A survey on interdependent privacy

M Humbert, B Trubert, K Huguenin - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
The privacy of individuals does not only depend on their own actions and data but may also
be affected by the privacy decisions and by the data shared by other individuals. This …

Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

Social network security: Issues, challenges, threats, and solutions

S Rathore, PK Sharma, V Loia, YS Jeong, JH Park - Information sciences, 2017 - Elsevier
Social networks are very popular in today's world. Millions of people use various forms of
social networks as they allow individuals to connect with friends and family, and share …

Petuum: A new platform for distributed machine learning on big data

EP **ng, Q Ho, W Dai, JK Kim, J Wei, S Lee… - Proceedings of the 21th …, 2015 - dl.acm.org
How can one build a distributed framework that allows efficient deployment of a wide
spectrum of modern advanced machine learning (ML) programs for industrial-scale …

How does social software change knowledge management? Toward a strategic research agenda

G Von Krogh - The Journal of Strategic Information Systems, 2012 - Elsevier
Knowledge management is commonly understood as IS implementations that enable
processes of knowledge creation, sharing, and capture. Knowledge management at the firm …

Relationship-based access control: protection model and policy language

PWL Fong - Proceedings of the first ACM conference on Data and …, 2011 - dl.acm.org
Social Network Systems pioneer a paradigm of access control that is distinct from traditional
approaches to access control. Gates coined the term Relationship-Based Access Control …

Building trust/distrust relationships on signed social service network through privacy-aware link prediction process

H Kou, H Liu, Y Duan, W Gong, Y Xu, X Xu, L Qi - Applied Soft Computing, 2021 - Elsevier
With the ever-increasing popularity of social software, we can easily establish a signed
social n etwork (SSN) by capturing users' attitudes (ie, trust/distrust, friend/enemies …

Reality and perception of copyright terms of service for online content creation

C Fiesler, C Lampe, AS Bruckman - … of the 19th ACM conference on …, 2016 - dl.acm.org
From amateur creativity to social media status updates, nearly every Internet user is also a
content creator-but who owns that content? Policy, including intellectual property rights, is a …

Influencing photo sharing decisions on social media: A case of paradoxical findings

MJ Amon, R Hasan, K Hugenberg… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We investigate the effects of perspective taking, privacy cues, and portrayal of photo subjects
(ie, photo valence) on decisions to share photos of people via social media. In an online …

Relationship-based access control policies and their policy languages

PWL Fong, I Siahaan - Proceedings of the 16th ACM symposium on …, 2011 - dl.acm.org
The Relationship-Based Access Control (ReBAC) model was recently proposed as a
general-purpose access control model. It supports the natural expression of parameterized …