Author:
Wang Hua,Cao Jinli,Zhang Yanchun
Publisher
Springer International Publishing
Reference76 articles.
1. Abiteboul, S., et al.: The lowell database research self-assessment. Commun. ACM 48(5), 111–118 (2005)
2. Adams, A., Angela, S.M.: Privacy in multimedia communications: protecting users, not just data. In: Blandford, A., Vanderdonckt, J., Gray, P. (eds.) People and Computers XVInteraction without Frontiers, eds edn. Springer, London.
https://doi.org/10.1007/978-1-4471-0353-0_4
3. Bader, A., et al.: A trust based approach for protecting user data in social networks. In: Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, CASCON’07, pp. 288–293. IBM Corp., Armonk (2007)
4. Barth, A., Mitchell, J., Rosenstein, J.: Conflict and combination in privacy policy languages (summary). In: Proceedings of the 2004 ACM workshop on Privacy in the Electronic Society (2004)
5. Bellare, M., Roga way, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security, pp. 62–73. IEEE, Piscataway (1993)