Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, 2009. ,
DOI : 10.1145/1609956.1609962
A User-to-User Relationship-Based Access Control Model for Online Social Networks, Proc. 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), pp.8-24, 2012. ,
DOI : 10.1145/363347.363387
URL : https://hal.archives-ouvertes.fr/hal-01534764
Caching and Auditing in the RPPM Model, Proc. 10th International Workshop on Security and Trust Management STM. Security and Cryptology, pp.49-64, 2014. ,
DOI : 10.1007/978-3-319-11851-2_4
Path conditions and principal matching, Proceedings of the 19th ACM symposium on Access control models and technologies, SACMAT '14, pp.187-198, 2014. ,
DOI : 10.1145/2613087.2613094
URL : http://arxiv.org/pdf/1406.4988
Relationship-based access control, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.191-202, 2011. ,
DOI : 10.1145/1943513.1943539
A Privacy Preservation Model for Facebook-Style Social Network Systems, Proc. 14th European Symposium on Research In Computer Security (ESORICS'09, pp.303-320, 2009. ,
DOI : 10.1145/1609956.1609962
URL : http://www.cpsc.ucalgary.ca/~pwlfong/Pub/esorics2009.pdf
Relationship-based access control policies and their policy languages, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.51-60, 2011. ,
DOI : 10.1145/1998441.1998450
Access control requirements for Web 2.0 security and privacy, IEEE Web 2.0 Security & Privacy Workshop, 2007. ,
Verification of Security Policy Administration and Enforcement in Enterprise Systems, p.59677, 1951. ,
Abductive analysis of administrative policies in rule-based access control, IEEE Transactions on Dependable and Secure Computing, 2014. ,
Multiparty Access Control for Online Social Networks: Model and Mechanisms, IEEE Transactions on Knowledge and Data Engineering, vol.25, issue.7, pp.1614-1627, 2013. ,
DOI : 10.1109/TKDE.2012.97
URL : http://sefcom.asu.edu/publications/multiparty-access-control-tkde2013.pdf
Administration in role-based access control, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.127-138, 2007. ,
DOI : 10.1145/1229285.1229305
Querying Complex Graphs, Proc. Eighth International Symposium on Practical Aspects of Declarative Languages (PADL), pp.199-214, 2006. ,
DOI : 10.1007/11603023_14
URL : http://ftp.cs.sunysb.edu/pub/liu/GraphQL-PADL06.pdf
The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, 1974. ,
DOI : 10.1109/PROC.1975.9939
The ARBAC97 model for role-based administration of roles, ACM Transactions on Information and System Security, vol.2, issue.1, pp.105-135, 1999. ,
DOI : 10.1145/300830.300839