Agents, trust, and information access on the semantic web
ACM SIGMOD Record
Implementation and optimization techniques
The description logic handbook
The Pragmatics of Model-Driven Development
IEEE Software
Named graphs, provenance and trust
WWW '05 Proceedings of the 14th international conference on World Wide Web
User centricity: a taxonomy and open issues
Proceedings of the second ACM workshop on Digital identity management
Why HTTPS Is Not Enough -- A Signature-Based Architecture for Trusted Content on the Social Web
WI '07 Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence
Who Reads and Writes the Social Web? A Security Architecture for Web 2.0 Applications
ICIW '08 Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services
ICCGI '08 Proceedings of the 2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)
Hi-index | 0.00 |
Past years’ radical changes in how we use the World Wide Web led to new challenges in guarding user rights. The “Web 2.0” movement relies to large extents on commercial Web services where users can publish their content and manage their personal information. Experience has shown that the companies providing these Web services only then seek for standardized, open, and trustworthy solutions if it is beneficial for them. In order to empower users to take control over their content and their data, existing security models need to be extended to fit the new situation, and new types of services supporting user control need to be developed.