Chapter 6. References

Ahmad, A. & Whitworth, B. (2011). Distributed Access Control for Social Networks. In proceedings of 2011 International Conference of Information Assurance and Security IAS.

Benkler, Y. (2002). “Coase’s Penguin, or, Linux and ‘The Nature of the Firm’.” The Yale Law Journal 112 (3), pp. 369–446.

Clark, D. D., & Wilson, D. R. (1987). “A Comparison of Commercial and Military Computer Security Policies,” IEEE 1987 Symposium of Security and Privacy. pp. 184–194.

Cohen, B. (2003). Incentives build robustness in BitTorrent. Retrieved from http://www.ittc.ku.edu/~niehaus/classes/750-s06/documents/BT-description.pdf

Ferraiolo, D. & Kuhn, D. R. (1992). Role-Based Access Control. In Proceedings of the NIST-NSA National (USA) 1992 Computer SecurityConference, pp. 554–563.

Freeden, M. (1991). Rights (Concepts in the Social Sciences). Buckingham: Open University Press.

Freudenthal, E., Pesin, T., Port, L., Keenan, E., & Karamcheti, V. (2002). dRBAC: Distributed role-based access control for dynamic coalition environments. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002). Vienna, Austria.

Geen, R. G., & Gange, J.J. (1983). Social facilitation: Drive theory and beyond. In H. H. Blumberg, A. P. Hare, V. Kent, and M. Davis, Eds. Small Groups and Social Interaction Volume 1. (pp. 141–153). Oxford: Wiley-Blackwell.

Karp, A. H., Haury, H., & Davis, M. H. (2009). From ABAC to ZBAC: The Evolution of access control model. Technical report HPL-2009-30, HP Labs.

Lampson, B. W. (1969). “Dynamic Protection Structures,” AFIPS Conference Proceedings, 35, pp. 27–38.

Locke, J. 1690/1963) An essay concerning the true original extent and end of civil government: Second of ‘Two Treatises on Government’ In J. Somerville & R. E. Santoni (Eds.). Social and Political Philosophy (pp. 169–204). New York: Anchor.

Rawls, J. (2001). Justice as Fairness. Cambridge, MA: Harvard University Press.

Rose, E. (2001) “Balancing internet marketing needs with consumer concerns: A property rights framework,” Computers and Society, 31 (1), pp. 17–21.

Sanders, M. S., & McCormick, E. J. (1993). Human Factors in Engineering and Design. New York: McGraw-Hill.

TCSEC (1985). Trusted Computer Security Evaluation Criteria (TCSEC), DOD 5200.28-STD. Department of Defense.

Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., & Essiari, A. (1999). Certificate-based access control for widely distributed resources. In Proceedings of the Eighth Usenix Security Symposium, pp. 215–228.

Whitworth, B., & Bieber, M. (2002). Legitimate Navigation Links. In proceedings of ACM Hypertext 2002, Demonstrations and Posters, University of Maryland. pp. 26–27.

Whitworth, B. & Liu, T. (2008). Politeness as a Social Computing Requirement. In R. Luppicini, (Ed.). Handbook of Conversation Design for Instructional Applications (pp. 419–436). Hershey PA: IGI.

Whitworth, B. & Liu, T. (2009). “Channel email: Evaluating social communication efficiency,” IEEE Computer, 42(7). pp. 63-72.

Whitworth, B. & Whitworth, A. (2010). “The Social Environment Model: Small Heroes and the Evolution of Human Society,” First Monday, 15 (11).