Follow
Rula Sayaf
Rula Sayaf
Verified email at cs.kuleuven.be
Title
Cited by
Cited by
Year
Access control models for online social networks
R Sayaf, D Clarke
status: published, 32--66, 2012
352012
Interactive grouping of friends in OSN: Towards online context management
B Gao, B Berendt, D Clarke, R De Wolf, T Peetz, J Pierson, R Sayaf
Data Mining Workshops (ICDMW), 2012 IEEE 12th International Conference on …, 2012
202012
Social Network Engineering for Secure Web Data and Services
L Caviglione, M Coccoli, A Merlo
IGI Global, 2013
122013
The SPION Project
A Acquisti, B Van Alesenoy, E Balsa, B Berendt, D Clarke, C Diaz, B Gao, ...
7
\ mathrm {CPS}^ 2: A Contextual Privacy Framework for Social Software
R Sayaf, D Clarke, R Harper
International Conference on Security and Privacy in Communication Networks …, 2014
52014
Contextual Privacy: The Interplay of Sensitivity and Context
R Sayaf
42016
Rights and obligations of actors in social networking sites
B Van Alsenoy
status: published, 2014
42014
Can users control their data in social software? an ethical analysis of control systems
R Sayaf, JB Rule, D Clarke
Security and Privacy Workshops (SPW), 2013 IEEE, 1-4, 2013
42013
D2. 1-State of the Art
S Gürses
42011
The other side of privacy: surveillance in data control
R Sayaf, D Clarke, JB Rule
Proceedings of the 2015 British HCI Conference, 184-192, 2015
22015
Guidelines for Privacy-Friendly Default Settings
V Verdoodt, B Van Alsenoy
status: published, 2014
2014
CPS^2: a Contextual Privacy Framework for Social Software
R Sayaf, D Clarke, R Harper
10th International Conference on Security and Privacy in Communication …, 2014
2014
D9. 1: First iteration of software prototypes and report describing those prototypes
W De Groef, B Gao, R Sayaf, E Balsa, F Piessens, B Berendt, D Clarke, ...
2012
D3. 1-Report on Research Activities in Trust, rep
F Piessens, KU iMinds-DistriNet
SIGPLAN Not 40, 305-314, 2012
2012
SPION Workshop SMIT April 2012
R De Wolf, S Gürses, J Pierson, R Sayaf
status: published, 2012
2012
D5. 1-Report on Research Activities
B Berendt
Commun ACM 48 (4), 101-106, 2008
2008
D9. 3.3—Social Software Security
D Clarke
D2. 2-Requirements and Conceptual Framework
S Gürses
information privacy 53, 1393-1462, 0
FOR YOUR EYES ON LY
T BOOKLET, L ON
The system can't perform the operation now. Try again later.
Articles 1–19