Author of the publication

An Access Control Model for Online Social Networks Using User-to-User Relationships.

, , and . IEEE Trans. Dependable Secur. Comput., 13 (4): 424-436 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modified electric current perturbation (ECP) characterization for a circular aperture., and . IEEE Trans. Instrumentation and Measurement, 55 (1): 212-218 (2006)Local Intermolecular Order Controls Photoinduced Charge Separation at Donor/Acceptor Interfaces in Organic Semiconductors, , , , , , , and . Advanced Energy Materials, 6 (6): n/a--n/a (2016)Classifying and Comparing Attribute-Based and Relationship-Based Access Control., , and . CODASPY, page 59-70. ACM, (2017)An Efficient Logic Equivalence Checker for Industrial Circuits., , , and . J. Electron. Test., 16 (1-2): 91-106 (2000)A User-Activity-Centric Framework for Access Control in Online Social Networks., , and . IEEE Internet Comput., 15 (5): 62-65 (2011)Properties of reionization-era galaxies from JWST luminosity functions and 21-cm interferometry, , , and . (2019)cite arxiv:1909.01348Comment: 10 pages, 6 figures, 1 table, submitted to MNRAS.Formal model and policy specification of usage control., , , and . ACM Trans. Inf. Syst. Secur., 8 (4): 351-387 (2005)The UCONABC usage control model., and . ACM Trans. Inf. Syst. Secur., 7 (1): 128-174 (2004)An Analysis of Cybersecurity Legislation and Policy Creation on the State Level., , , , , and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 30-43. Springer, (2019)A logical specification for usage control., , , and . SACMAT, page 1-10. ACM, (2004)