A Public-Key Protocol for Social Networks with Private Relationships
MDAI '07 Proceedings of the 4th international conference on Modeling Decisions for Artificial Intelligence
Privacy-Aware Collaborative Access Control in Web-Based Social Networks
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
An Annotation-Based Access Control Model and Tools for Collaborative Information Spaces
WSKS '08 Proceedings of the 1st world summit on The Knowledge Society: Emerging Technologies and Information Systems for the Knowledge Society
Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
On reliability indices of communication networks
Computers & Mathematics with Applications
Web-Traveler Policies for Images on Social Networks
World Wide Web
Key allocation schemes for private social networks
Proceedings of the 8th ACM workshop on Privacy in the electronic society
The Functionality-Security-Privacy Game
MDAI '09 Proceedings of the 6th International Conference on Modeling Decisions for Artificial Intelligence
Privacy-Preserving Relationship Path Discovery in Social Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
PriMa: an effective privacy protection mechanism for social networks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
Using social networks to distort users' profiles generated by web search engines
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Rational privacy disclosure in social networks
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
Annotation-based access control for collaborative information spaces
Computers in Human Behavior
Visualizing privacy implications of access control policies in social network systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Anonymizing social networks: A generalization approach
Computers and Electrical Engineering
Using community structure to control information sharing in online social networks
Computer Communications
Hi-index | 0.00 |
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be either public or accessible only by him/herself (or, at most, by users with whom he/she has a direct relationship). This is not enough, in that there is the need of more flexible mechanisms, making a user able to decide which network participants are authorized to access his/her resources and personal information. With this aim, in [2] we have proposed an access control model where authorized users are denoted based on the relationships they participate in. Nonetheless, we believe that this is just a first step towards a more comprehensive privacy framework for social networks. Indeed, besides users' resources and personal data, also users' relationships may convey sensitive information. For this reason, in this paper we focus on relationship protection, by proposing a strategy exploiting cryptographic techniques to enforce a selective dissemination of information concerning relationships across a social network.