Author:
Akcora Cuneyt Gurcan,Ferrari Elena
Reference32 articles.
1. (49)Anwar M, Fong PWL (2012) A visualization tool for evaluating access control policies in facebook-style social network systems. In: Proceedings of the 27th annual ACM symposium on applied computing. SAC '12, Riva del Garda. ACM, New York, pp 1443–1450 (Online). Available: http://doi.acm.org/10.1145/2245276.2232007
2. Bonneau J, Anderson J, Church L (2009) Privacy suites: shared privacy for social networks. In: Symposium on usable privacy and security (SOUPS), Mountain View
3. Bonneau J, Preibusch S (2010) The privacy jungle: on the market for data protection in social networks. In: Economics of information security and privacy, Springer, US, vol 1, pp 121–167
4. Coscia M, Giannotti F, Pedreschi D (2011) A classification for community discovery methods in complex networks. In: Statistical Analysis and Data Mining, Wiley Online Library, 4(5):512–546
5. Danezis G (2009) Inferring privacy policies for social networking services. In: Proceedings of the 2nd ACM workshop on security and artificial intelligence, Chicago. ACM, pp 5–10
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献