Author of the publication

User Controlled Privacy for Filtering the Web of Data with a User-Friendly Manager.

, , and . I-SEMANTICS (Posters & Demos), volume 932 of CEUR Workshop Proceedings, page 43-47. CEUR-WS.org, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fine-Grained Access Control for RDF Data on Mobile Devices., , , , , and . WISE (1), volume 8180 of Lecture Notes in Computer Science, page 478-487. Springer, (2013)In users we trust: towards social user interactions based Trust Assertions for the Social Semantic Web., and . Soc. Netw. Anal. Min., 4 (1): 229 (2014)Towards Privacy Aware Social Semantic Digital Libraries., and . ELPUB, page 160-162. IOS Press, (2015)A holistic approach for semantic-based game generation., , and . CIG, page 1-8. IEEE, (2016)Analysing Mobile VR Games for Learning a Sport: A Pistol Target Shooting VR Game Use Case., and . FDG, page 91:1-91:4. ACM, (2020)Exploiting semantic web techniques for representing and utilising Folksonomies., and . MSM, page 9:1-9:8. ACM, (2010)PPO & PPM 2.0: extending the privacy preference framework to provide finer-grained access control for the web of data., and . I-SEMANTICS, page 80-87. ACM, (2012)Extending Linked USDL by Trust Assertion., , , and . iiWAS, page 377-384. ACM, (2019)Using dates as contextual information for personalised cultural heritage experiences., , , , , , and . J. Inf. Sci., (2021)"I Like" - Analysing Interactions within Social Networks to Assert the Trustworthiness of Users, Sources and Content., and . SocialCom, page 512-519. IEEE Computer Society, (2013)