[1] |
HU H , AHN G J , JORGENSEN J . Multiparty access control for online social networks:model and mechanisms[J]. IEEE Transactions on Knowledge and Data Engineering, 2013,25(7): 1614-1627.
|
[2] |
ILIA P , POLAKIS I , ATHANASOPOULOS E ,et al. Face/off:preventing privacy leakage from photos in social networks[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 781-792.
|
[3] |
VISHWAMITRA N , LI Y , WANG K ,et al. Towards PII-based multiparty access control for photo sharing in online social networks[C]// The 22nd ACM on Symposium on Access Control Models and Technologies. 2017: 155-166.
|
[4] |
XU K , GUO Y , GUO L ,et al. My privacy my decision:control of photo sharing on online social networks[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(2): 199-210.
|
[5] |
LI F , LI Z , HAN W ,et al. Cyberspace-oriented access control:a cyberspace characteristics based model and its policies[J]. IEEE Internet of Things Journal, 2018,6(2): 1471-1483.
|
[6] |
LI F , SUN Z , NIU B ,et al. HideMe:privacy-preserving photo sharing on social networks[C]// The 38th IEEE International Conference on Computer Communications. 2019: 154-162.
|
[7] |
RA M R , GOVINDAN R , ORTEGA A . P3:toward privacy-preserving photo sharing[C]// The 10th USENIX Symposium on Networked Systems Design and Implementation. USENIX, 2013: 515-528.
|
[8] |
ZHANG L , JUNG T , LIU C ,et al. Pop:privacy-preserving outsourced photo sharing and searching for mobile devices[C]// The 35th IEEE International Conference on Distributed Computing Systems. 2015: 308-317.
|
[9] |
HE J , LIU B , KONG D ,et al. Puppies:transformation-supported personalized privacy preserving partial image sharing[C]// The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 2016: 359-370.
|
[10] |
SUN W , ZHOU J , ZHU S ,et al. Robust privacy-preserving image sharing over online social networks (OSNs)[J]. ACM Transactions on Multimedia Computing,Communications,and Applications, 2018,14(1):14.
|
[11] |
李晖 . 隐私计算—面向隐私保护的新型计算[J]. 信息通信技术, 2018,12(6): 4-6.
|
|
LI H . Privacy computing:a new computing model for privacy preserving[J]. Information and Communications Technologies, 2018,12(6): 4-6.
|
[12] |
KARJOTH G , SCHUNTER M , WAIDNER M . Platform for enterprise privacy practices:privacy-enabled management of customer data[C]// Springer International Workshop on Privacy Enhancing Technologies. 2002: 69-84.
|
[13] |
薛见新, 申德荣, 寇月 ,等. 面向数据融合的半环溯源计算方法[J]. 计算机研究与发展, 2016,53(2): 316-325.
|
|
XUE J X , SHEN D R , KOU Y ,et al. Semiring provenance for data fusion[J]. Journal of Computer Research and Development, 2016,53(2): 316-325.
|
[14] |
王梁, 周光焱, 王黎维 ,等. 不确定关系数据属性级溯源表示与概率计算[J]. 软件学报, 2014,25(4): 863-879.
|
|
WANG L , ZHOU G Y , WANG L W ,et al. Attribute level lineage and probabilistic computation of uncertain data[J]. Journal of Software, 2014,25(4): 863-879.
|
[15] |
SUN L , PARK J , NGUYEN D ,et al. A provenance-aware access control framework with typed provenance[J]. IEEE Transactions on Dependable and Secure Computing, 2016,13(4): 411-423.
|
[16] |
张聿博, 张锡哲, 张斌 . 面向社交网络信息源定位的观察点部署方法[J]. 软件学报, 2014,25(12): 2837-2851.
|
|
ZHANG Y B , ZHANG X Z , ZHANG B . Observer deployment method for locating the information source in social network[J]. Journal of Software, 2014,25(12): 2837-2851.
|
[17] |
付安民, 秦宁元, 宋建业 ,等. 云端多管理者群组共享数据中具有隐私保护的公开审计方案[J]. 计算机研究与发展, 2015,52(10): 2353-2362.
|
|
FU A M , QIN N Y , SONG J Y ,et al. Privacy-preserving public auditing for multiple managers shared data in the cloud[J]. Journal of Computer Research and Development, 2015,52(10): 2353-2362.
|
[18] |
SUCH J M , CRIADO N . Resolving multi-party privacy conflicts in social media[J]. IEEE Transactions on Knowledge and Data Engineering, 2016,28(7): 1851-1863.
|
[19] |
XU Y , PRICE T , FRAHM J M ,et al. Virtual U:defeating face liveness detection by building virtual models from your public photos[C]// The 25th USENIX Security Symposium. 2016: 497-512.
|
[20] |
FOGUES R L , MURUKANNAIAH P K , SUCH J M ,et al. Sharing policies in multiuser privacy scenarios:Incorporating context,preferences,and arguments in decision making[J]. ACM Transactions on Computer-Human Interaction, 2017,24(1):5.
|
[21] |
LI F , SUN Z , NIU B ,et al. SRIM scheme:an impression-management scheme for privacy-aware photo-sharing users[J]. Engineering, 2018,4(1): 85-93.
|
[22] |
YUAN X , WANG X , WANG C ,et al. Enabling privacy-preserving image-centric social discovery[C]// The 34th IEEE International Conference on Distributed Computing Systems. IEEE, 2014: 198-207.
|
[23] |
HE J , LIU B , BAO X ,et al. On privacy preserving partial image sharing[C]// The 35th IEEE International Conference on.Distributed Computing Systems. IEEE, 2015: 758-759.
|
[24] |
FERREIRA B , RODRIGUES J , LEITAO J ,et al. Privacy-preserving content-based image retrieval in the cloud[C]// The 34th IEEE Symposium on Reliable Distributed Systems. IEEE, 2015: 11-20.
|
[25] |
YUAN L , KORSHUNOV P , EBRAHIMI T . Secure JPEG scrambling enabling privacy in photo sharing[C]// The 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition. IEEE, 2015,4: 1-6.
|
[26] |
NOURIAN A , MAHESWARAN M . Privacy aware image template matching in clouds using ambient data[J]. The Journal of Supercomputing, 2013,66(2): 1049-1070.
|
[27] |
PEARSON S , MONT M C , KOUNGA G . Enhancing accountability in the cloud via sticky policies[C]// Springer FTRA International Conference on Secure and Trust Computing,Data Management,and Application. 2011: 146-155.
|
[28] |
SPYRA G , BUCHANAN W J , EKONOMOU E . Sticky policies approach within cloud computing[J]. Elsevier Computers & Security, 2017,70: 366-375.
|
[29] |
PARK J , NGUYEN D , SANDHU R . A provenance-based access control model[C]// The 10th Annual International Conference on Privacy,Security and Trust. 2012: 137-144.
|
[30] |
BATES A M , TIAN D , BUTLER K R B ,et al. Trustworthy whole-system provenance for the Linux kernel[C]// The 24th USENIX security symposium. USENIX, 2015: 319-334.
|
[31] |
李彪 . 微博中热点话题的内容特质及传播机制研究——基于新浪微博 6025 条高转发微博的数据挖掘分析[J]. 中国人民大学学报, 2013,27(5): 10-17.
|
|
LI B . Research on content characteristics and communication mechanism of hot topics in weibo--data mining and analysis based on sina weibo 6025 highly retweeted microblogs[J]. Journal of Renmin University of China, 2013,27(5): 10-17.
|
[32] |
ZHANG L , BO C , HOU J ,et al. Kaleido:you can watch it but cannot record it[C]// The 21st ACM Annual International Conference on Mobile Computing and Networking . 2015: 372-385.
|