共 31 条
[1]
[Anonymous], 2012, P 8 ACM S US PRIV SE
[2]
[Anonymous], 2014, THESIS
[3]
Beach A., 2009, P 12 IEEE INT C COMP
[4]
Bennett Phillipa., 2015, Proceedings of the Eighth International C* Conference on Computer Science Software Engineering, P1
[5]
Bruns Glenn., 2012, Proceedings of the second CODASPY, P117, DOI DOI 10.1145/2133601.2133616
[6]
Carminati B, 2006, LECT NOTES COMPUT SC, V4278, P1734
[8]
Cheng Y, 2012, LECT NOTES COMPUT SC, V7371, P8, DOI 10.1007/978-3-642-31540-4_2
[9]
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships
[J].
PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012),
2012,
:646-655
[10]
Dougherty Chad, PRACTICAL IDENTIFICA