1. Ahn Y Y, Han S, Kwak H, et al. Analysis of topological characteristics of huge online social networking services. Proceedings of the 16th International World Wide Web Conference (WWW’07), May 8?12, 2007, Banff, Canada. New York, NY, USA: ACM, 2007: 835?844 2. Raji F, Miri A, Jazi M D. CP2: cryptographic privacy protection framework for online social networks. Computers and Electrical Engineering, 2013, 39(7): 2282?2298 3. Shuai H, Zhu W T. Masque: Access control for interactive sharing of encrypted data in social networks. Proceedings of the 6th International Conference on Network and System Security (NSS’12), Nov 21?23, 2012, Wuyishan, China. Heidelberg, Germany: Springer-Verlag, 2012: 503?515 4. Zhang Z Y. Frontier and methodologies on digital rights management for multimedia social networks. International Journal of Digital Content Technology and Its Applications, 2012, 6(9): 245?249 5. Muller S, Katzenbeisser S. A new DRM architecture with strong enforcement. Proceedings of the 5th International Conference on Availability, Reliability, and Security (ARES’10), Feb 15?18, 2010, Krakow, Poland. Piscataway, NJ, USA: IEEE, 2010: 397?403 6. Kim H, Park S, Park J H, et al. Attribute-based encryption for commercial content distribution. Proceedings of International Conference on IT Convergence and Security (ICITCS’12), Dec 5?7, 2012, Pyeong Chang, Republic of Korea. Heidelberg, Germany: Springer-Verlag, 2013: 205?213 7. Tran D H, Nguyen H L, Zha W, et al. Towards security in sharing data on cloud-based social networks. Proceedings of the 8th International Conference on Information, Communications and Signal Processing (ICICS’11), Dec 13?16, 2011, Singapore. Piscataway, NJ, USA: IEEE, 2011: 5p 8. Dien N M, Hwang J, Yoo M. A new framework for secure sharing data on cloud-based social networks. Proceedings of the 2012 International Conference on ICT Convergence (ICTC’12), Oct 15?17, 2012, Jeju Island, Republic of Korea. Washington, DC, USA: IEEE, 2012: 333?335 9. Qiu Q, Tang Z, Li F, et al. A personal DRM scheme based on social trust. Chinese Journal of Electronics, 2012, 21(4): 719?724 10. Baden R, Bender A, Spring N, et al. Persona: An online social network with user-defined privacy. Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication (SIGCOMM’09), Aug 17?21, 2009, Barcelona, Spain. New York, NY, USA: ACM, 2009: 135?146 11. Jahid S, Mittal P, Borisov N. EASiER: encryption-based access control in social networks with efficient revocation. Proceedings of the 6th International Symposium on Information, Computer and Communications Security (ASIACCS’11), Mar 22?24, 2011, Hong Kong, China. New York, NY, USA: ACM, 2011: 411?415 12. Guo L, Zhang C, Yue H, et al. A privacy-preserving social-assisted mobile content dissemination scheme in DTNs. Proceedings of the 32nd IEEE Conference on Computer Communications (INFOCOM’13), Apr 14?19, 2013, Turin, Italy. Piscataway, NJ, USA: IEEE, 2013: 2301?2309 13. Shuai H, Zhu W T, Liu X. Publishing and sharing encrypted data with potential friends in online social networks. Chen H H, Sharif H R.Security and Communication Networks. New York, NY, USA: wiley, 2013: DOI: 10.1002/sec.806 14. Hu H, Ahn G. Multiparty authorization framework for data sharing in online social networks. Proceedings of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’11), Jul 11?13, 2011, Richmond, VA, USA. Heidelberg, Germany: Springer-Verlag, 2011: 29?43 15. Hu H, Ahn G, Jorgensen J. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(7): 1614?1627 16. Benaloh J, Leichter J. Generalized secret sharing and monotone functions. Advances in Cryptology: Proceedings of the 8th Annual International Cryptology Conference (Crypto’88), Aug 21?25, 1988, Santa Barbara, CA, USA. LNCS 403. Berlin, Germany: Springer-Verlag, 1989: 27?35 17. Hur J, Park C, Hwang S O. Privacy-preserving identity-based broadcast encryption. Information Fusion, 2012, 13(4): 296?303 18. Zhao J, Feng D, Zhang Z. Attribute-based conditional proxy re-encryption with chosen-ciphertext security. Proceedings of the 2010 IEEE Global Telecommunications Conference (GLOBECOM’10), Dec 6?10, 2010, Miami, FL, USA. Piscataway, NJ, USA: IEEE, 2010: 6p 19. Ibraimi L, Asim M, Petkovic M. An encryption scheme for a secure policy updating. Proceedings of the 7th International Joint Conference on e-Business and Telecommunications (ICETE’10), Jul 26?28, 2010, Athens, Greece. Heidelberg, Germany: Springer-Verlag, 2010: 304?318 |