A different approach for improved Privacy of User Data and Images on Content Sharing Sites using(A3P)
Abstract
References
H. Sundaram, L. Xie, M. De Choudhury, Y. Lin, and A. Natsev, “Multimedia semantics: Interactions between content andcommunity,†Proc. IEEE, vol. 100, no. 9, pp. 2737–2758, Sep. 2012.
J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,†in Proc. Symp. Usable Privacy Security,2009.
C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, “Providing access control to online photo albums based on tags and linked data,†in Proc. Soc. Semantic Web: Where Web 2.0 Meets Web 3.0 at the AAAI Symp., 2009, pp. 9–14.
J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,†in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining.,2009, pp.249–254.
A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social networks,†in Proc. Symp. Usable Privacy Security, 2008.
A. Mazzia, K. LeFevre, and A. E.,, “The PViz comprehension tool for social network privacy settings,†in Proc. Symp. Usable Privacy Security, 2012.
P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,†in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 377–386.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â