Detecting and predicting privacy violations in online social networks
暂无分享,去创建一个
[1] Philip Resnik,et al. Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language , 1999, J. Artif. Intell. Res..
[2] Marco Pistore,et al. NuSMV 2: An OpenSource Tool for Symbolic Model Checking , 2002, CAV.
[3] Barbara Carminati,et al. Privacy-Aware Access Control in Social Networks: Issues and Solutions , 2010 .
[4] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[5] Martha Palmer,et al. Verb Semantics and Lexical Selection , 1994, ACL.
[6] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[7] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[8] Jamal Bentahar,et al. An Integrated Semantics of Social Commitments and Associated Operations , 2009, MALLOW.
[9] Munindar P. Singh. An ontology for commitments in multiagent systems: , 1999, Artificial Intelligence and Law.
[10] Erwin Engeler,et al. Logic of Programs, Workshop , 1981 .
[11] Sasikumar Mukundan,et al. Spinning the Semantic Web , 2004 .
[12] Munindar P. Singh,et al. Flexible protocol specification and execution: applying event calculus planning using commitments , 2002, AAMAS '02.
[13] Deborah L. McGuinness,et al. Ontologies Come of Age , 2003, Spinning the Semantic Web.
[14] E. Allen Emerson,et al. Temporal and Modal Logic , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.
[15] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2009, CCRV.
[16] Barbara Carminati,et al. Privacy in Social Networks: How Risky is Your Social Graph? , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[17] Jamal Bentahar,et al. On the verification of social commitments and time , 2011, AAMAS.
[18] Barbara Carminati,et al. P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.
[19] Na Li,et al. Preserving Relation Privacy in Online Social Network Data , 2011, IEEE Internet Computing.
[20] Jure Leskovec,et al. Microscopic evolution of social networks , 2008, KDD.
[21] J. Van Leeuwen,et al. Handbook of theoretical computer science - Part A: Algorithms and complexity; Part B: Formal models and semantics , 1990 .
[22] Marco Pistore,et al. Nusmv version 2: an opensource tool for symbolic model checking , 2002, CAV 2002.
[23] Jordi Castro Pérez,et al. Statistical disclosure control in tabular data , 2010 .
[24] Munindar P. Singh. An ontology for commitments in multiagent systems: , 1999, Artificial Intelligence and Law.
[25] Munindar P. Singh,et al. Specifying and Verifying Cross-Organizational Business Models: An Agent-Oriented Approach , 2012, IEEE Transactions on Services Computing.
[26] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[27] Valentin Goranko,et al. Logic in Computer Science: Modelling and Reasoning About Systems , 2007, J. Log. Lang. Inf..
[28] P Jennette,et al. Debatin, Bernhard, Lovejoy, Horn, Ann-Kathrin, and Hughes, Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. , 2009 .
[29] Kristen LeFevre,et al. Privacy wizards for social networking sites , 2010, WWW '10.
[30] Jure Leskovec,et al. Supervised random walks: predicting and recommending links in social networks , 2010, WSDM '11.
[31] Edmund M. Clarke,et al. Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic , 2008, 25 Years of Model Checking.
[32] Jan van Leeuwen,et al. Handbook of Theoretical Computer Science, Vol. B: Formal Models and Semantics , 1994 .
[33] Michael Huth,et al. Logic in computer science - modelling and reasoning about systems , 2000 .