[1] |
刘建伟, 李为宇, 孙钰 . 社交网络安全问题及其解决方案[J]. 中国科学技术大学学报, 2011,41(7): 565-575.
|
|
LIU J W , LI W Y , SUN Y . Security issues and solutions on social networks[J]. Journal of University of Science &Technology of China, 2011,41(7): 565-575.
|
[2] |
ILIA P , POLAKIS I , ATHANASOPOULOS E ,et al. Face/off:preventing privacy leakage from photos in social networks[C]// ACM Sigsac Conference on Computer and Communications Security (CCS’2015). 2015: 781-792.
|
[3] |
BILTON N . Twitter implements do not track privacy option[N]. The New York Times, 2012-05-26.
|
[4] |
姚瑞欣, 李晖, 曹进 . 社交网络中的隐私保护研究综述[J]. 网络与信息安全学报, 2016,2(4): 33-43.
|
|
YAO R X , LI H , CAO J . Overview of privacy preserving in social network[J]. Chinese Journal of Network and Information Security, 2016,2(4): 33-43.
|
[5] |
GATES C E.Access control requirements for Web 2 , . 0 security and privacy[C]// IEEE Symposium Security and Privacy (SP’07). 2007: 249-256.
|
[6] |
CARMINATI B , FERRARI E . Enforcing relationships privacy through collaborative access control in web-based social networks[C]// IEEE International Conference on Collaborative Computing:Networking,Applications and Worksharing(COLLABORATECOM’09). 2009: 1-9.
|
[7] |
CARMINATI B , FERRARI E , HEATHERLY R ,et al. A semantic Web based framework for social network access control[C]// ACM Symposium on Access Control MODELS and Technologies(SACMAT’09). 2009: 177-186.
|
[8] |
FONG P W L , ANWAR M , ZHAO Z . A privacy preservation model for facebook-style social network systems[C]// European Symposium on Research in Computer Security(ESORICS’09). 2009: 303-320.
|
[9] |
FONG P W L , . Relationship-based access control:protection model and policy language[C]// ACM Conference on Data and Application Security and Privacy(CODASPY’11). 2011: 191-202.
|
[10] |
FONG P W L , SIAHAAN I . Relationship-based access control policies and their policy languages[C]// ACM Symposium on Access Control MODELS and Technologies(SACMAT’11). 2011: 51-60.
|
[11] |
BRUNS G , FONG P W L , SIAHAAN I ,et al. Relationship-based access control:its expression and enforcement through hybrid logic[C]// ACM Conference on Data and Application Security and Privacy(CODASPY’12). 2012: 117-124.
|
[12] |
PARK J , SANDHU R , CHENG Y . A user-activity-centric framework for access control in online social networks[J]. IEEE Internet Computing, 2011,15(5): 62-65.
|
[13] |
CHENG Y , PARK J , SANDHU R . A user-to-user relationship-based access control model for online social networks[C]// ACM Conference on Data and Applications Security and Privacy(CODASPY’12). 2012: 8-24.
|
[14] |
YUAN C , PARK J , SANDHU R . Relationship-based access control for online social networks:beyond user-to-user relationships[C]// International Conference on Privacy,Security,Risk and Trust (PASSAT’12). 2012: 646-655.
|
[15] |
PANG J , ZHANG Y . Cryptographic protocols for enforcing relationship-based access control policies[C]// IEEE Computer Software and Applications Conference(COMPSAC’15). 2015: 484-493.
|
[16] |
SHUAI H , ZHU W T . Masque:access control for interactive sharing of encrypted data in social networks[C]// International Conference on Network and System Security(NSS’12). 2012: 503-515.
|
[17] |
WELLMAN B , BERKOWITZ S D . Social structures:a network approach[J]. American Political Science Association, 1988,83(4).
|
[18] |
田立勤, 林闯 . 可信网络中一种基于行为信任预测的博弈控制机制[J]. 计算机学报, 2007,30(11): 1930-1938.
|
|
TIAN L Q , LIN C . A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network[J]. Chinese Journal of Computers, 2007,30(11): 1930-1938.
|
[19] |
YU J , WANG Y , LI J ,et al. Analysis of competitive information dissemination in social network based on evolutionary game model[C]// Cloud and Green Computing(CGC’12). 2012: 748-753.
|
[20] |
张胜兵, 蔡皖东, 李勇军 . 一种基于博弈论的社交网络访问控制方法[J]. 西北工业大学学报, 2011,29(4): 652-657.
|
|
ZHANG S B , CAI W D , LI Y J . A game-theory based access control method suitable for social network[J]. Journal of Northwestern Polytechnical University, 2011,29(4): 652-657.
|
[21] |
ZHU P , WEI G , VASILAKOS A V ,et al. Knowledge sharing in social network using game theory[M]. Springer Berlin Heidelberg, 2012.
|
[22] |
张伊璇, 何泾沙, 赵斌 ,等. 一个基于博弈理论的隐私保护模型[J]. 计算机学报, 2016,39(3): 615-627.
|
|
ZHANG Y X , HE J S , ZHAO B ,et al. A privacy protection model base on game theory[J]. Chinese Journal of Computers, 2016,39(3): 615-627.
|