A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks
暂无分享,去创建一个
Fei Xiang | Zhiyong Zhang | Lijun Yang | Hanman Li | Zhiyong Zhang | Fei Xiang | Hanman Li | Lijun Yang
[1] Barbara Carminati,et al. A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks , 2011, CODASPY '11.
[2] Patrick Brown. Trust and Risk , 2016 .
[3] Wilfred Villegas. A trust-based access control scheme for social networks , 2008 .
[4] Mohan S. Kankanhalli,et al. An efficient access control method for multimedia social networks , 2010, WSM@MM.
[5] Thorsten Rheinländer. Risk Management: Value at Risk and Beyond , 2003 .
[6] Jianfeng Ma,et al. Security and Trust in Digital Rights Management: A Survey , 2009, Int. J. Netw. Secur..
[7] MyoungBeom Chung,et al. Intelligent copyright protection system using a matching video retrieval algorithm , 2011, Multimedia Tools and Applications.
[8] Shiuh-Pyng Shieh,et al. A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks , 2012, IEEE Transactions on Vehicular Technology.
[9] Zhiyong Zhang. Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.
[10] Mudhakar Srivatsa,et al. Modeling data flow in socio-information networks: a risk estimation approach , 2011, SACMAT '11.
[11] Michael Negnevitsky,et al. Personality Trait Based Simulation Model of the E-mail System , 2006, Int. J. Netw. Secur..
[12] Xi Chen,et al. Content distribution and copyright authentication based on combined indexing and watermarking , 2010, Multimedia Tools and Applications.
[13] Kanliang Wang,et al. A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.
[14] Frank Yeong-Sung Lin,et al. A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment , 2014, Int. J. Netw. Secur..
[15] Yuan Cheng,et al. A User-Activity-Centric Framework for Access Control in Online Social Networks , 2011, IEEE Internet Computing.
[16] Bhavani M. Thuraisingham,et al. Semantic web-based social network access control , 2011, Comput. Secur..
[17] Jiexin Pu,et al. Rough Set and Trust Assessment-based Potential Paths Analysis and Mining for Multimedia Social Networks , 2012 .
[18] Shiguo Lian,et al. Fuzzy Risk Assessments on Security Policies for Digital Rights Management , 2009 .