-
Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., & Essiari, A. (1999). Certifcate based access control for widely distributed resources. In Proceedings of the 8th USENIX security symposium. Retrieved from, http://dsd.lbl.gov/~mrt/papers/AkentiUsenixSec.pdf
-
(1999)
In Proceedings of the 8th USENIX security symposium
-
-
Thompson, M.1
Johnston, W.2
Mudumbai, S.3
Hoo, G.4
Jackson, K.5
Essiari, A.6
-
22
-
-
34250696941
-
Privacy protection in social network data disclosure based on granular computing
-
IEEE CS
-
Wang, D. W., Liau, C. J., & Hsu, Sheng,T. (2006). Privacy protection in social network data disclosure based on granular computing. In Proceedings of the 2006 IEEE international conference on fuzzy systems (HICSS'05) (pp. 997–1003). IEEE CS.
-
(2006)
In Proceedings of the 2006 IEEE international conference on fuzzy systems (HICSS'05)
, pp. 997-1003
-
-
Wang, D.W.1
Liau, C.J.2
Hsu3
Sheng, T.4
-
24
-
-
84899266027
-
Creating a policy-aware Web: Discretionary, rule-based access for the World Wide Web
-
In E. Ferrari & B. M. Thuraisingham (Eds.) Hershey, PA: IDEA Group Publishing
-
Weitzner, D. J., Hendler, J., Berners-Lee, T., & Connolly, D. (2006). Creating a policy-aware Web: Discretionary, rule-based access for the World Wide Web. In E. Ferrari & B. M. Thuraisingham (Eds.), Web and information security (pp. 1-31). Hershey, PA: IDEA Group Publishing.
-
(2006)
Web and information security
, pp. 1-31
-
-
Weitzner, D.J.1
Hendler, J.2
Berners-Lee, T.3
Connolly, D.4
-
25
-
-
0031338080
-
Using digital credentials on the World Wide Web
-
Winslett, M., Ching, N., Jones, V. E., & Slepchin, I. (1997). Using digital credentials on the World Wide Web. Journal of Computer Security, 5(3), pp. 255-266.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.3
, pp. 255-266
-
-
Winslett, M.1
Ching, N.2
Jones, V.E.3
Slepchin, I.4
|