Access control models for online social networks R Sayaf, D Clarke status: published, 32--66, 2012 | 37 | 2012 |
Interactive grouping of friends in OSN: Towards online context management B Gao, B Berendt, D Clarke, R De Wolf, T Peetz, J Pierson, R Sayaf Data Mining Workshops (ICDMW), 2012 IEEE 12th International Conference on …, 2012 | 20 | 2012 |
Social Network Engineering for Secure Web Data and Services L Caviglione, M Coccoli, A Merlo IGI Global, 2013 | 12 | 2013 |
The SPION Project A Acquisti, B Van Alesenoy, E Balsa, B Berendt, D Clarke, C Diaz, B Gao, ... | 7 | |
Contextual Privacy: The Interplay of Sensitivity and Context R Sayaf | 4 | 2016 |
Rights and obligations of actors in social networking sites B Van Alsenoy status: published, 2014 | 4 | 2014 |
CPS^2: a Contextual Privacy Framework for Social Software R Sayaf, D Clarke, R Harper 10th International Conference on Security and Privacy in Communication …, 2014 | 4 | 2014 |
Can users control their data in social software? an ethical analysis of control systems R Sayaf, JB Rule, D Clarke Security and Privacy Workshops (SPW), 2013 IEEE, 1-4, 2013 | 4 | 2013 |
D2. 1-State of the Art S Gürses | 4 | 2011 |
The other side of privacy: surveillance in data control R Sayaf, D Clarke, JB Rule Proceedings of the 2015 British HCI Conference, 184-192, 2015 | 2 | 2015 |
\ mathrm {CPS}^ 2: A Contextual Privacy Framework for Social Software R Sayaf, D Clarke, R Harper International Conference on Security and Privacy in Communication Networks …, 2014 | 2 | 2014 |
Guidelines for Privacy-Friendly Default Settings V Verdoodt, B Van Alsenoy status: published, 2014 | | 2014 |
D9. 1: First iteration of software prototypes and report describing those prototypes W De Groef, B Gao, R Sayaf, E Balsa, F Piessens, B Berendt, D Clarke, ... | | 2012 |
D3. 1-Report on Research Activities in Trust, rep F Piessens, KU iMinds-DistriNet SIGPLAN Not 40, 305-314, 2012 | | 2012 |
SPION Workshop SMIT April 2012 R De Wolf, S Gürses, J Pierson, R Sayaf status: published, 2012 | | 2012 |
D5. 1-Report on Research Activities B Berendt Commun ACM 48 (4), 101-106, 2008 | | 2008 |
D9. 3.3—Social Software Security D Clarke | | |
D2. 2-Requirements and Conceptual Framework S Gürses information privacy 53, 1393-1462, 0 | | |
FOR YOUR EYES ON LY T BOOKLET, L ON | | |