


default search action
SocialCom/PASSAT 2010: Minneapolis, Minnesota, USA
- Ahmed K. Elmagarmid, Divyakant Agrawal:

Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom / IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010, Minneapolis, Minnesota, USA, August 20-22, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4211-9
SocialCom - The Second IEEE International Conference on Social Computing 2010
- Georg Groh, Alexander Lehmann, Jonas Reimers, Marc René Friess, Loren Schwarz:

Detecting Social Situations from Interaction Geometry. 1-8 - Cheng-Te Li, Man-Kwan Shan:

Team Formation for Generalized Tasks in Expertise Social Networks. 9-16 - Piotr Turek, Adam Wierzbicki

, Radoslaw Nielek, Albert Hupa, Anwitaman Datta:
Learning About the Quality of Teamwork from Wikiteams. 17-24 - Miao Jiang, William L. McGill:

Participatory Risk Management: Managing Community Risk Through Games. 25-32 - Meiqun Hu, Ee-Peng Lim

, Jing Jiang:
A Probabilistic Approach to Personalized Tag Recommendation. 33-40 - Farzana Rahman, Md. Endadul Hoque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed:

Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications. 41-48 - Beaux Sharifi, Mark-Anthony Hutton, Jugal K. Kalita:

Experiments in Microblog Summarization. 49-56 - Ji-Dong Yim, Sungkuk Chun, Keechul Jung, Christopher D. Shaw

:
Development of Communication Model for Social Robots Based on Mobile Service. 57-64 - Yuhong Liu, Yan Sun:

Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis. 65-72 - Walter Bamberger, Josef Schlittenlacher, Klaus Diepold:

A Trust Model for Intervehicular Communication Based on Belief Theory. 73-80 - Louis Yu, Valerie King:

The Evolution of Friendships in Chinese Online Social Networks. 81-87 - Scott A. Golder, Sarita Yardi:

Structural Predictors of Tie Formation in Twitter: Transitivity and Mutuality. 88-95 - Huajing Li, Yuan Tian, Wang-Chien Lee, C. Lee Giles

, Meng-Chang Chen:
Personalized Feed Recommendation Service for Social Networks. 96-103 - Mark K. Goldberg, Stephen Kelley, Malik Magdon-Ismail, Konstantin Mertsalov, Al Wallace:

Finding Overlapping Communities in Social Networks. 104-113 - Whitman Richards, Owen Macindoe:

Decomposing Social Networks. 114-119 - Telmo L. T. Menezes

, Camille Roth, Jean-Philippe Cointet
:
Precursors and Laggards: An Analysis of Semantic Temporal Relationships on a Blog Network. 120-127 - Kyong Jin Shim

, Jaideep Srivastava
:
Team Performance Prediction in Massively Multiplayer Online Role-Playing Games (MMORPGs). 128-136 - Dawei Shen, Coco Krumme, Andrew Lippman:

Follow the Profit or the Herd? Exploring Social Effects in Peer-to-Peer Lending. 137-144 - Lingzhi Luo, Nilanjan Chakraborty, Katia P. Sycara:

Prisoner's Dilemma in Graphs with Heterogeneous Agents. 145-152 - Satyen Abrol, Latifur Khan

:
Tweethood: Agglomerative Clustering on Fuzzy k-Closest Friends with Variable Depth for Location Mining. 153-160 - Denis Helic

, Christoph Trattner
, Markus Strohmaier, Keith Andrews:
On the Navigability of Social Tagging Systems. 161-168 - Shaozhi Ye, Shyhtsun Felix Wu:

Estimating the Size of Online Social Networks. 169-176 - Bongwon Suh, Lichan Hong, Peter Pirolli, Ed H. Chi:

Want to be Retweeted? Large Scale Analytics on Factors Impacting Retweet in Twitter Network. 177-184 - Aaron Beach, Mike Gartrell, Richard Han

:
q-Anon: Rethinking Anonymity for Social Networks. 185-192 - Owen Macindoe, Whitman Richards:

Graph Comparison Using Fine Structure Analysis. 193-200 - Brian Keegan

, Muhammad Aurangzeb Ahmad, Dmitri Williams, Jaideep Srivastava
, Noshir S. Contractor:
Dark Gold: Statistical Properties of Clandestine Networks in Massively Multiplayer Online Games. 201-208 - Teng-Kai Fan, Chia-Hui Chang

:
Learning to Predict Ad Clicks Based on Boosted Collaborative Filtering. 209-216 - Baojun Qiu, Kristinka Ivanova

, John Yen, Peng Liu:
Behavior Evolution and Event-Driven Growth Dynamics in Social Networks. 217-224 - Eunyoung Moon, Sangki Han:

A Qualitative Method to Find Influencers Using Similarity-based Approach in the Blogosphere. 225-232 - Marcel Karnstedt, Tara Hennessy, Jeffrey Chan

, Conor Hayes
:
Churn in Social Networks: A Discussion Boards Case Study. 233-240 - Marcos R. Vieira, Vanessa Frías-Martínez, Nuria Oliver

, Enrique Frías-Martínez
:
Characterizing Dense Urban Areas from Mobile Phone-Call Data: Discovery and Social Dynamics. 241-248 - Luca Maria Aiello

, Alain Barrat, Ciro Cattuto, Giancarlo Ruffo
, Rossano Schifanella
:
Link Creation and Profile Alignment in the aNobii Social Network. 249-256 - Juuso Karikoski, Matti Nelimarkka

:
Measuring Social Relations: Case OtaSizzle. 257-263 - Justin Zhan, Xing Fang:

A Computational Trust Framework for Social Computing (A Position Paper for Panel Discussion on Social Computing Foundations). 264-269
SIN - The Second International Symposium on Social Intelligence and Networking 2010
- Muhammad Aurangzeb Ahmad, David A. Huffaker, Jing Wang, Jeffrey William Treem, Dinesh K. Kumar

, Marshall Scott Poole, Jaideep Srivastava
:
The Many Faces of Mentoring in an MMORPG. 270-275 - Jamie F. Olson, James Howison

, Kathleen M. Carley:
Paying Attention to Each Other in Visible Work Communities: Modeling Bursty Systems of Multiple Activity Streams. 276-281 - Hsun-Ping Hsieh

, Cheng-Te Li:
Mining Temporal Subgraph Patterns in Heterogeneous Information Networks. 282-287 - Alexy Khrabrov, George Cybenko:

Discovering Influence in Communication Networks Using Dynamic Graph Analysis. 288-294 - Matthias Broecheler, Paulo Shakarian

, V. S. Subrahmanian:
A Scalable Framework for Modeling Competitive Diffusion in Social Networks. 295-302 - Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail:

Measuring Similarity between Sets of Overlapping Clusters. 303-308 - Rémy Cazabet

, Frédéric Amblard
, Chihab Hanachi:
Detection of Overlapping Communities in Dynamical Social Networks. 309-314 - Kshanti A. Greene, Joe Michael Kniss, George F. Luger:

Representing Diversity in Communities of Bayesian Decision-makers. 315-322 - Song Qin, Ronaldo Menezes

, Marius Silaghi:
A Recommender System for Youtube Based on its Network of Reviewers. 323-328 - David A. Broniatowski, Christopher L. Magee:

Analysis of Social Dynamics on FDA Panels Using Social Networks Extracted from Meeting Transcripts. 329-334 - Hasan Davulcu, Syed Toufeeq Ahmed, Sedat Gokalp, M'hamed H. Temkit, Tom Taylor, Mark Woodward, Ali Amin

:
Analyzing Sentiment Markers Describing Radical and Counter-Radical Elements in Online News. 335-340 - Muhammad Aurangzeb Ahmad, Marshall Scott Poole, Jaideep Srivastava:

Network Exchange in Trust Networks. 341-346 - David B. Bracewell, Steven Gustafson, Abha Moitra, Gregg Steuben:

WISDOM from Light-Weight Information Retrieval. 347-354 - Rhoda Baggs

, Chan Wei Wu:
Exploration of Asynchronous Online Teaching with a Network Analysis of Class Interaction. 355-362 - Dijiang Huang

, Vetri Arasan:
Email-based Social Network Trust. 363-370 - Suratna Budalakoti, K. Suzanne Barber:

Authority vs Affinity: Modeling User Intent in Expert Finding. 371-378 - Sigal Louchheim, Sally Price:

On Adoption of Social Computing in the Engineering Community. 379-384 - Matthew S. Smith, Christophe G. Giraud-Carrier:

Bonding vs. Bridging Social Capital: A Case Study in Twitter. 385-392 - Jacob Ratkiewicz, Filippo Menczer, Santo Fortunato, Alessandro Flammini, Alessandro Vespignani

:
Traffic in Social Media II: Modeling Bursty Popularity. 393-400 - Han-Saem Park, Sung-Bae Cho:

Building Mobile Social Network with Semantic Relation Using Bayesian NeTwork-based Life-log Mining. 401-406 - Przemyslaw Kazienko

, Piotr Bródka
, Katarzyna Musial, Jaroslaw Gaworecki:
Multi-Layered Social Network Creation Based on Bibliographic Data. 407-412 - Kang Zhao, John Yen, Louis-Marie Ngamassi Tchouakeu, Carleen F. Maitland, Andrea Hoplight Tapia:

From Communication to Collaboration: Simulating the Emergence of Inter-organizational Collaboration Network. 413-418 - Carson Kai-Sang Leung

, Christopher L. Carmichael:
Exploring Social Networks: A Frequent Pattern Visualization Approach. 419-424 - Byung-Won On, Ee-Peng Lim

, Jing Jiang, Freddy Chong Tat Chua, Viet-An Nguyen, Loo-Nin Teow:
Messaging Behavior Modeling in Mobile Social Networks. 425-430 - Elizeu Santos-Neto, Flavio Figueiredo

, Jussara M. Almeida, Miranda Mowbray, Marcos André Gonçalves
, Matei Ripeanu:
Assessing the Value of Contributions in Tagging Systems. 431-438 - Geonhyeok Go, Joonhyuk Yang

, Hyunwoo Park, Steve SangKi Han:
Using Online Media Sharing Behavior as Implicit Feedback for Collaborative Filtering. 439-445 - Katayoun Farrahi

, Daniel Gatica-Perez
:
Mining Human Location-Routines Using a Multi-Level Approach to Topic Modeling. 446-451 - Jacob Ratkiewicz, Alessandro Flammini, Filippo Menczer:

Traffic in Social Media I: Paths Through Information Networks. 452-458 - Wai-Tat Fu, Wei Dong:

Facilitating Knowledge Exploration in Folksonomies: Expertise Ranking by Link and Semantic Structures. 459-464 - Yoshifumi Masunaga, Kazunari Ito, Yoichi Miyama, Naoko Oyama, Chiemi Watanabe, Kaoru Tachi:

SERPWatcher: A Sophisticated Mining Tool Utilizing Search Engine Results Pages (SERPs) for Social Change Discovery. 465-472 - Iyad Rahwan

, Fatemeh Jahedpari, Sherief Abdallah
:
The Dynamics of Two Cognitive Heuristics for Coordination on Networks. 473-479 - Richard B. Scherl, Daniela Inclezan, Michael Gelfond

:
Automated Inference of Socio-Cultural Information from Natural Language Conversations. 480-487 - Sukru Tikves

, Hasan Davulcu:
Impactrank: A Study on News Impact Forecasting. 488-493 - Stuart Moran

, Keiichi Nakata
:
Ubiquitous Monitoring in the Office: Salient Perceptions of Data Collection Devices. 494-499 - Sean P. Goggins, Michael Gallagher, James M. Laffey, Christopher Amelung:

Social Intelligence in Completely Online Groups - Toward Social Prosthetics from Log Data Analysis and Transformation. 500-507 - Brett Walenz, Robin A. Gandhi, William R. Mahoney

, Qiuming Zhu:
Exploring Social Contexts along the Time Dimension: Temporal Analysis of Named Entities. 508-512 - Xin Liu, Tomasz Kaszuba, Radoslaw Nielek, Anwitaman Datta

, Adam Wierzbicki
:
Using Stereotypes to Identify Risky Transactions in Internet Auctions. 513-520 - Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil:

Detecting Terrorism Evidence in Text Documents. 521-527
SCA - The Second International Symposium on Social Computing Applications 2010
- Matteo Magnani, Danilo Montesi

, Luca Rossi:
Friendfeed Breaking News: Death of a Public Figure. 528-533 - Stephen Mogan, Weigang Wang:

The Impact of Web 2.0 Developments on Real-Time Groupware. 534-539 - Christopher A. Miller, Sonja Schmer-Galunder, Jeffrey M. Rye:

Politeness in Social Networks: Using Verbal Behaviors to Assess Socially-Accorded Regard. 540-545 - Donggi Jung, Hyunwoo Park, Ryong Maeng, Steve SangKi Han:

A Geometric Pattern-based Method to Build Hierarchies of Geo-Referenced Tags. 546-551 - William Simm, Maria Angela Ferrario

, Scott Piao
, Jon Whittle, Paul Rayson
:
Classification of Short Text Comments by Sentiment and Actionability for VoiceYourView. 552-557 - Myeongjae Jeon, Jeaho Hwang, Youngjae Kim, Jae-Wan Jang, Joonwon Lee, Euiseong Seo:

Measurement, Modeling, and Analysis of a Large-scale Blog Sever Workload. 558-563 - Christoph Stadtfeld:

Who Communicates with Whom? Measuring Communication Choices on Social Media Sites. 564-569 - Halil Bisgin, Nitin Agarwal, Xiaowei Xu:

Does Similarity Breed Connection? - An Investigation in Blogcatalog and Last.fm Communities. 570-575 - Xin Liu

, Tsuyoshi Murata:
Evaluating Community Structure in Bipartite Networks. 576-581 - Mariam Elhussein

, Keiichi Nakata
:
Cross-Lingual Information Retrieval as a Side Effect of Tagging. 582-586 - Vassilis Kostakos

, Jayant Venkatanathan:
Making Friends in Life and Online: Equivalence, Micro-Correlation and Value in Spatial and Transpatial Social Networks. 587-594 - Tomoe Tomiyama, Tatsuhiro Sato:

An Analysis Method for Service Process Considering Resource Operation Rules. 595-600 - Wei-Lun Chang

, Tzu-Hsiang Lin:
A Cluster-based Approach for Automatic Social Network Construction. 601-606 - Srdjan B. Stakic, Nada Teodosijevic:

Agreements Based Distribution of Responsibilities in National Electronic Health Records System. 607-614 - Qingyi Gao:

Network Analysis Applied to a Bibliographic Network. 615-622 - Zhenyu Wu, Chunhong Zhang, Ji Yang, Wang Hao:

Towards Cloud and Terminal Collaborative Mobile Social Network Service. 623-629 - Mansooreh Zarezadeh, Mohammad Ali Azadeh, Seyed Farid Ghaderi:

Analyzing Effects of Electricity Subsidy on Social Welfare in Iran by Integrated System Approach and Artificial Neural Network. 630-635 - Peggy Wu, Christopher A. Miller:

Interactive Phrasebook - Embedding Human Social Dynamics in Language Training. 636-640 - Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Quentin Jones, Adriana Iamnitchi, Cristian Borcea:

GDC: Group Discovery Using Co-location Traces. 641-648 - Krist Beck, Justin Zhan:

Phishing Using a Modified Bayesian Technique. 649-655 - Xiaohui Cui, Justin M. Beaver

, Everett Stiles, Laura Pullum
, Brian A. Klump, Jim N. Treadwell, Thomas E. Potok
:
The Swarm Model in Open Source Software Developer Communities. 656-660 - Tony White, Wayne Chu, Amirali Salehi-Abari:

Media Monitoring Using Social Networks. 661-668
SBTN - The International Workshop on Finding Synergies Between Texts and Networks 2010
- Il-Chul Moon, Dongwoo Kim

, Yohan Jo, Alice H. Oh:
Learning Influence Propagation of Personal Blogs with Content and Network Analyses. 669-674 - Amitava Das, Sivaji Bandyopadhyay:

Opinion Summarization in Bengali: A Theme Network Model. 675-682 - Harish Sethu, Alexander Yates:

Using Text Analysis to Understand the Structure and Dynamics of the World Wide Web as a Multi-Relational Graph. 683-686 - Jana Diesner, Kathleen M. Carley

:
A Methodology for Integrating Network Theory and Topic Modeling and its Application to Innovation Diffusion. 687-692
CMDSS - The International Workshop on Computational Modeling and Discovery in Social Systems 2010
- Peter Haglich, Christopher A. Rouff, Laura Pullum

:
Detecting Emergence in Social Networks. 693-696 - Sergey Malinchik:

Framework for Modeling Opinion Dynamics Influenced by Targeted Messages. 697-700 - Steven J. Fernandez, Amy N. Rose

, Edward A. Bright, Justin M. Beaver
, Christopher T. Symons, Olufemi A. Omitaomu, Cathy Jiao:
Construction of Synthetic Populations with Key Attributes: Simulation Set-Up While Accommodating Multiple Approaches within a Flexible Simulation Platform. 701-706
PASSAT - The Second IEEE International Conference on Privacy, Security, Risk and Trust 2010
- Amir Salar Amoli, Mehdi Kharrazi, Rasool Jalili:

2Ploc: Preserving Privacy in Location-based Services. 707-712 - Murillo Pontual, Keith Irwin, Omar Chowdhury, William H. Winsborough, Ting Yu:

Failure Feedback for User Obligation Systems. 713-720 - Pedram Radmand, Alex Talevski:

Impact of Encryption on Qos in Voip. 721-726 - Liqun Chen

, Jiangtao Li:
VLR Group Signatures with Indisputable Exculpability and Efficient Revocation. 727-734 - Murat Kantarcioglu, Robert Nix:

Incentive Compatible Distributed Data Mining. 735-742 - Claudio A. Ardagna

, Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Pierangela Samarati
:
Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach. 743-750 - Amirreza Masoumzadeh, James B. D. Joshi:

OSNAC: An Ontology-based Access Control Model for Social Networking Systems. 751-759 - Lee Fueng Yap, Takeshi Yashiro, Masahiro Bessho, Tomonori Usaka, M. Fahim Ferdous Khan, Noboru Koshizuka, Ken Sakamura:

SUCAS: An Architecture for Secure User Centric Attestation in Location-based Services. 760-767 - Ernie Brickell, Jiangtao Li:

Enhanced Privacy ID from Bilinear Pairing for Hardware Authentication and Attestation. 768-775 - Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakantham

:
A Decision Theoretic Approach to Data Leakage Prevention. 776-784 - Li Yang, Wade Gasior, Rajeshwar Katipally, Xiaohui Cui:

Alerts Analysis and Visualization in Network-based Intrusion Detection Systems. 785-790 - Ahmet Erhan Nergiz, Mehmet Ercan Nergiz, Thomas Pedersen, Chris Clifton:

Practical and Secure Integer Comparison and Interval Check. 791-799 - Somayeh Taheri, Salke Hartung, Dieter Hogrefe:

Achieving Receiver Location Privacy in Mobile Ad Hoc Networks. 800-807 - Michael D. Larsen

, Jennifer C. Huckett:
Measuring Disclosure Risk for Multimethod Synthetic Data Generation. 808-815 - T. Ryan Hoens, Marina Blanton

, Nitesh V. Chawla
:
A Private and Reliable Recommendation System for Social Networks. 816-825 - Kun Peng, Feng Bao:

An Efficient Range Proof Scheme. 826-833 - Nihel Ben Youssef, Adel Bouhoula

:
Automatic Conformance Verification of Distributed Firewalls to Security Requirements. 834-841 - Woei-Jiunn Tsaur, Yuh-Chen Chen:

Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit. 842-848 - Qussai Yaseen

, Brajendra Panda:
Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention. 849-856 - Dalal Ahmed Al-Arayed, João Pedro Sousa:

General Trust Management - GTM. 857-864 - Jafar Haadi Jafarian:

A Vagueness-based Obfuscation Technique for Protecting Location Privacy. 865-872 - Wei Wei, Ting Yu:

The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition. 873-880 - Dijiang Huang

, Zhibin Zhou, Yan Zhu
:
Gradual Identity Exposure Using Attribute-Based Encryption. 881-888 - Pavan Kalyan Vejandla, Dipankar Dasgupta, Aishwarya Kaushal, Fernando Niño:

Evolving Gaming Strategies for Attacker-Defender in a Simulated Network Environment. 889-896 - Shi-Cho Cha, Ren-Ting Ku, Ya-Ping Fu, Hao-Ping Lin:

On Generating RFID Privacy Policies in Consideration of Openness and Enforcement. 897-905 - Lei Jin, Hassan Takabi, James B. D. Joshi:

Security and Privacy Risks of Using E-mail Address as an Identity. 906-913
SecureCom - The Second International Symposium on Secure Computing 2010
- Azzam Mourad

, Hadi Otrok
, Lama Baajour:
A Novel Approach for the Development and Deployment of Security Patterns. 914-919 - Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson:

Increasing Trustworthiness through Security Testing Support. 920-925 - Collins Umana, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Oluwatoyin Gloria Ake-Johnson:

Comparative Analysis of ccTLD Security Policies. 926-933 - James Lee, Khalil El-Khatib:

A Privacy-Enabled Architecture for an RFID-based Location Monitoring System. 934-937 - Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson

, Kenneth W. Bauer Jr., Michael R. Grimaila, Steven K. Rogers:
Malware Type Recognition and Cyber Situational Awareness. 938-943 - Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima

, Toshiaki Tanaka:
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework. 944-951 - Suleyman Kondakci

:
Network Security Risk Assessment Using Bayesian Belief Networks. 952-960 - Jiang Bian, Remzi Seker, Umit Topaloglu:

A Secure Distributed File System for Medical Image Archiving. 961-966 - William L. Sousan, Qiuming Zhu, Robin A. Gandhi, William R. Mahoney

, Anup C. Sharma:
Using Term Extraction Patterns to Discover Coherent Relationships from Open Source Intelligence. 967-972 - Kamil Reddy, Hein S. Venter

:
Information Privacy in Two Dimensions - Towards a Classification Scheme for Information Privacy Research. 973-980 - Anup C. Sharma, Robin A. Gandhi, William R. Mahoney

, William L. Sousan, Qiuming Zhu:
Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks. 981-986 - Laurent Gallon:

On the Impact of Environmental Metrics on CVSS Scores. 987-992 - Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar, Sujit Sanjeev, Jatin Lodhia, Partha Dasgupta:

A Multi-factor Approach to Securing Software on Client Computing Platforms. 993-998 - Woei-Jiunn Tsaur, Chia Chun Wu:

A Secure Smart-Card-based Password Authenticated Key Agreement Scheme in Multi-server Environments. 999-1003 - Asmidar Abu Bakar, Roslan Ismail, Abdul Rahim Ahmad, Jamalul-lail Ab Manan:

Trust Formation Based on Subjective Logic and PGP Web-of-Trust for Information Sharing in Mobile Ad Hoc Networks. 1004-1009 - Theis Hjorth, Rune Torbensen:

Secure Wireless Embedded Systems Via Component-based Design. 1010-1015
PSA - The Second International Symposium on Privacy and Security Applications 2010
- Davinson Castano Cano

:
Diseases Propagation Analysis Due to Natural Disasters Using Computational Mathematics. 1016-1021 - Mohamed Bader Boughattas, Ben Slimen Iyed, Houria Rezig:

Correcting Codes in the Quantum Keys Reconciliation: Scenarios of Privacy Maintenance. 1022-1025 - Xuhua Ji, Colin Pattinson:

AHP Implemented Security Assessment and Security Weight Verification. 1026-1031 - Shunan Ma, Jingsha He

, Xunbo Shuai, Zhao Wang:
Access Control Mechanism Based on Trust Quantification. 1032-1037 - Caroline Ngeno, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:

User's Perspective: Privacy and Security of Information on Social Networks. 1038-1043 - Ebenezer Sackey, Dale Lindskog, Ron Ruhl, Pavol Zavarsky:

A Framework for Home Wireless Network Security Education. 1044-1049 - Martha VenkataSwamy, Srini Ramaswamy, Nitin Agarwal:

CBPM: Context Based Privacy Model. 1050-1055 - Abdullahi Arabo, Qi Shi

, Madjid Merabti:
Data Mishandling and Profile Building in Ubiquitous Environments. 1056-1063 - Sadra Abedinzadeh, Samira Sadaoui:

A Rough Set Approach to Agent Trust Management. 1064-1071 - Sabah S. Al-Fedaghi

:
System-based Approach to Software Vulnerability. 1072-1079 - Hsiu-Sen Chiang, Woei-Jiunn Tsaur:

Mobile Malware Behavioral Analysis and Preventive Strategy Using Ontology. 1080-1085 - Reijo Savola:

Towards a Risk-Driven Methodology for Privacy Metrics Development. 1086-1092 - Jung-Ho Um, Hee-Dae Kim, Jae-Woo Chang:

An Advanced Cloaking Algorithm Using Hilbert Curves for Anonymous Location Based Service. 1093-1098 - Nabih T. Abdelmajid, M. Alamgir Hossain, S. Shepherd, Khaled W. Mahmoud

:
Location-Based Kerberos Authentication Protocol. 1099-1104
PASWeb - International Workshop on Privacy Aspects of Social Web and Cloud Computing 2010
- Reza Rawassizadeh, A Min Tjoa

:
Securing Shareable Life-logs. 1105-1110 - Bibi van den Berg

, Ronald Leenes:
Audience Segregation in Social Network Sites. 1111-1116 - Markus Huber

, Martin Mulazzani, Edgar R. Weippl:
Social Networking Sites Security: Quo Vadis. 1117-1122 - Elaheh Momeni:

Towards (Semi-) Automatic Moderation of Social Web Annotations. 1123-1128 - José María Gómez Hidalgo, Jose Miguel Martin-Abreu, Javier Nieves, Igor Santos

, Felix Brezo, Pablo García Bringas
:
Data Leak Prevention through Named Entity Recognition. 1129-1134 - Mohamed Bourimi

, Dhiah el Diehn I. Abou-Tair
, Dogan Kesdogan, Thomas Barth, Kathrin Höfke:
Evaluating Potentials of Internet- and Web-based Socialtv in the Light of Privacy. 1135-1140 - Gerald Bader, Amin Anjomshoaa

, A Min Tjoa
:
Privacy Aspects of Mashup Architecture. 1141-1146
MATTM - International Workshop on Mission Assurance: Tools, Techniques, and Methodologies 2010
- Deborah J. Bodeau, Richard D. Graubart, Jennifer Fabius-Greene:

Improving Cyber Security and Mission Assurance Via Cyber Preparedness (Cyber Prep) Levels. 1147-1152 - Robert K. Abercrombie

, Frederick T. Sheldon
, Michael R. Grimaila:
A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance - Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP). 1153-1158 - Partha P. Pal

, Kurt Rohloff
, Michael Atighetchi, Richard E. Schantz:
Managed Mission Assurance - Concept, Methodology and Runtime Support. 1159-1164 - Richard A. Caralli, Julia H. Allen, Pamela D. Curtis, David W. White, Lisa R. Young:

Improving Operational Resilience Processes: The CERT Resilience Management Model. 1165-1170 - Abhijit Kulkarni, Emilio Williams, Michael R. Grimaila:

Mitigating Security Risks for End User Computing Application (EUCA) Data. 1171-1176 - Craig M. Burris, Jimmie G. McEver, Heather W. Schoenborn, David T. Signori:

Steps Toward Improved Analysis for Network Mission Assurance. 1177-1182 - William Heinbockel, Peter Kertzner, Rosalie McQuaid:

Providing Mission Assurance for Airborne Networks. 1183-1187 - Samuel N. Hamilton, Sarah L. Muccio, Dean Lee, Allen Ott:

Mission Aware Cyber Policy Representation. 1188-1193 - A. K. Castner, M. H. Henry, R. R. J. Jailall, V. H. Nguyen, Bart L. Paulhamus, E. P. Reilly:

Toward Linking Information Assurance and Air and Missile Defense Mission Metrics. 1194-1199

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














