Triggers and barriers to customizing software
CHI '91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The Z notation: a reference manual
The Z notation: a reference manual
Using Z: specification, refinement, and proof
Using Z: specification, refinement, and proof
The grid: blueprint for a new computing infrastructure
The grid: blueprint for a new computing infrastructure
The UK e-Science Core Program and the Grid
ICCS '02 Proceedings of the International Conference on Computational Science-Part I
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
BT Technology Journal
Towards secure Grid-enabled healthcare: Research Articles
Software—Practice & Experience - Grid Security
Collaboration and Trust in Healthcare Innovation: The eDiaMoND Case Study
Computer Supported Cooperative Work
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
A roadmap for comprehensive online privacy policy management
Communications of the ACM - Creating a science of games
Communications of the ACM
Financial Privacy Policies and the Need for Standardization
IEEE Security and Privacy
User-managed access control for health care systems
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Trust: from cognition to conceptual models and design
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Rule-Based access control for social networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
User-managed access to web resources
Proceedings of the 6th ACM workshop on Digital identity management
Hi-index | 0.00 |
The increasing popularity in social network web sites is giving rise to new classes of security and privacy concerns. The effective management of these threats will require a three-pronged approach, involving a combination of social, legal and technical solutions. At the heart of the issue is the notion of trust: in sharing personal data, individuals are placing their trust not only in those responsible for these sites, but in other members of their virtual communities. In this paper we draw parallels with the issues of data sharing and trust that have arisen in the e-* (by which we mean e-Science, e-Research, e-Health, e-Business, etc.) arenas. Specifically, we concern ourselves with authorisation, and argue that members of such social networks should have the opportunity to construct fine-grained access control policies that meet their particular requirements and circumstances, and, in addition, should be able to observe appropriate audit information.