1 |
Chungha Kim and Seog Park, "Detecting privacy leak using adjacent nodes in social network," Korea Computer Congress, 39(1-C), pp.131-133, June. 2012.
|
2 |
G. Wondracek, Tholz, E, Kirda, and C. Kruegel, "A Practical Attack to De - anonymize Social Network Users," IEEE Symposium on Security and Privacy, vol,0, pp. 223 - 238, May. 2010.
|
3 |
Ming Li, Ning Cao, Shucheng Yu, and Wenjing Lou, "FindU: Privacy - Preserving Personal Profile Matching in Mobile Social Network," In Proc. of IEEE INFOCOM'11, Shanghai, China, pp. 2435-2443, Apr. 2011.
|
4 |
W3C, "The Platform for Privacy Pre- ferences 1.0(P3P1.0) Specification" http://www.w3.org/TR/P3P/. April. 2002.
|
5 |
IBM, EPAL v1.2. http://www.zurich.ibm.com/security/enterprise-privacy/epal/Specification/index.html
|
6 |
OASIS, "eXtensible Access Control Mark Language(XACML) V2.0" Committee draft 04, Dec. 2004.
|
7 |
Jihye Kim and Hyunghyo Lee, "Implementation of Privacy Protection Policy Language and Module For Social Network Services," Journal of The korea Institute of Information Security and Cryptology, 21(1), pp. 53-63, Feb. 2011.
|
8 |
Ministry of Public Administration and Security(MOSPA).Korea Internet and Security Agency(KISA), "Perform manual of Privacy Impact Assessment in public authorities", pp. 31, 2011
|
9 |
S. Wasserman, "Social network analysis: methods and applications," Cambridge University Press, Nov. 1994.
|