1 |
Giuseppe Lugano, Pertti Saariluoma, "To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications," Proceedings of the User Modelling 2007 (UM2007), pp.440-444, 2007.
|
2 |
Leucio Antonio Cutillo, et al., Privacy Preserving Social Networking Through Decentralization
|
3 |
Elena Zheleva, et al., Preserving the Privacy of Sensitive Relationships in Graph Data
|
4 |
Blog, http://en.wikipedia.org/wiki/Blog, Wikipedia, 2012.
|
5 |
W. K.Wong, D.W.-l. Cheung, B. Kao, and N. Mamoulis, "Secure kNN computation on encrypted databases," Proceedings of the 35th ACM SIGMOD international conference on Management of data (SIGMOD '09), pp.139-152, 2009.
|
6 |
"웹 2.0 환경에서 사용되는 디지털 콘텐츠의 사용자 프라이버시 보호를 위한 RCBAC 모델," 조은애, 문창주, 박대하, 김정동, 강동수, 백두권, 한국디지털콘텐츠학회 논문지 : 제9권 제4호, pp.697-705, 2008.12.
|
7 |
Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik, "User Privacy Enhanced Access Control Model in Social Network Environment," Proceedings of the 2009 International Conference on Semantic Web and Web Services (SWWS), pp.128-133, Jul. 2009.
|
8 |
Eun-Ae Cho, Gabriel Ghinita, Elisa Bertino, "Privacy-Preserving Similarity Measurement for Access Control Policies," Proceedings of the ACM CCS2010 Workshop on Digital Identity Management (DIM '10), pp. 3-11, 2010.
|
9 |
조은애, 박대하, 문창주, "모바일 서비스 환경에서 정책의 프라이버시 보호를 위한 서비스 제공자 선택 프레임워크", 한국정보과학회 논문지 : 정보통신 제38권 제5호, pp.331-416, 2011.10.
|
10 |
D. Lin and et al, "An approach to Evaluate Policy Similarity," Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT'07), pp.1-10, 2007.
|
11 |
Dan Brickley and Libby Miller, "FOAF Vocabulary Specification 0.9," http://xmlns.com/foaf/0.1/, 2007.
|
12 |
XFN(XHTML Friends Network), http://en.wikipedia.org/wiki/XHTML_Friends_Network, Wikipedia, 2012.
|
13 |
Bishal Raj Karki, Arto Hämäläinen, and Jari Porras, "Social networking on mobile environment," Proceedings of the ACM/IFIP/USENIX Middleware '08 Conference Companion (Companion '08), pp.93-94, 2008.
|
14 |
Jari Porras, Petri Hiirsalmi and Ari Valtaoja, "Peer-to-Peer Communication Approach for a Mobile Environment," Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS'04), Vol.9, 2004.
|
15 |
Winnie Cheng, Jun Li, Keith Moore, Alan H. Karp, "MUPPET: Mobile Ubiquitous Privacy Protection for Electronic Transactions, In Hewlett-Packard Laboratories Technical Report HPL-2006-141R1, 2006.
|
16 |
L. Aaronson, "Your cell phone is so money," Popular Science, 2006.
|
17 |
NHN Corporation, http://www.nhncorp.com/, 2009.
|
18 |
W3C Mobile Web Initiative, http://www.w3.org/Mobile/, 2009.
|
19 |
Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik, "An Approach to Privacy Enhancement for Access Control Model in Web 3.0," Proceedings of the 3rd International Conference on Convergence and Hybrid Information Technology (ICCIT), Vol.2, pp.1046-1051, 2008.
|
20 |
Soren Preibusch, Alastair R. Beresford, "Privacy-Preserving Friendship Relations for Mobile Social Networking," W3C Workshop on the Future of Social Networking, 2009.
|