1 |
B. Carminati, E. Ferrari, and A. Perego, "Rule-based access control for social networks," On the Move to Meaningful Internet System, LNCS 4278, pp. 1734-1744, 2006.
|
2 |
B. Carminati, E. Ferrari, and A. Perego, "Private relationships in social networks," Proceedings of IEEE International Conference on Data Engineering Workshop, pp. 163-171, Apr. 2007.
|
3 |
B. Carminati and E. Ferrari, "Privacy-aware collaborative access control in web-based social networks," Data and Applications Security X XII, LNCS 5094, pp. 81-96, 2008.
|
4 |
J. Domingo-Ferrer, "A public-key protocol for social networks with private relationships," Modeling Decisions for Artificial Intelligence, LNAI 4617, pp. 373-379, 2007.
|
5 |
V. Alexandre, J. Domingo-Ferrer, S. Francesc, and G.N. Ursula, "Privacy homomorphisms for social networks with private relationships," Elsevier, Computer Networks, vol. 52, no. 15, pp. 3007-3016, Oct. 2008.
DOI
ScienceOn
|
6 |
K.B. Frikken and P. Srinivas, "Key allocation schemes for private social networks," Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, pp. 11-20, Nov. 2009.
|
7 |
M.J. Atallah, M. Blanton, N. Fazio, and K.B. Frikken, "Dynamic and efficient key management for access hierarchies," ACM Transactions on Information and System Security, vol. 12, no. 3, pp. 18-43, Jan. 2009.
|
8 |
B. Applebaum, D. Cash, C. Peikert, and A. Sahai, "Fast cryptographic primitives and circular-secure encryption based on hard learning problems," Advanced in Cryptology, CRYPTO'09, LNCS 5677, pp. 595-618, 2009.
|