Social applications: exploring a more secure framework
暂无分享,去创建一个
Mohamed Shehab | Heather Richter Lipford | Andrew Besmer | Gorrell P. Cheek | Mohamed Shehab | H. Lipford | Andrew Besmer | G. Cheek
[1] David Evans,et al. Privacy Protection for Social Networking Platforms , 2008 .
[2] Danah Boyd,et al. Friendster and publicly articulated social networking , 2004, CHI EA '04.
[3] Heather Richter Lipford,et al. Understanding Privacy Settings in Facebook with an Audience View , 2008, UPSEC.
[4] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[5] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[6] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[7] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[8] Judith Donath,et al. Public Displays of Connection , 2004 .
[9] Gail-Joon Ahn,et al. Beyond User-to-User Access Control for Online Social Networks , 2008, ICICS.
[10] Ariel Rabkin,et al. Personal knowledge questions for fallback authentication: security questions in the era of Facebook , 2008, SOUPS '08.