Trust and Privacy on the Social and Semantic Web (SPOT 2009)
暂无分享,去创建一个
Axel Polleres | Michael Hausenblas | Alexandre Passant | Daniel Olmedilla | Philipp Kärger | A. Polleres | Alexandre Passant | M. Hausenblas | Philipp Kärger | D. Olmedilla
[1] Dan Brickley,et al. FOAF Vocabulary Specification , 2004 .
[2] Rael Dornfest,et al. Google hacks - 100 industrial-strength tips and tools , 2002 .
[3] Juri Luca De Coi,et al. A Review of Trust Management, Security and Privacy Policy Languages , 2016, SECRYPT.
[4] Piero A. Bonatti,et al. Protune: A Framework for Semantic Web Policies , 2008, International Semantic Web Conference.
[5] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[6] John Riedl,et al. tagging, communities, vocabulary, evolution , 2006, CSCW '06.
[7] James A. Hendler,et al. Trust Networks on the Semantic Web , 2003, WWW.
[8] Jeffrey M. Bradshaw,et al. Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder , 2003, SEMWEB.
[9] Fausto Giunchiglia,et al. Semantic Matching: Algorithms and Implementation , 2007, J. Data Semant..
[10] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[11] Gediminas Adomavicius,et al. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.
[12] Fausto Giunchiglia,et al. Towards a Theory of Formal Classification , 2005 .
[13] Ben Laurie,et al. Under)mining Privacy in Social Networks , 2008 .
[14] Wolfgang Nejdl,et al. Social Software for Lifelong Competence Development: Challenges and Infrastructure , 2008, Int. J. Emerg. Technol. Learn..
[15] James A. Hendler,et al. Information accountability , 2008, CACM.
[16] Lalana Kagal,et al. Using Semantic Web Technologies for Policy Management on the Web , 2006, AAAI.
[17] Sanjeev Khanna,et al. Why and Where: A Characterization of Data Provenance , 2001, ICDT.
[18] Paul Resnick,et al. PICS: Internet access controls without censorship , 1996, CACM.
[19] David R. Karger,et al. Piggy Bank: Experience the Semantic Web inside your web browser , 2005, J. Web Semant..
[20] Alec Wolman,et al. Lockr: social access control for web 2.0 , 2008, WOSN '08.
[21] Timothy W. Finin,et al. A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.
[22] Arne Wolf Koesling,et al. Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning , 2008, IEEE Transactions on Learning Technologies.
[23] Nathan R. Yergler,et al. ccREL : The Creative Commons Rights Expression Language , 2008 .
[24] Alexandre Passant,et al. Towards an Interlinked Semantic Wiki Farm , 2008, SemWiki.
[25] David R. Karger,et al. What would it mean to blog on the semantic web? , 2005, J. Web Semant..
[26] Simon Schenk. On the Semantics of Trust and Caching in the Semantic Web , 2008, International Semantic Web Conference.
[27] Barbara Carminati,et al. Privacy-Aware Collaborative Access Control in Web-Based Social Networks , 2008, DBSec.
[28] Marianne Winslett,et al. No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web , 2004, ESWS.
[29] Axel Polleres,et al. Trust Negotiation for Semantic Web Services , 2004, SWSWPC.
[30] Barbara Carminati,et al. Combining Social Networks and Semantic Web Technologies for Personalizing Web Access , 2008, CollaborateCom.
[31] Jennifer Golbeck,et al. Generating Predictive Movie Recommendations from Trust in Social Networks , 2006, iTrust.
[32] Indrajit Ray,et al. VTrust: A Trust Management System Based on a Vector Model of Trust , 2005, ICISS.
[33] Marianne Winslett. An Introduction to Trust Negotiation , 2003, iTrust.
[34] Marianne Winslett,et al. Ontology-Based Policy Specification and Management , 2005, ESWC.
[35] Enrico Motta,et al. Personalizing relevance on the Semantic Web through trusted recommendations from a social network , 2006 .
[36] Steve Cayzer,et al. How to build a Snippet Manager , 2005, Semantic Desktop Workshop.
[37] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[38] D. Fensel,et al. Architecture of the World Wide Web , Volume One , 2004 .
[39] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[40] Deborah L. McGuinness,et al. A proof markup language for Semantic Web services , 2006, Inf. Syst..
[41] Paolo Avesani,et al. A trust-enhanced recommender system application: Moleskiing , 2005, SAC '05.
[42] Piero A. Bonatti,et al. Advanced Policy Explanations on the Web , 2006, ECAI.
[43] Steve Cayzer,et al. Semantic blogging and decentralized knowledge management , 2004, CACM.
[44] James A. Hendler,et al. N3Logic: A logical framework for the World Wide Web , 2007, Theory and Practice of Logic Programming.
[45] Fausto Giunchiglia,et al. RelBAC: Relation Based Access Control , 2008, 2008 Fourth International Conference on Semantics, Knowledge and Grid.
[46] Hideaki Takeda,et al. SOCIOBIBLOG: A DECENTRALIZED PLATFORM FOR SHARING BIBLIOGRAPHIC INFORMATION , 2007 .
[47] Jeremy J. Carroll,et al. Named graphs , 2005, J. Web Semant..
[48] Phokion G. Kolaitis,et al. Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , 2002 .
[49] Lalana Kagal. Rei : A Policy Language for the Me-Centric Project , 2002 .
[50] Nikos Mavrogiannopoulos,et al. Using OpenPGP Keys for Transport Layer Security (TLS) Authentication , 2007, RFC.
[51] Hideaki Takeda,et al. Semblog : Personal Knowledge Publishing Suite , 2003 .
[52] Luc Moreau,et al. The Open Provenance Model , 2007 .
[53] James Cheney,et al. Provenance management in curated databases , 2006, SIGMOD Conference.
[54] John G. Breslin,et al. Weaving SIOC into the Web of Linked Data , 2008, LDOW.
[55] Rohit Khare,et al. Microformats: the next (small) thing on the semantic Web? , 2006, IEEE Internet Computing.
[56] Peter Sewell,et al. Cassandra: distributed access control policies with tunable expressiveness , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..
[57] Timothy W. Finin,et al. Authorization and privacy for semantic Web services , 2004, IEEE Intelligent Systems.
[58] John G. Breslin,et al. Social Network and Data Portability using Semantic Web Technologies , 2008, BIS.
[59] Axel Polleres,et al. Enabling Trust and Privacy on the Social Web , 2009 .
[60] Norbert E. Fuchs,et al. Semantic Web Policies - A Discussion of Requirements and Research Issues , 2006, ESWC.
[61] Kaarel Kaljurand,et al. Attempto Controlled English for Knowledge Representation , 2008, Reasoning Web.
[62] Christian Bizer,et al. Quality-driven information filtering using the WIQA policy framework , 2009, J. Web Semant..
[63] María-del-Mar Gallardo,et al. Semantic Access Control Model: A Formal Specification , 2005, ESORICS.
[64] Diego Calvanese,et al. The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.
[65] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[66] Yogesh L. Simmhan,et al. The Open Provenance Model (v1.01) , 2008 .
[67] Marianne Winslett,et al. How to Exploit Ontologies for Trust Negotiation , 2004, Trust@ISWC.
[68] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[69] Chitta Baral,et al. Knowledge Representation, Reasoning and Declarative Problem Solving , 2003 .
[70] Jeffrey M. Bradshaw,et al. KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[71] Jaideep Srivastava,et al. Building a web of trust without explicit trust ratings , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.
[72] Pierangela Samarati,et al. Regulating service access and information release on the Web , 2000, CCS.
[73] Vassilis Christophides,et al. On Explicit Provenance Management in RDF/S Graphs , 2009, Workshop on the Theory and Practice of Provenance.
[74] John G. Breslin,et al. Using Semantics to Enhance the Blogging Experience , 2006, ESWC.
[75] Orri Erling,et al. Linked Data Spaces & Data Portability , 2008, LDOW.
[76] Deborah L. McGuinness,et al. Tracking RDF Graph Provenance using RDF Molecules , 2005 .
[77] Roy Fielding,et al. Architectural Styles and the Design of Network-based Software Architectures"; Doctoral dissertation , 2000 .
[78] Andy Seaborne,et al. SPARQL/Update: A language for updating RDF graphs , 2007 .
[79] James A. Hendler,et al. Metcalfe's law, Web 2.0, and the Semantic Web , 2008, J. Web Semant..
[80] Gerald Reif,et al. SemClip - Overcoming the Semantic Gap Between Desktop Applications , 2007, Semantic Web Challenge.
[81] John G. Breslin,et al. semiBlog — Semantic Publishing of Desktop Data , 2006 .
[82] James Clark,et al. XSL Transformations (XSLT) Version 1.0 , 1999 .
[83] Fausto Giunchiglia,et al. Lightweight Ontologies , 2009, Encyclopedia of Database Systems.
[84] John G. Breslin,et al. Microblogging: A Semantic Web and Distributed Approach , 2008 .
[85] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..