Transparency of Health-Apps for Trust and Decision Making, Journal of Medical Internet Research, vol.2, issue.2 Suppl, p.277, 2013. ,
DOI : 10.2196/jmir.2446
URL : http://doi.org/10.2196/jmir.2981
CollAC: Collaborative access control, 2014 International Conference on Collaboration Technologies and Systems (CTS), pp.142-149, 2014. ,
DOI : 10.1109/CTS.2014.6867557
Privacy Implications of Privacy Settings and Tagging in Facebook, LNCS, vol.8425, pp.121-138, 2013. ,
DOI : 10.1007/978-3-319-06811-4_16
Transparency actually: how transparency affects public perceptions of political decision-making, European Political Science Review, vol.14, issue.02, pp.309-330, 2014. ,
DOI : 10.1111/j.1467-9477.2011.00268.x
Cue, Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, SafeConfig '10, pp.9-16, 2010. ,
DOI : 10.1145/1866898.1866901
Towards the development of privacy-aware systems, Information and Software Technology, vol.51, issue.2, pp.337-350, 2009. ,
DOI : 10.1016/j.infsof.2008.04.004
Multiparty Access Control for Online Social Networks: Model and Mechanisms, IEEE Transactions on Knowledge and Data Engineering, vol.25, issue.7, pp.1614-1627, 2013. ,
DOI : 10.1109/TKDE.2012.97
URL : http://sefcom.asu.edu/publications/multiparty-access-control-tkde2013.pdf
Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001. ,
DOI : 10.1145/383891.383894
An Empirical Assessment of IT Governance Transparency: Evidence from Commercial Banking, Information Systems Management, vol.11, issue.3, pp.116-136, 2013. ,
DOI : 10.1080/07421222.2004.11045797
SAFAX ???????? An Extensible Authorization Service for Cloud Environments, Frontiers in ICT, vol.19, issue.9, 2015. ,
DOI : 10.1016/j.jisa.2014.04.003
URL : https://doi.org/10.3389/fict.2015.00009
Access control policy combining, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.135-144, 2009. ,
DOI : 10.1145/1542207.1542229
Prioritized Execution of Privacy Policies, LNCS, vol.7731, pp.133-145, 2012. ,
DOI : 10.1007/978-3-642-35890-6_10
Effects of access-control policy conflict-resolution methods on policy-authoring usability, p.12, 2009. ,
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf
Access control for collaborative environments, Proceedings of the 1992 ACM conference on Computer-supported cooperative work , CSCW '92, pp.51-58, 1992. ,
DOI : 10.1145/143457.143461
URL : http://www.cs.purdue.edu/serc/TechReports/abstracts/catagory/../../files/TR123P.PS
Collective privacy management in social networks, Proceedings of the 18th international conference on World wide web, WWW '09, pp.521-530, 2009. ,
DOI : 10.1145/1526709.1526780
URL : http://www.sis.uncc.edu/%7Emshehab/papers/www09.pdf
Team-based access control (TMAC), Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.13-19, 1997. ,
DOI : 10.1145/266741.266748
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, pp.166-181, 1997. ,
DOI : 10.1007/978-0-387-35285-5_10
Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 2005. ,
DOI : 10.1145/1057977.1057979