A novel trust-based access control for social networks using fuzzy systems
暂无分享,去创建一个
[1] Ji Zhang,et al. Outlier detection from large distributed databases , 2013, World Wide Web.
[2] Jingsha He,et al. An Access Control Method based on Scenario Trust , 2012, Int. J. Comput. Intell. Syst..
[3] Sarbjeet Singh,et al. An Approach for Determining Trustworthiness of Individuals in a Web-Based Social Network , 2016 .
[4] Yanchun Zhang,et al. Privacy-aware access control with trust management in web service , 2011, World Wide Web.
[5] Michael Netter,et al. Taxonomy of social network data types , 2014, EURASIP J. Inf. Secur..
[6] Yu Wang,et al. Application of fuzzy neural network in the trust-based access control model , 2010, 2010 8th World Congress on Intelligent Control and Automation.
[7] Bin Zhao,et al. Assessment of recommendation trust for access control in open networks , 2018, Cluster Computing.
[8] Juan Li,et al. MobiTrust: Trust Management System in Mobile Social Computing , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[9] Yuval Elovici,et al. Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.
[10] Anna Cinzia Squicciarini,et al. Learning based access control in online social networks , 2010, WWW '10.
[11] Parikshit N. Mahalle,et al. Trust-Based Access Control in Multi-role Environment of Online Social Networks , 2018, Wirel. Pers. Commun..
[12] Bo Lang. Trust Degree Based Access Control for social networks , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[13] Saeedeh Shekarpour,et al. Modeling and evaluation of trust with an extension in semantic web , 2010, J. Web Semant..
[14] Justin Zhijun Zhan,et al. A Novel Trust Computing System for Social Networks , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[15] Cecile Paris,et al. STrust: A Trust Model for Social Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[16] Yanchun Zhang,et al. A flexible payment scheme and its role-based access control , 2005, IEEE Transactions on Knowledge and Data Engineering.
[17] Arjan Durresi,et al. A survey of trust management systems for online social communities - Trust modeling, trust inference and attacks , 2016, Knowl. Based Syst..
[18] Jf Baldwin,et al. An Introduction to Fuzzy Logic Applications in Intelligent Systems , 1992 .
[19] Brian Whitworth,et al. Access control taxonomy for social networks , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[20] Xiang Li,et al. AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks , 2012, 2012 Second International Conference on Cloud and Green Computing.
[21] Jong Hyuk Park,et al. Social network security: Issues, challenges, threats, and solutions , 2017, Inf. Sci..
[22] Dave Clarke,et al. Access Control Models for Online Social Networks , 2014 .
[23] Laurence T. Yang,et al. MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[24] Kwang Hyung Lee,et al. First Course on Fuzzy Theory and Applications , 2005, Advances in Soft Computing.
[25] Neeli R. Prasad,et al. A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.
[26] Cécile Paris,et al. A survey of trust in social networks , 2013, CSUR.
[27] Joseph Migga Kizza. Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems , 2013 .
[28] Li Pan,et al. A Machine Learning Based Trust Evaluation Framework for Online Social Networks , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[29] Olusegun Folorunso,et al. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments , 2015 .
[30] Anna Stachowiak,et al. Uncertainty-Preserving Trust Prediction in Social Networks , 2014, Social Networks: A Framework of Computational Intelligence.
[31] Samee Ullah Khan,et al. Scalability Issues in Online Social Networks , 2016, ACM Comput. Surv..
[32] Yuan Cheng,et al. Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[33] Somanath Tripathy,et al. A trust-based collaborative access control model with policy aggregation for online social networks , 2017, Social Network Analysis and Mining.
[34] Gert-Jan de Vreede,et al. Understanding trust influencing factors in social media communication: A qualitative study , 2017, Int. J. Inf. Manag..
[35] Guojun Wang,et al. κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph , 2015, Inf. Sci..
[36] Yanchun Zhang,et al. Effective Collaboration with Information Sharing in Virtual Universities , 2009, IEEE Transactions on Knowledge and Data Engineering.
[37] Hua Wang,et al. Injecting purpose and trust into data anonymisation , 2009, CIKM.
[38] Zhong Chen,et al. iSac: Intimacy Based Access Control for Social Network Sites , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[39] Guojun Wang,et al. κ-FuzzyTrust , 2015 .
[40] Yi Liu,et al. Context-aware trust network extraction in large-scale trust-oriented social networks , 2017, World Wide Web.
[41] Richard Chbeir,et al. Privacy in Online Social Networks , 2013, Security and Privacy Preserving in Social Networks.