A framework for web science

T Berners-Lee, W Hall, JA Hendler… - … and Trends® in Web …, 2006 - nowpublishers.com
This text sets out a series of approaches to the analysis and synthesis of the World Wide
Web, and other web-like information structures. A comprehensive set of research questions …

Web science: an interdisciplinary approach to understanding the web

J Hendler, N Shadbolt, W Hall, T Berners-Lee… - Communications of the …, 2008 - dl.acm.org
Web science Page 1 60 communications of the acm | JULY 2008 | voL. 51 | no. 7 DESPITE THE
WEB’S great success as a technology and the significant amount of computing infrastructure …

Enforcing access control in web-based social networks

B Carminati, E Ferrari, A Perego - ACM Transactions on Information and …, 2009 - dl.acm.org
In this article, we propose an access control mechanism for Web-based social networks,
which adopts a rule-based approach for specifying access policies on the resources owned …

Rule-based access control for social networks

B Carminati, E Ferrari, A Perego - On the Move to Meaningful Internet …, 2006 - Springer
Web-based social networks (WBSNs) are online communities where participants can
establish relationships and share resources across the Web with other users. In recent …

High-resolution carbon isotope records of the Aptian to Lower Albian from SE France and the Mazagan Plateau (DSDP Site 545): a stratigraphic tool for …

JO Herrle, P Kößler, O Friedrich, H Erlenkeuser… - Earth and Planetary …, 2004 - Elsevier
High-resolution carbon isotope stratigraphy is established for the Aptian to Lower Albian of
the Vocontian Basin (SE France), and correlated to the carbon isotope record of the …

Understanding image virality

A Deza, D Parikh - Proceedings of the IEEE conference on …, 2015 - openaccess.thecvf.com
Virality of online content on social networking websites is an important but esoteric
phenomenon often studied in fields like marketing, psychology and data mining. In this …

Close engagements with artificial companions

Y Wilks - 2010 - torrossa.com
There is a fundamental problem with the Turing Test (Turing, 1950). It is designed to help
decide whether a machine has genuine intelligence comparable to that of a human, and …

The next 700 access control models or a unifying meta-model?

S Barker - Proceedings of the 14th ACM symposium on Access …, 2009 - dl.acm.org
We address some fundamental questions, which were raised by Atluri and Ferraiolo at
SACMAT'08, on the prospects for and benefits of a meta-model of access control. We …

[HTML][HTML] Evaluating privacy-determining user privacy expectations on the web

C Pilton, S Faily, J Henriksen-Bulmer - computers & security, 2021 - Elsevier
Individuals don't often have privacy expectations. When asked to consider them, privacy
realities were frequently perceived not to meet these expectations. Some websites exploit …

Access control and the resource description framework: A survey

S Kirrane, A Mileo, S Decker - Semantic Web, 2016 - journals.sagepub.com
In recent years we have seen significant advances in the technology used to both publish
and consume structured data using the existing web infrastructure, commonly referred to as …