[1]TOOTOONCHIAN A, SAROIU S, GANJALI Y, et al. Lockr: better privacy for social networks [C]// CoNEXT'09: Proceedings of 〖HJ1.45mm〗the 5th International Conference on Emerging Networking Experiments and Technologies. New York: ACM Press, 2009: 169-180.[2]BADEN R, BENDER A, SPRING N, et al. Persona: an online so-cial network with user-defined privacy [C]// SIGCOMM'09: Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication. New York: ACM Press, 2009: 135-146.[3]CUTILLO L A, MOLVA R, STRUFE T. Safebook: a privacy-preserving online social network leveraging on real-life trust [J]. IEEE Communications Magazine, 2009, 47(12): 94-101.[4]SIMPSON A. On the need for user-defined fine-grained access control policies for social networking applications [C]// Proceedings of the Workshop on Security in Opportunistic and Social Networks. New York: ACM Press, 2008: 1-8.[5]CARMINATI B, FERRARI E, PEREGO A. Enforcing access control in Web-based social networks [EB/OL]. [2012-03-18]. http://www.dicom.uninsubria.it/dawsec/pubs/snwac.pdf.[6]张胜兵,蔡皖东,李勇军.一种基于博弈论的社交网络访问控制方法[J].西北工业大学学报,2011,29(4):652-657.[7]SUN J Y, ZHU X Y, FANG Y G. A privacy-preserving scheme for online social networks with efficient revocation [C]// INFOCOM 2010: Proceedings of the 29th Conference on Information Communications. Piscataway: IEEE Press, 2010: 2516-2524.[8]LUO W Y, XIE Q, HENGARTNER U. Facecloak: an architecture for user privacy on social networking sites [C]// CSE'09: Proceedings of the 2009 International Conference on Computational Science and Engineering. Piscataway: IEEE Press, 2009: 26-33.[9]SAHAI A, WATERS B. Fuzzy identity-based encryption [C]// EUROCRYPT 2005: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin: Springer, 2005: 457-473.[10]GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based en-cryption for fine-grained access control of encrypted data [C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2006: 89-98.[11]YU S C, WANG C, REN K, et al. Attribute based data sharing with attribute revocation [C]// ASIACCS'10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2010: 261-270.[12]CHEUNG L, NEWPORT C. Provably secure ciphertext policy ABE [C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York. ACM Press, 2007: 456-465.[13]王文强.属性基加密及签名体制的研究[D].郑州:信息工程大学,2010.[14]CHASE M. Multi-authority attribute based encryption [C]// TCC'07: Proceedings of the 4th Conference on Theory of Cryptography. Berlin: Springer, 2007: 515-534.[15]BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption [C]// SP'07: Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2007: 321-334. |