Protection in operating systems
Communications of the ACM
Computing and applying trust in web-based social networks
Computing and applying trust in web-based social networks
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Security analysis in role-based access control
ACM Transactions on Information and System Security (TISSEC)
A trust based approach for protecting user data in social networks
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
Privacy homomorphisms for social networks with private relationships
Computer Networks: The International Journal of Computer and Telecommunications Networking
Semantic Access Control in Web Based Communities
ICCGI '08 Proceedings of the 2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)
Proceedings of the 18th international conference on World wide web
A semantic web based framework for social network access control
Proceedings of the 14th ACM symposium on Access control models and technologies
Enforcing access control in Web-based social networks
ACM Transactions on Information and System Security (TISSEC)
Inferring privacy information from social networks
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
D-FOAF: distributed identity management with access rights delegation
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Visualizing privacy implications of access control policies in social network systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Modeling data flow in socio-information networks: a risk estimation approach
Proceedings of the 16th ACM symposium on Access control models and technologies
Virtual private social networks and a facebook implementation
ACM Transactions on the Web (TWEB)
Account Reachability: A Measure of Privacy Risk for Exposure of a User's Multiple SNS Accounts
Proceedings of International Conference on Information Integration and Web-based Applications & Services
A time-evolution model for the privacy degree of information disseminated in online social networks
International Journal of Communication Networks and Distributed Systems
Using community structure to control information sharing in online social networks
Computer Communications
Hi-index | 0.00 |
The unauthorized propagation of information is an important problem in the Internet, especially because of the increasing popularity of On-line Social Networks. To address this issue, many access control mechanisms have been proposed so far, but there is still a lack of techniques to evaluate the risk of unauthorized flow of information within social networks. This paper introduces a probability-based approach to modeling the likelihood that information propagates from one social network user to users who are not authorized to access it. The approach is demonstrated via an example, to show how it can be applied in practical cases.