共 10 条
- [1] Abdessalem T., 2011, PROC DATABASES SOC N, P31
- [2] [Anonymous], Philosophical Transactions of the Royal Society of London for, DOI DOI 10.1098/RSTL.1763.0053
- [3] Carminati B, 2006, LECT NOTES COMPUT SC, V4278, P1734
- [4] Douceur J.R., 2002, IPTPS
- [5] Role Based Access Control for Social Network Sites [J]. JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 389 - +
- [6] TRAN N, 2009, NSDI 09, P15
- [7] Viswanath B, 2009, 2ND ACM SIGCOMM WORKSHOP ON ONLINE SOCIAL NETWORKS (WOSN 09), P37
- [8] Wilson C, 2009, EUROSYS'09: PROCEEDINGS OF THE FOURTH EUROSYS CONFERENCE, P205
- [10] SybilLimit: A near-optimal social network defense against sybil attacks [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 3 - +