Role-Based Access Control Models
Computer
Provenance management in curated databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Databases with uncertainty and lineage
The VLDB Journal — The International Journal on Very Large Data Bases
Efficient lineage tracking for scientific workflows
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
A semantic web based framework for social network access control
Proceedings of the 14th ACM symposium on Access control models and technologies
Enforcing access control in Web-based social networks
ACM Transactions on Information and System Security (TISSEC)
An Access Control Language for a General Provenance Model
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A language for provenance access control
Proceedings of the first ACM conference on Data and application security and privacy
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
The Open Provenance Model core specification (v1.1)
Future Generation Computer Systems
Transforming provenance using redaction
Proceedings of the 16th ACM symposium on Access control models and technologies
An Attribute Based Framework for Risk-Adaptive Access Control Models
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
ACON: Activity-Centric Access Control for Social Computing
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
Dependency path patterns as the foundation of access control in provenance-aware systems
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
A user-to-user relationship-based access control model for online social networks
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
A provenance-based access control model
PST '12 Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)
Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships
SOCIALCOM-PASSAT '12 Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust
Hi-index | 0.00 |
Although social computing (SC) has been growing phenomenally, it still lacks an appropriate way of protecting the security and privacy of data shared in the system. Current access control mechanisms in the domain of SC mainly rely on pre-defined access control policies to achieve authorization statically, which are intrinsically unsuitable for capturing the dynamic changes in social environment. In this paper, we explore the approach towards a more flexible and adaptive control through the incorporation of risk awareness in SC. In particular, risk values are associated with users and objects; meanwhile, risk thresholds are defined for each of the permissions. Risk values and risk thresholds can be derived from provenance data in a timely manner. Such dynamic computation can be enabled and facilitated with the incorporation of provenance awareness in SC systems.