An extended memoryless inference control model: accounting for dependence in table-level controls
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
Privacy and Contextual Integrity: Framework and Applications
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Trust Negotiation in Identity Management
IEEE Security and Privacy
The role mining problem: finding a minimal descriptive set of roles
Proceedings of the 12th ACM symposium on Access control models and technologies
Design and Semantics of a Decentralized Authorization Language
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
Auditing compliance with a Hippocratic database
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Privacy stories: confidence in privacy behaviors through end user programming
Proceedings of the 5th Symposium on Usable Privacy and Security
Privacy suites: shared privacy for social networks
Proceedings of the 5th Symposium on Usable Privacy and Security
Prying Data out of a Social Network
ASONAM '09 Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
Towards security policy decisions based on context profiling
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
How to share your favourite search results while preserving privacy and quality
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
A reachability-based access control model for online social networks
Databases and Social Networks
Privacy-aware spam detection in social bookmarking systems
i-KNOW '11 Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies
Proceedings of the 13th international conference on Ubiquitous computing
Scramble! your social network data
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Designing privacy-aware social networks: a multi-agent approach
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
Towards ad-hoc circles in social networking sites
DBSocial '12 Proceedings of the 2nd ACM SIGMOD Workshop on Databases and Social Networks
Building a dynamic and computational understanding of personal social networks
Proceedings of the 1st ACM workshop on Mobile systems for computational social science
Access control in social networks: a reachability-based approach
Proceedings of the 2012 Joint EDBT/ICDT Workshops
The PViz comprehension tool for social network privacy settings
Proceedings of the Eighth Symposium on Usable Privacy and Security
Cachet: a decentralized architecture for privacy preserving social networking with caching
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Adaptive information-sharing for privacy-aware mobile social networks
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Hi-index | 0.00 |
Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have access to user's information or actions, without requiring them to constantly manage their privacy settings. We propose to extract automatically such privacy settings, based on the policy that information produced within a social context should remain in that social context, both to ensure privacy as well as maximising utility. A machine learning approach is used to extract automatically such social contexts, as well as a tentative evaluation.