Categories
December 2024 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Tags
- 2011
- 2012
- ACM
- Business Applications
- Cloud Computing
- Collaborative filtering
- Collaborative Innovation Networks
- Collective intelligence
- Communication Networks
- Communication Networks
- Communities
- Community Detection
- Conference
- CSCL
- CSCW
- Data Mining
- eLearning
- Groups
- HCI
- IEEE
- Journal
- Knowledge Management
- Linked Data
- Mobile Social
- Modeling
- Network
- p2p
- Political Networks
- Privacy
- Risk Security in Social Contexts
- Security
- Semantic Web
- SNA
- Social Behavior Modeling
- Social Computing
- Social Computing Theories
- Social Media
- Social Network Analysis
- Social Networks
- Social semantic web
- Social System Design and Architectures
- Trust
- Web 2.0
- Web Mining
- Workshop
-
Recent Posts
- Abstract
- Call for Papers: Special Session on Evolution of Social Networks (ESN 2012)Call for Papers: Special Session on Evolution of Social Networks (ESN 2012)
- Call For Papers: Fourth International Conference on Computational Aspects of Social Networks (CASoN 2012)
- Call For Papers: International Workshop on Complex Networks and their Applications (Complex Networks 2012)
- Call For Papers: SIGSPATIAL International Workshop on Location-Based Social Networks (LBSN 2012)
Recent Comments
Archives
Tag Archives: Access Control
Call For Papers: Journal of Information Security Research (JISR 2011)
Journal of Information Security Research (JISR) ISSN 0976-4143 (Print) ISSN 0976-4151 (Online) Editorial Board Editor-in-Chief: Victor Ralevich Sheridan Institute of Technology and Advanced Learning, Ontario, Canada Submissions at: http://www.dline.info/jisr/submission.php Submission Deadline: Dec 31, 2011 Notification Due: Dec 31, 2011 Final … Continue reading
Posted in Conferences
Tagged Access Control, Anonymity, Attacks and Viral Software, Communication Networks, Information ethics, Journal, Privacy, Security, Trust
Comments Off on Call For Papers: Journal of Information Security Research (JISR 2011)