A Lightweight Scheme Exploiting Social Networks for Data Minimization According to the GDPR
暂无分享,去创建一个
[1] Xuyun Zhang,et al. Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things , 2020, IEEE Transactions on Computational Social Systems.
[2] Kalman Graffi,et al. Peer-to-Peer-Based Social Networks: A Comprehensive Survey , 2020, SN Computer Science.
[3] Tao Wang,et al. Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic: A Case Study on Weibo , 2020, IEEE Transactions on Computational Social Systems.
[4] Yichuan Jiang,et al. Diffusion in Social Networks: A Multiagent Perspective , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[5] Blaise Ngonmang,et al. Monetization and Services on a Real Online Social Network Using Social Network Analysis , 2013, 2013 IEEE 13th International Conference on Data Mining Workshops.
[6] Doina Cosovan,et al. Private Data System Enabling Self-Sovereign Storage Managed by Executable Choreographies , 2017, DAIS.
[7] Abida Ellahi,et al. Key quality factors affecting users' perception of social networking websites , 2013 .
[8] R. Joosten,et al. Self-Sovereign Identity: a Comparison of IRMA and Sovrin , 2019 .
[9] Jim Groom,et al. The Path to Self-Sovereign Identity , 2017 .
[10] Fan Yang,et al. Anonymous Privacy Preservation Based on m-Signature and Fuzzy Processing for Real-Time Data Release , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[11] Shuai Wang,et al. Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[12] John Hughes,et al. Security Assertion Markup Language (SAML) 2.0 Technical Overview , 2004 .
[13] Simon Josefsson,et al. The Base16, Base32, and Base64 Data Encodings , 2003, RFC.
[14] Sebastian Ramacher,et al. Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems , 2019, ICICS.
[15] Peter Mell,et al. A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems , 2019, ArXiv.
[16] Bin Zhou,et al. A regional adaptive variational PDE model for computed tomography image reconstruction , 2019, Pattern Recognit..
[17] Gergely Alpár,et al. Privacy-Preserving Webshopping with Attributes , 2017, 2017 IEEE Symposium on Privacy-Aware Computing (PAC).
[18] Wei Wei,et al. Gradient-driven parking navigation using a continuous information potential field based on wireless sensor network , 2017, Inf. Sci..
[19] Rico Hageman,et al. Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology , 2019, ArXiv.
[20] Robertas Damasevicius,et al. Multi-sink distributed power control algorithm for Cyber-physical-systems in coal mine tunnels , 2019, Comput. Networks.
[21] Hong-Ning Dai,et al. SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs , 2019, IEEE Transactions on Computational Social Systems.
[22] Yongli Li,et al. Utility-Based Model for Characterizing the Evolution of Social Networks , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[23] D. Richard Kuhn,et al. Attribute-Based Access Control , 2017, Computer.