Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Proceedings of the 16th international conference on World Wide Web
Access control administration with adjustable decentralization
Access control administration with adjustable decentralization
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
Preserving Privacy in Social Networks Against Neighborhood Attacks
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
BNCOD 26 Proceedings of the 26th British National Conference on Databases: Dataspace: The Final Frontier
Preserving the privacy of sensitive relationships in graph data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
International Journal of Business Information Systems
Developing privacy solutions for sharing and analysing healthcare data
International Journal of Business Information Systems
International Journal of Business Information Systems
Hi-index | 0.00 |
Social networks have become increasingly popular over the past decade, almost in all user communities. Users, in such networks, post a variety of their (personal) information on electronic profiles initially accessible by their friends, yet ultimately accessible by strangers, no matter transitively or directly. This is a very convenient mechanism to facilitate information sharing but it is highly susceptible to privacy violations. Most social network infrastructures do not have a privacy management component and even when they do, it lacks expressiveness and is difficult to use. No social network provides a flexible user-centric privacy management component. This paper proposes a decentralised privacy management component for social networks, based on an existing flexible access control administration model. It allows users to customise access to each piece of their information for every group in their user hierarchy. Furthermore, users can control transitive (i.e., indirect) access to their information. Users can define any policies as long as they comply with system policies. The result is a uniform model capturing both data security needs and user privacy concerns.