Content-based access control in an online community
暂无分享,去创建一个
[1] Swapna S. Gokhale,et al. Analysis of Structural Social Capital in Online Social Networks , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.
[2] Talel Abdessalem,et al. A reachability-based access control model for online social networks , 2011, DBSocial '11.
[3] Benjamin Kuipers,et al. Negation and Proof by Contradiction in Access-Limited Logic , 1991, AAAI.
[4] Barbara Carminati,et al. A Decentralized Security Framework for Web-Based Social Networks , 2008, Int. J. Inf. Secur. Priv..
[5] Bernardo Cuenca Grau,et al. OWL 2 Web Ontology Language: Profiles , 2009 .
[6] Frank van Harmelen,et al. A semantic web primer , 2004 .
[7] Tim Berners-Lee,et al. Uniform Resource Locators (URL) , 1994, RFC.
[8] Jose M. Such,et al. Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services , 2015, Int. J. Hum. Comput. Interact..
[9] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[10] Ei Ei Mon,et al. The privacy-aware access control system using attribute-and role-based access control in private cloud , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[11] Xin Jin,et al. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.
[12] Barbara Carminati,et al. Collaborative access control in on-line social networks , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[13] Barbara Carminati,et al. Rule-Based Access Control for Social Networks , 2006, OTM Workshops.
[14] Huajun Chen,et al. The Semantic Web , 2011, Lecture Notes in Computer Science.
[15] Mark A. Musen,et al. The protégé project: a look back and a look forward , 2015, SIGAI.
[16] Gail-Joon Ahn,et al. Multiparty Access Control for Online Social Networks: Model and Mechanisms , 2013, IEEE Transactions on Knowledge and Data Engineering.
[17] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[18] Barbara Carminati,et al. Enforcing access control in Web-based social networks , 2009, TSEC.
[19] Nigel Shadbolt,et al. Providing Access Control to Online Photo Albums Based on Tags and Linked Data , 2009, AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0.
[20] Rob Johnson,et al. Usable Privacy Controls for Blogs , 2009, 2009 International Conference on Computational Science and Engineering.
[21] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[22] Amirreza Masoumzadeh,et al. Ontology-based access control for social network systems , 2011, Int. J. Inf. Priv. Secur. Integr..
[23] Philip W. L. Fong,et al. Relationship-based access control policies and their policy languages , 2011, SACMAT '11.
[24] Swapna S. Gokhale,et al. Understanding social effects in online networks , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).
[25] Blase Ur,et al. Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.
[26] Yuan Cheng,et al. A User-Activity-Centric Framework for Access Control in Online Social Networks , 2011, IEEE Internet Computing.
[27] Pyin Oo Lwin,et al. INTELLIGENT ACCESS CONTROL POLICIES FOR SOCIAL N ETWORK SITE , 2013 .
[28] Robert A. Kowalski,et al. The Semantics of Predicate Logic as a Programming Language , 1976, JACM.
[29] Brian Whitworth,et al. Distributed access control for social networks , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[30] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.
[31] Barbara Carminati,et al. Content-Based Filtering in On-Line Social Networks , 2010, PSDML.
[32] Liyang Yu,et al. A Developer’s Guide to the Semantic Web , 2011, Springer Berlin Heidelberg.
[33] Robert A. Kowalski,et al. Predicate Logic as Programming Language , 1974, IFIP Congress.
[34] James A. Hendler,et al. N3Logic: A logical framework for the World Wide Web , 2007, Theory and Practice of Logic Programming.
[35] Deborah L. McGuinness,et al. An Environment for Merging and Testing Large Ontologies , 2000, KR.
[36] Jose M. Such,et al. Self-disclosure decision making based on intimacy and privacy , 2012, Inf. Sci..