Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Predicting trusts among users of online communities: an epinions case study
Proceedings of the 9th ACM conference on Electronic commerce
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
Collective privacy management in social networks
Proceedings of the 18th international conference on World wide web
flyByNight: mitigating the privacy risks of social networking
Proceedings of the 5th Symposium on Usable Privacy and Security
Inferring privacy policies for social networking services
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
Learning based access control in online social networks
Proceedings of the 19th international conference on World wide web
Walking in facebook: a case study of unbiased sampling of OSNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
Rule-Based access control for social networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Towards ad-hoc circles in social networking sites
DBSocial '12 Proceedings of the 2nd ACM SIGMOD Workshop on Databases and Social Networks
Access control in social networks: a reachability-based approach
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Primates: a privacy management system for social networks
Proceedings of the 21st ACM international conference on Information and knowledge management
Hi-index | 0.00 |
As a result of the widespread use of social networking sites, millions of individuals can today easily share personal and confidential information with an incredible amount of possibly unknown other users. This raises the need of giving users more control on the distribution of their resources, which may be accessed by a community far wider than they can expect. Our concern is how to specify and enforce access rules in a social network. The solution proposed in this paper relies on connection characteristics between users, in an extended sense that includes indirect connections. It provides a conditional access to shared resources based on reachability constraints, between the owner and the requester of a resource, specified through access rules. Experimental results show the effectiveness of our approach over a real social network dataset.