Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on interdependent privacy
M Humbert, B Trubert, K Huguenin - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
The privacy of individuals does not only depend on their own actions and data but may also
be affected by the privacy decisions and by the data shared by other individuals. This …
be affected by the privacy decisions and by the data shared by other individuals. This …
Survey on access control for community-centered collaborative systems
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …
collaborative systems and platforms. These systems and platforms aim to provide an …
Social network security: Issues, challenges, threats, and solutions
Social networks are very popular in today's world. Millions of people use various forms of
social networks as they allow individuals to connect with friends and family, and share …
social networks as they allow individuals to connect with friends and family, and share …
Petuum: A new platform for distributed machine learning on big data
How can one build a distributed framework that allows efficient deployment of a wide
spectrum of modern advanced machine learning (ML) programs for industrial-scale …
spectrum of modern advanced machine learning (ML) programs for industrial-scale …
How does social software change knowledge management? Toward a strategic research agenda
G Von Krogh - The Journal of Strategic Information Systems, 2012 - Elsevier
Knowledge management is commonly understood as IS implementations that enable
processes of knowledge creation, sharing, and capture. Knowledge management at the firm …
processes of knowledge creation, sharing, and capture. Knowledge management at the firm …
Relationship-based access control: protection model and policy language
PWL Fong - Proceedings of the first ACM conference on Data and …, 2011 - dl.acm.org
Social Network Systems pioneer a paradigm of access control that is distinct from traditional
approaches to access control. Gates coined the term Relationship-Based Access Control …
approaches to access control. Gates coined the term Relationship-Based Access Control …
Building trust/distrust relationships on signed social service network through privacy-aware link prediction process
With the ever-increasing popularity of social software, we can easily establish a signed
social n etwork (SSN) by capturing users' attitudes (ie, trust/distrust, friend/enemies …
social n etwork (SSN) by capturing users' attitudes (ie, trust/distrust, friend/enemies …
Reality and perception of copyright terms of service for online content creation
From amateur creativity to social media status updates, nearly every Internet user is also a
content creator-but who owns that content? Policy, including intellectual property rights, is a …
content creator-but who owns that content? Policy, including intellectual property rights, is a …
Influencing photo sharing decisions on social media: A case of paradoxical findings
We investigate the effects of perspective taking, privacy cues, and portrayal of photo subjects
(ie, photo valence) on decisions to share photos of people via social media. In an online …
(ie, photo valence) on decisions to share photos of people via social media. In an online …
Relationship-based access control policies and their policy languages
The Relationship-Based Access Control (ReBAC) model was recently proposed as a
general-purpose access control model. It supports the natural expression of parameterized …
general-purpose access control model. It supports the natural expression of parameterized …