Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference70 articles.
1. Abdulla, A.K., Bakiras, S.: HITC data privacy in online social networks with fine-grained access control. 123–134. https://doi.org/10.1145/3322431.3325104.
2. Ahmad, A., Whitworth, B., Zeshan, F., Bertino, E., Friedman, R.: Extending social networks with delegation. Computers & Security. 70, 546–564 (2017)
3. Ahmad, A., Whitworth, B., Zeshan, F., Janczewski, L., Ali, M., Chaudary, M.H., Friedman, R.: A relation-aware multiparty access control. Journal of Intelligent & Fuzzy Systems. 37(1), 227–239 (2019)
4. Ali, A., Habiba, U., Shibli, M.A.: Taxonomy of delegation model. In: 2015 12th international conference on information technology-new generations 2015, pp. 218-223. IEEE
5. Baek, S., Kim, S.: Trust-based access control model from sociological approach in dynamic online social network environment. Sci. World J. 2014, 1–8 (2014)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Privacy-Preserving Evolutionary Computation Framework for Feature Selection;Web Information Systems Engineering – WISE 2023;2023
2. Truthfully Negotiating Usage Policy for Data Sovereignty;2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2022-12
3. A framework for the application of socio-technical design methodology;Ethics and Information Technology;2022-10-25
4. A smart access control mechanism based on user preference in online social networks;Concurrency and Computation: Practice and Experience;2022-02