Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
IEEE Intelligent Systems
Private social network analysis: how to assemble pieces of a graph privately
Proceedings of the 5th ACM workshop on Privacy in electronic society
Audit-based compliance control
International Journal of Information Security
Proceedings of the 16th international conference on World Wide Web
Private Relationships in Social Networks
ICDEW '07 Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering Workshop
Preserving the privacy of sensitive relationships in graph data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Rule-Based access control for social networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Privacy policies for shared content in social network sites
The VLDB Journal — The International Journal on Very Large Data Bases
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
A trust-augmented voting scheme for collaborative privacy management
STM'10 Proceedings of the 6th international conference on Security and trust management
Visualizing privacy implications of access control policies in social network systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Privacy-aware image classification and search
SIGIR '12 Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval
Social networking with frientegrity: privacy and integrity with an untrusted provider
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Using community structure to control information sharing in online social networks
Computer Communications
A trust-augmented voting scheme for collaborative privacy management
Journal of Computer Security - STM'10
Hi-index | 0.00 |
Access control over resources shared by social network users is today receiving growing attention due to the widespread use of social networks not only for recreational but also for business purposes. In a social network, access control is mainly regulated by the relationships established by social network users. An important issue is therefore to devise privacy-awareaccess control mechanisms able to perform a controlled sharing of resources by, at the same time, satisfying privacy requirements of social network users wrt their relationships. In this paper, we propose a solution to this problem, which enforces access control through a collaboration of selected nodes in the network. The use of cryptographic and digital signature techniques ensures that relationship privacy is guaranteed during the collaborative process. In the paper, besides giving the protocols to enforce collaborative access control we discuss their robustness against the main security threats.