Sciweavers

23988 search results - page 205 / 4798
» Social Network Computing
Sort
View
168
Voted
CODASPY
2011
14 years 7 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
117
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
100
Voted
ISIWI
1998
15 years 5 months ago
SO-grams: a personal visualisation toolkit for intranet users
Background The origins of the social browser concept Level one: 'draw and describe' Level two: 'draw and describe' and 'point and click' Level three:...
Elisabeth Davenport, Kathy Buckner
124
Voted
HICSS
2010
IEEE
172views Biometrics» more  HICSS 2010»
15 years 10 months ago
Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA
Worldwide social networks, like Facebook, face fierce competition from local platforms when expanding globally. To remain attractive social network providers need to encourage use...
Hanna Krasnova, Natasha F. Veltri
113
Voted
WWW
2010
ACM
15 years 3 months ago
SNDocRank: document ranking based on social networks
To improve the search results for socially-connect users, we propose a ranking framework, Social Network Document Rank (SNDocRank). This framework considers both document contents...
Liang Gou, Hung-Hsuan Chen, Jung-Hyun Kim, Xiaolon...