{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:35Z","timestamp":1725771275546},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_49","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"551-562","source":"Crossref","is-referenced-by-count":3,"title":["Experimental Analysis on Access Control Using Trust Parameter for Social Network"],"prefix":"10.1007","author":[{"given":"Saumya","family":"Omanakuttan","sequence":"first","affiliation":[]},{"given":"Madhumita","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","unstructured":"Omanakuttan, S., Chatterjee, M.: Trust Based Access Control for Social Networks(STBAC). International Journal of Innovations in Engineering and Technology (IJIET ), 325\u2013331 (February 1, 2013)"},{"issue":"7","key":"49_CR2","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"X. Li","year":"2004","unstructured":"Li, X., Ling, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering\u00a016(7), 843\u2013857 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Ma, X., Feng, Z., Xu, C., Wang, J.: A Trust-Based Access Control with Feedback. In: 2008 International Symposiums on Information Processing (ISIP), May 23-25, pp. 510\u2013514 (2008)","DOI":"10.1109\/ISIP.2008.120"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Yang, R., Lin, C., Jiang, Y., Chu, X.: Trust Based Access Control in Infrastructure-Centric Environment. In: 2011 IEEE International Conference on Communications (ICC), June 5-9, pp. 1\u20135 (2011)","DOI":"10.1109\/icc.2011.5963329"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Poniszewska-Maranda, A.: Platform for Access Control Management in Information System Based on Extended RBAC Model. In: 2010 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), pp. 510\u2013517 (September 2010)","DOI":"10.1109\/SYNASC.2010.31"},{"key":"49_CR6","unstructured":"Lampson, B.: Protection. In: Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems, pp. 437\u2013443. Princeton University (1971)"},{"key":"49_CR7","volume-title":"Access Control Systems: Security, Identity Management and Trust Models","author":"M. Benantar","year":"2006","unstructured":"Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer, New York (2006)"},{"issue":"2","key":"49_CR8","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"49_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1734","DOI":"10.1007\/11915072_80","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"B. Carminati","year":"2006","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops, Part II. LNCS, vol.\u00a04278, pp. 1734\u20131744. Springer, Heidelberg (2006)"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Galpin, R., Flowerday, S.V.: Online social networks: Enhancing user trust through effective controls and identity management. In: Information Security South Africa (ISSA), August 15-17, pp. 1\u20138 (2011)","DOI":"10.1109\/ISSA.2011.6027520"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Wang, H., Sun, L.: Trust-Involved Access Control in Collaborative Open SociaNetworks. In: 2010 4th International Conference on Network and System Security (NSS), September 1-3, pp. 239\u2013246 (2010)","DOI":"10.1109\/NSS.2010.13"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Graffi, K., Mukherjee, P., Menges, B., Hartung, D., Kovacevic, A., Steinmetz, R.: Practical security in p2p- based social networks. In: IEEE 34th Conference on Local Computer Networks, LCN 2009, October 20-23, pp. 269\u2013272 (2009)","DOI":"10.1109\/LCN.2009.5355085"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T06:19:39Z","timestamp":1558851579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_49","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}