WETICE '00 Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Usage control platformization via trustworthy SELinux
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Security Engineering for Service-Oriented Architectures
Security Engineering for Service-Oriented Architectures
PeerSoN: P2P social networking: early experiences and insights
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet
SAINT '09 Proceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet
Deriving trust from experience
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Safebook: A privacy-preserving online social network leveraging on real-life trust
IEEE Communications Magazine
A trust-augmented voting scheme for collaborative privacy management
STM'10 Proceedings of the 6th international conference on Security and trust management
A trust-augmented voting scheme for collaborative privacy management
Journal of Computer Security - STM'10
Hi-index | 0.00 |
Existing online social networks hardly care about users' privacy rights. In particular, they do not permit users to keep control over "their" data. By "their" data, we denote data that refers to the respective user as an identifiable object within (textual, audio, image or video) media. The well-known concept of "usage control" employs a usage rights' perspective (e.g. DRM), but it does not explicitly deal with privacy. In this paper, we instead propose the concept of "data control", which exactly focusses on privacy rights and therefore employs a control rights' perspective. Based on data control, we propose a defamation-free network (DFN) in which control rights are not only manifest and visible, but can also be exercised. We examine the main usage scenarios of such a network, and discuss the possible approaches for implementing it. Finally, we sketch a solution with an underlying P2P architecture and highlight the basic technological challenges and requirements.