A Blockchain-based approach for matching desired and real privacy settings of social network users
暂无分享,去创建一个
[1] Krishna P. Gummadi,et al. Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.
[2] C. Baden‐Fuller,et al. Business Models and Technological Innovation , 2013 .
[3] Dijiang Huang,et al. Building private blockchains over public blockchains (PoP): an attribute-based access control approach , 2019, SAC.
[4] Eran Toch,et al. Not Even Past: Information Aging and Temporal Privacy in Online Social Networks , 2017, Hum. Comput. Interact..
[5] Simplice A. Asongu,et al. Crime and social media , 2019, Inf. Technol. People.
[6] Khaled Salah,et al. Blockchain for 5G: Opportunities and Challenges , 2019, 2019 IEEE Globecom Workshops (GC Wkshps).
[7] Ioannis Karamitsos,et al. Design of the Blockchain Smart Contract: A Use Case for Real Estate , 2018 .
[8] Chris Kanich,et al. Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media , 2019, CCS.
[9] Khaled Salah,et al. Proof of Delivery of Digital Assets Using Blockchain and Smart Contracts , 2018, IEEE Access.
[10] Marko Vukolic,et al. Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.
[11] Arne Meeuw,et al. A Decentralised Sharing App running a Smart Contract on the Ethereum Blockchain , 2016, IOT.
[12] Bhaskar DasGupta,et al. On analyzing and evaluating privacy measures for social networks under active attack , 2018, Inf. Sci..
[13] Bogdan Cristian Florea,et al. Blockchain and Internet of Things data provider for smart applications , 2018, 2018 7th Mediterranean Conference on Embedded Computing (MECO).
[14] Svenja Polst,et al. Why Users Ignore Privacy Policies - A Survey and Intention Model for Explaining User Privacy Behavior , 2018, HCI.
[15] N. Odhiambo,et al. Governance and Social Media in African Countries: An Empirical Investigation , 2018, Telecommunications Policy.
[16] Mina J. Hanna,et al. User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection , 2018, Computer.
[17] Does social media promote democracy? Some empirical evidence , 2020 .
[18] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[19] Yang Wang,et al. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.
[20] Lei Wu,et al. EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level , 2019, ArXiv.
[21] Steven M. Bellovin,et al. The Failure of Online Social Network Privacy Settings , 2011 .
[22] Khaled Salah,et al. Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.
[23] Nicolas Mayer,et al. A Comprehensive Reference Model for Blockchain-based Distributed Ledger Technology , 2017, ER Forum/Demos.
[24] S. Asongu,et al. Homicide and social media: Global empirical evidence , 2019, Technology in Society.
[25] Kai Wang,et al. Graph structure and statistical properties of Ethereum transaction relationships , 2019, Inf. Sci..
[26] Dandan Xu,et al. Demystifying Hidden Privacy Settings in Mobile Apps , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[27] Jörg Dörr,et al. Enabling Users to Specify Correct Privacy Requirements , 2019, REFSQ.
[28] Khaled Salah,et al. Blockchain-Based Proof of Delivery of Physical Assets With Single and Multiple Transporters , 2018, IEEE Access.
[29] Khaled Salah,et al. Blockchain-Based Solution for Proof of Delivery of Physical Assets , 2018, ICBC.
[30] Changzhen Hu,et al. DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks , 2019, Inf. Sci..
[31] Chandan Kumar Jha,et al. Does social media reduce corruption? , 2017, Inf. Econ. Policy.
[32] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[33] Pamela J. Wisniewski,et al. Making privacy personal: Profiling social network users to inform privacy education and nudging , 2017, Int. J. Hum. Comput. Stud..
[34] Jong Hyuk Park,et al. Social network security: Issues, challenges, threats, and solutions , 2017, Inf. Sci..
[35] Tourism and social media in the world: an empirical investigation , 2019, Journal of Economic Studies.
[36] Khaled Salah,et al. A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes , 2018, 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA).
[37] L. Jean Camp,et al. Security and privacy in online social networking: Risk perceptions and precautionary behaviour , 2018, Comput. Hum. Behav..