Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Homeviews: peer-to-peer middleware for personal data sharing applications
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Enabling new mobile applications with location proofs
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Configuring audience-oriented privacy policies
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Preserving privacy in location-based mobile social applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
User-managed access to web resources
Proceedings of the 6th ACM workshop on Digital identity management
An efficient access control method for multimedia social networks
Proceedings of second ACM SIGMM workshop on Social media
Distributed data usage control for web applications: a social network implementation
Proceedings of the first ACM conference on Data and application security and privacy
Oops, I did it again: mitigating repeated access control errors on facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Annotation-based access control for collaborative information spaces
Computers in Human Behavior
Content-based filtering in on-line social networks
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
A flexible and secure access control scheme using social behavior in real world
Journal of Mobile Multimedia
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Preserving privacy in online social networks
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
For some eyes only: protecting online information sharing
Proceedings of the third ACM conference on Data and application security and privacy
Building confederated web-based services with Priv.io
Proceedings of the first ACM conference on Online social networks
CP2: Cryptographic privacy protection framework for online social networks
Computers and Electrical Engineering
Hi-index | 0.00 |
Sharing personal content online is surprisingly hard despite the recent emergence of a huge number of content sharing systems and sites. These systems suffer from several drawbacks: they each have a different way of providing access control which cannot be used with other systems; moving to a new system is a lengthy process and requires registration and invitation of all one's friends to the new system; and the rules for access control are complicated and become more so as our networks of online friends grow. In this paper, we present Lockr - an access control scheme based on social relationships that makes sharing personal content easy. Lockr separates social networking information from the content sharing mechanisms, thereby eliminating the need for users to maintain many site-specific copies of their social networks. We describe Lockr's design, security properties, and limitations. We also present how we integrated Lockr with two popular systems for sharing content online - BitTorrent and Flickr.