소셜 네트워크 서비스를 위한 선별적 암호화 기능을 제공하는 관계 기반 동적 접근제어 모델

논문상세정보
' 소셜 네트워크 서비스를 위한 선별적 암호화 기능을 제공하는 관계 기반 동적 접근제어 모델' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 전자공학
  • access control
  • privacy
  • proxy re-encryption
  • reliability evaluation
  • social network service
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
3,064 0

0.0%

' 소셜 네트워크 서비스를 위한 선별적 암호화 기능을 제공하는 관계 기반 동적 접근제어 모델' 의 참고문헌

  • 소셜네트워크에서 신뢰의 전이성과 결합성에 관한 연구
    송희석 Journal of Information Technology Applications & Management 18 (4) : 41 ~ 53 [2011]
  • 소셜 네트워크 서비스에서의 동적 사용자 신뢰도 평가 스킴
    이창훈 정보보호학회논문지 23 (2) : 157 ~ 168 [2013]
  • “Towards trust in digital rights management systems,”Trust and Privacy in Digital Business
    J Nützel LNCS 4083 : 162 ~ 171 [2006]
  • “Affine pairings on ARM,”Pairing - Based Cryptography, Pairing 2012 5th International Conference
    T Acar LNCS 7708 : 203 ~ 209 [2012]
  • “A user -to-user relationship-based access control model for online social networks,”Data and Applications Security and Privacy XXVI
    Y Cheng LNCS 7371 : 8 ~ 24 [2012]
  • Why people use social networking sites : an empirical study integrating network externalities and motivation theory
    KY Lin Computers in Human Behavior 27 (3) : 1152 ~ 1161 [2011]
  • Social network sites: definition, history, and scholarship
    NB Ellison Journal of Computer‐Mediated Communication 13 (1) : 210 ~ 230 [2007]
  • Semantic web-based social network access control
    B Carminati computers & security 30 (2) : 108 ~ 115 [2010]
  • Security issues and recommendations for online social networks
    G Hogben [2007]
  • Securing electronic medical records using attribute-based encryption on mobile devices
    J. A. Akinyele 1st ACM workshop on security and privacy in smartphones and mobile devices : 75 ~ 86 [2011]
  • Relationship -based access control policies and their policy languages
    PW.L. Fong 6th ACM symposium on Access control models and technologies : 51 ~ 60 [2011]
  • Privacy and security for online social networks: challenges and opportunities
    C Zhang IEEE Network 24 (4) : 13 ~ 18 [2010]
  • Persona: an online social network with user-defined privacy
    R Baden ACM SIGCOMM Computer Communication Review 39 (4) : 135 ~ 146 [2009]
  • Online social network with flexible and dynamic privacy policies
    F Raji CSI International Symposium on. IEEE [2011]
  • On the leakage of personally identifiable information via online social networks
    B Krishnamurthy 2nd ACM workshop on Online social networks : 7 ~ 12 [2009]
  • NOYB : Privacy in online social networks
    S Guha 1st workshop on Online social networks ACM : 49 ~ 54 [2008]
  • Measuring message propagation and social influence on Twitter. com
    S Ye LNCS 6430 : 216 ~ 231 [2010]
  • Information Revelation and Privacy in On-line Social Networks
    Acquisti, A. Gross, R. ACM workshop on Privacy in the electronic society : 71 ~ 80 [2005]
  • Improved proxy re-encryption schemes with applications to secure distributed storage
    G Ateniese ACM Transactions on Information and System Security 9 (1) : 1 ~ 30 [2006]
  • How to share a secret
    A. Shamir Communications of the ACM 22 (11) : 612 ~ 613 [1979]
  • Four degrees of separation
    L Backstrom 3rd Annual ACM Web Science Conference : 33 ~ 42 [2012]
  • Flybynight:mitigating the privacy risks of social networking
    MM. Lucas 7th ACM workshop on Privacy in the electronic society : 1 ~ 8 [2008]
  • Facebook and online privacy: attitudes, behaviors, and unintended consequences
    B Debatin Journal of Computer‐Mediated Communication 15 (1) : 83 ~ 108 [2009]
  • EASiER: Encryption-based access control in social networks with efficient revocation
    S Jahid 6th ACM Symposium on Information, Computer and Communications Security : 411 ~ 415 [2011]
  • All friends are not created equal: an interaction intensity based approach to privacy in online social networks
    L Banks CSE 09. International Conference on IEEE 4 : 970 ~ 974 [2009]
  • Acon:activity-centric access control for social computing
    J Park Availability, Reliability and Security (ARES), 2011 Sixth International Conference on IEEE : 242 ~ 247 [2011]
  • A user-activity-centric framework for access control in online social networks
    J Park Internet Computing 15 (5) : 62 ~ 65 [2011]