[1]和亮,冯登国,王蕊,等.基于MapReduce的大规模在线社交网络蠕虫仿真[J].软件学报,2013,24(7):1666-1682.
[2]WANG T,SRIVATSA M,LIU L.Fine-grained access control of personal data[J].IEEE Personal Communi-cations,2012,5(2):40-47.
[3]TOOTOONCHIAN A,SAROIU S,GANJALI Y,et al.Lockr:better privacy for social networks[C]//Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies.New York,USA:ACM Press,2009:169-180.
[4]BADEN R,BENDER A,SPRING N,et al.Persona:an online social network with user-defined privacy[J].ACM SIGCOMM Computer Communication Review,2009,39(4):135-146.
[5]霍颖瑜,马莉,钟勇,等.面向社交网络的多方授权模型[J].计算机科学,2016,43(1):116-121.
[6]MAHMOOD S.Online social networks:privacy threats and defenses[M]//CHBEIR R,BOUNA B A.Security and Privacy Preserving in Social Networks.Berlin,Germany:Springer,2013:47-71.
[7]HU H,AHN G J,JORGENSEN J.Multiparty access control for online social networks:model and mechanisms[J].IEEE Transactions on Knowledge and Data Engineering,2013,25(7):1614-1627.
[8]钟勇,张宏,刘凤玉,等.一种基于逻辑框架的数字版权管理机制和实现[J].计算机研究与发展,2010,47(2):223-230.
[9]RODRIGUEZ E,RODRIGUEZ V,CARRERAS A,et al.A digital rights management approach to privacy in online social networks[C]//Proceedings of Workshop on Privacy and Protection in Web-based Social Networks.New York,USA:ACM Press,2009:129
-139.
[10]ZHANG Z.Frontier and methodologies on digital rights management for multimedia social networks[J].International Journal of Digital Content Technology and Its Applications,2012,6(9):245-249.
[11]ENSOR B,KRUK S R,GZELLA A.A DRM solution based on social networks and enabling the idea of fair use[EB/OL].[2017-02-
20].https://www.researchgate.net/publication/22871101 _A_DRM_solution_based_on_social_networks_and_enabling_the_idea_of_fair_use._A_DRM_solution_based_on_social_networks_and_enabling_the_idea_of_fair_use.
[12]HUO Y,MA L,ZHONG Y.Research on fair use of digital content in social network[C]//Proceedings of International Conference on Knowledge Science,Engineering and Manage-ment.Berlin,Germany:Springer,2015:170-176.
[13]MARQUES J,SERRO C.Improving content privacy on social networks using open digital rights management solutions[J].Procedia Technology,2013,9:405-410.
[14]ALI B,MAHESWARAN M.Using social factors in digital rights management[C]//Proceedings of the 4th USENIX Conference on Hot Topics in Security.Berkeley,USA:USENIX Press,2009:1-6.
[15]MA Li,TAO Lixin,GAI Keke,et al.A novel social network access control model using logical authorization language in cloud computing[J].Concurrency and Computation:Practice and Experience,2017,29(14):99-110.
[16]MA Li,LENG Peng,ZHONG Yong.Research on semantic of updatable distributed logic and its application in access control[J].Journal of Parallel and Distributed Computing,2017,103(5):104-112.
[17]BERTINO E,CATANIA B,GERVASI V,et al.Active-U-datalog:integrating active rules in a logical update language[M]//FREITAG B,DECKER H,KIFER M,et al.Transactions and Change in Logic Databases.Berlin,Germany:Springer,1997:107-133.
[18]ZAYCHIK M V,STOYANOVICH J,ABITEBOUL S,et al.Collaborative access control in WebdamLog[C]//Proceedings of ACM SIGMOD International Conference on Management of Data.New York,USA:ACM Press,2015:197-211.
[19]钟勇,秦小麟,刘凤玉.ODRL权利描述语言逻辑实施机制研究[J].计算机科学,2009,36(4):133-139.
[20]CARNIANI E,D’ARENZO D,LAZOUSKI A,et al.Usage control on cloud systems[J].Future Generation Computer Systems,2016,63(C):37-55.
[21]CHONG C N,CORIN R,DOUMEN J,et al.LicenseScript:a logical language for digital rights management[J].Annals of Telecommunications,2006,61(3):284-331.
|