The small-world phenomenon: an algorithmic perspective
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Communications of the ACM
PGP: Pretty Good Privacy
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Compliance Checking in the PolicyMaker Trust Management System
FC '98 Proceedings of the Second International Conference on Financial Cryptography
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Toward acceptable metrics of authentication
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Small Worlds: The Dynamics of Networks between Order and Randomness
Small Worlds: The Dynamics of Networks between Order and Randomness
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Analyzing Kleinberg's (and other) small-world Models
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
How the Semantic Web is Being Used: An Analysis of FOAF Documents
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 4 - Volume 04
A trust-enhanced recommender system application: Moleskiing
Proceedings of the 2005 ACM symposium on Applied computing
IEEE Transactions on Knowledge and Data Engineering
Computing and applying trust in web-based social networks
Computing and applying trust in web-based social networks
Inferring binary trust relationships in Web-based social networks
ACM Transactions on Internet Technology (TOIT)
A survey of trust and reputation systems for online service provision
Decision Support Systems
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
A trust based approach for protecting user data in social networks
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
N3logic: A logical framework for the world wide web
Theory and Practice of Logic Programming
D-FOAF: distributed identity management with access rights delegation
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Rule-Based access control for social networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
A semantic web based framework for social network access control
Proceedings of the 14th ACM symposium on Access control models and technologies
Towards a dynamic and composable model of trust
Proceedings of the 14th ACM symposium on Access control models and technologies
Configuring audience-oriented privacy policies
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Effective trust management through a hybrid logical and relational approach
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
PAPA knows best: Principles for the ethical sharing of information on social networking sites
Ethics and Information Technology
The impact of social navigation on privacy policy configuration
Proceedings of the Sixth Symposium on Usable Privacy and Security
Privacy and security for online social networks: challenges and opportunities
IEEE Network: The Magazine of Global Internetworking
An efficient access control method for multimedia social networks
Proceedings of second ACM SIGMM workshop on Social media
Proceedings of the first ACM conference on Data and application security and privacy
Distributed data usage control for web applications: a social network implementation
Proceedings of the first ACM conference on Data and application security and privacy
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
Annotation-based access control for collaborative information spaces
Computers in Human Behavior
Editorial: Using OWL and SWRL to represent and reason with situation-based access control policies
Data & Knowledge Engineering
A rule-based policy language for selective trust propagation in social networks
Databases and Social Networks
Content-based filtering in on-line social networks
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
Relationship-based access control policies and their policy languages
Proceedings of the 16th ACM symposium on Access control models and technologies
Multiparty authorization framework for data sharing in online social networks
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Role assignment in institutional clouds for rule-based enterprise management
RuleML'11 Proceedings of the 5th international conference on Rule-based modeling and computing on the semantic web
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
Proceedings of the 27th Annual Computer Security Applications Conference
Visualizing privacy implications of access control policies in social network systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Online social network platforms: toward a model-backed security evaluation
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
A visualization tool for evaluating access control policies in facebook-style social network systems
Proceedings of the 27th Annual ACM Symposium on Applied Computing
On the complexity of aggregating information for authentication and profiling
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Cryptographic treatment of private user profiles
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
A user-to-user relationship-based access control model for online social networks
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section: Extended Version of SASO 2011 Best Paper
Towards a socially aware home router
Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research
Primates: a privacy management system for social networks
Proceedings of the 21st ACM international conference on Information and knowledge management
Towards provenance and risk-awareness in social computing
Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems
Interleaving tasks to improve performance: Users maximise the marginal rate of return
International Journal of Human-Computer Studies
Privacy settings in social networking systems: what you cannot control
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Preserving user privacy from third-party applications in online social networks
Proceedings of the 22nd international conference on World Wide Web companion
Relational abstraction in community-based secure collaboration
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Anonymously sharing Flickr pictures with facebook friends
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
On protection in federated social computing systems
Proceedings of the 4th ACM conference on Data and application security and privacy
Relationship-based information sharing in cloud-based decentralized social networks
Proceedings of the 4th ACM conference on Data and application security and privacy
Using community structure to control information sharing in online social networks
Computer Communications
Policy-driven role-based access management for ad-hoc collaboration
Journal of Computer Security
Hi-index | 0.00 |
In this article, we propose an access control mechanism for Web-based social networks, which adopts a rule-based approach for specifying access policies on the resources owned by network participants, and where authorized users are denoted in terms of the type, depth, and trust level of the relationships existing between nodes in the network. Different from traditional access control systems, our mechanism makes use of a semidecentralized architecture, where access control enforcement is carried out client-side. Access to a resource is granted when the requestor is able to demonstrate being authorized to do that by providing a proof. In the article, besides illustrating the main notions on which our access control model relies, we present all the protocols underlying our system and a performance study of the implemented prototype.