[1] |
Facebook fact sheet and statistics[EB/OL]. , 2011.
|
[2] |
SQUICCIARINI A , PACI F , SUNDARESWARAS N . PriMa:an effective privacy protection mechanism for social networks[A]. Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security[C]. Beijing,China, 2010. 320-323.
|
[3] |
WANG T , SRIVATSA M , LIU L . Fine-grained Access control of personal data[A]. ACM Symposium onAccess Control Models and Technologies[C]. Newark,New Jersey,USA, 2012. 145-156.
|
[4] |
LI J , TANG Y , MAO C ,et al. Role based access control for social network sites[A]. Proceedings of Joint Conferences on Pervasive Computing[C]. Taiwan,China, 2009. 389-394.
|
[5] |
CIRIO L , CRUZ I F , TAMASSIA R . A role and attribute based access control system using semantic web technologies[A]. Proceedings of International Federation for Information Processing Workshop on Semantic Web and Web Semantics[C]. Santiago,Chile, 2007. 1256-1266.
|
[6] |
YUAN E , TONG J . Attributed based access control(ABAC) for web services[A]. Proceedings of the IEEE International Conference on Web Services[C]. Orlando,Florida, 2005. 561-569.
|
[7] |
ADAM N , ATLURI V , BERTINO E ,et al. A Content-Based Authorization Model for Digital Libraries[R]. Computer Science Department,Rutgers University, 2001.
|
[8] |
CARMINATI B , FERRARI E , PEREGO A . Rule-based access control for social networks[A]. On the Move to Meaningful Internet Systems:OTM’06 Workshops[C]. Montpellier,France, 2006. 1734-1744.
|
[9] |
JAYARAMAN K , RINARD M C , TRIPUNITARA M ,et al. Automatic error finding in access-control policies[A]. Proceedings of 18th ACM Conference on Computer and Communications Security[C]. Chicago,USA, 2011. 17-21.
|
[10] |
ALBERTI F , ARMANDO A , RANISE S . Efficient symbolic automated analysis of administrative attribute-based RBACpolicies[A]. Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security[C]. Hong Kong,China, 2011. 165-175.
|
[11] |
ANWAR M , FANG P , YANG X D ,et al. Visualizing privacy implications of access control policies in social network systems[A]. Proceedings of the 27th Annual ACM Symposium on Applied Computing[C]. Trento,Italy, 2012. 1443-1450.
|
[12] |
周晓军, 蒋兴浩, 孙锬锋 . RB-RBAC模型的研究与改进[J]. 信息安全与通信保密, 2010,(4): 100-102. ZHOU X J , JIANG X H , SUN T F . Research and Improvement of RB-RBAC[J]. 2010,(4): 100-102.
|
[13] |
努尔买买提·黑力力, 开依沙尔·热合曼 . 带负授权RBAC模型的OWL表示及冲突检测[J]. 计算机工程与应用, 2010,46(30): 82-85. Nurmamat Helil , Kaysar Rahman . Representaion of RBAC model with negative authorization in OWL and conflict detection[J]. Computer Engineering and Applications, 2010,46(30): 82-85.
|
[14] |
李鼎 . 基于逻辑编程的安全策略分析系统设计及其关键技术研究[D]. 郑州:解放军信息工程大学, 2009. LI D . The Design and Research of Policy Analysis System Based on Logic Programming[D]. Zhengzhou:The PLA Information Engineering University, 2009.
|