C-CBPM: collective context based privacy model
暂无分享,去创建一个
Srini Ramaswamy | Nitin Agarwal | M. Venakata Swamy | N. Agarwal | S. Ramaswamy | M. Swamy | Nitin Agarwal
[1] Shih-Chien Chou,et al. Dynamic adaptation to object state change in an information flow control model , 2004, Inf. Softw. Technol..
[2] Agostino Cortesi,et al. Information flow security in Boundary Ambients , 2008, Inf. Comput..
[3] Len LaPadula,et al. Secure Computer Systems: A Mathematical Model , 1996 .
[4] Richa Jindal,et al. Dual Layer Privacy Model for Hidden Databases , 2010 .
[5] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[6] Simon N. Foley. Secure information flow using security groups , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[7] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Aneta Poniszewska-Maranda,et al. Role engineering: From design to evolution of security schemes , 2008, J. Syst. Softw..
[9] Patricia L. Mabry,et al. Advances in Social Computing, Third International Conference on Social Computing, Behavioral Modeling, and Prediction, SBP 2010, Bethesda, MD, USA, March 30-31, 2010. Proceedings , 2010, SBP.
[10] Md. Moniruzzaman,et al. Delegation of access rights in a privacy preserving access control model , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[11] Werner Kurschl,et al. A survey on situation-aware ambient intelligence systems , 2011, J. Ambient Intell. Humaniz. Comput..
[12] Shankara B. Subramanya,et al. WisColl: Collective wisdom based blog clustering , 2010, Inf. Sci..
[13] Euiho Suh,et al. Context-aware systems: A literature review and classification , 2009, Expert Syst. Appl..
[14] Nicoletta De Francesco,et al. Instruction-level security analysis for information flow in stack-based assembly languages , 2007, Inf. Comput..
[15] Ling Liu,et al. Encyclopedia of Database Systems , 2009, Encyclopedia of Database Systems.
[16] Srini Ramaswamy,et al. CBPM: Context Based Privacy Model , 2010, 2010 IEEE Second International Conference on Social Computing.
[17] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[18] Ran Wolff,et al. k-TTP: a new privacy model for large-scale distributed environments , 2004, KDD.
[19] Helen Nissenbaum,et al. Privacy in Context , 2009 .
[20] Stavros A. Koubias,et al. A dynamic context-aware access control architecture for e-services , 2006, Comput. Secur..
[21] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[22] Philip S. Yu,et al. Identifying the influential bloggers in a community , 2008, WSDM '08.
[23] Anne Adams,et al. Privacy in Multimedia Communications: Protecting Users, Not Just Data , 2001, BCS HCI/IHM.
[24] C. R. Baker,et al. Information Technology and the Social Construction of Information Privacy , 2001 .
[25] E. Michael Maximilien,et al. Enabling Privacy as a Fundamental Construct for Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[26] Huan Liu,et al. Trust in Blogosphere , 2009, Encyclopedia of Database Systems.
[27] Michael Mrissa,et al. Privacy-Aware DaaS Services Composition , 2011, DEXA.
[28] Leonard J. LaPadula,et al. MITRE technical report 2547, volume II , 1996 .
[29] Tom Gross. Cooperative ambient intelligence: towards autonomous and adaptive cooperative ubiquitous environments , 2008, Int. J. Auton. Adapt. Commun. Syst..
[30] Huan Liu,et al. Social Computing, Behavioral Modeling, and Prediction , 2008 .