[1] 张志勇, 裴庆祺, 杨林, 等. 支持验证代理方的远程证明模型及其安全协议[J]. 西安电子科技大学学报, 2009, 36(1): 58-63.
Zhang Zhiyong, Pei Qingqi, Yang Lin, et al. Attestation Proxy Party-supported Remote Attestation Model and Its Secure Protocol [J]. Journal of Xidian University, 2009, 36(1): 58-63.
[2] Kim K, Hong S, Kim J Y. A Study on Policy-based Access Control Model in SNS[J]. International Journal of Multimedia and Ubiquitous Engineering, 2012, 7(3): 143-150.
[3] Park J, Sandhu R, Cheng Y. A User-Activity-Centric Framework for Access Control in Online Social Networks[J]. IEEE Internet Computing, 2011, 15(5): 62-65.
[4] 任方, 马建峰, 郝选文. 物联网感知层一种基于属性的访问控制机制[J]. 西安电子科技大学学报, 2012, 39(2): 66-72.
Ren Fang, Ma Jianfeng, Hao Xuanwen. Attribute-based Access Control Scheme for the Perceptive Layer of the Internet of Things[J]. Journal of Xidian University, 2012, 39(2): 66-72.
[5] Ali B, Villegas W, Maheswaran M. A Trust Based Approach for Protecting User Data in Social Networks[C]//Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research. New York: ACM, 2007: 288-293.
[6] Kruk S R, Grzonkowski S, Gzella A, et al. D-FOAF: Distributed Identity Management with Access Rights Delegation[M]. Heidelberg: Springer, 2006: 140-154.
[7] Wang H, Sun L. Trust-involved Access Control in Collaborative Open Social Networks[C]//Proceedings of 4th International Conference on Network and System Security. Piscataway: IEEE, 2010: 239-246.
[8] Villegas W. A Trust-based Access Control Scheme for Social Networks[D]. Montreal: McGill University , 2008.
[9] Ding J, Mo L. Enforcement of Role Based Access Control in Social Network Environments[C]//IEEE Sixth International Conference on Software Security and Reliability Companion. Piscataway: IEEE, 2012: 92-101.
[10] Zhang ZY, Wang KL. A Trust Model for Multimedia Social Networks[J]. Social Networks Analysis and Mining (Springer), 2013, 3(4): 969-979.
[11] Sachan A, Emmanuel S, Kankanhalli M S. An Efficient Access Control Method for Multimedia Social Networks[C]//Proceedings of Second ACM SIGMM Workshop on Social Media. New York: ACM, 2010: 33-38.
[12] Carminati B, Ferrari E, Perego A. Rule-based Access Control for Social Networks[C]//Lectures Notes in Computer Science: 4278. Heidelberg: Springer Verlag, 2006: 1734-1744. |