Role-Based Access Control Models
Computer
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Socially augmenting employee profiles with people-tagging
Proceedings of the 20th annual ACM symposium on User interface software and technology
Selective message distribution with people-tagging in user-collaborative environments
CHI '09 Extended Abstracts on Human Factors in Computing Systems
Usable access control in collaborative environments: authorization based on people-tagging
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
TBA: a hybrid of logic and extensional access control systems
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Policy administration in tag-based authorization
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Hi-index | 0.00 |
We explore the idea of tagging people for selective information sharing in the context of a social-personal information management (SPIM) system. Each new tag applied to a person has a distinctly specifiable visibility, and people tagged with the same key word form a relationship group that can be used as an access control option for each piece of information. We introduce the idea and motivation behind people-tagging, describe a research implementation we have created to experiment with the concept, and provide a preliminary discussion of potential usage and directions for future work.