Beyond User-to-User Access Control for Online Social Networks

被引:0
|
作者
Shehab, Mohamed [1 ]
Squicciarini, Anna Cinzia [2 ]
Ahn, Gail-Joon [3 ]
机构
[1] Univ N Carolina, Charlotte, NC 28223 USA
[2] Penn State Univ, University Pk, PA 16802 USA
[3] Arizona State Univ, Tempe, AZ 85287 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With Hie development of Web 2.0 technologies, online. social networks are able to provide open platforms to enable the seamless sharing of profile data to enable developers to interface and extend the social network services as applications (or APIs). At, the same time, these open interfaces pose serious privacy concerns as third party applications are usually given full read access to the user profiles. Current, related research has focused on mainly user-to-user interactions in social networks, mid seems to ignore the third party applications. In this paper, we present an access control frame-work to manage the. third party to user interactions. Our framework is based on enabling the user to specify the data attributes to be shared with the application and at the same time be able to specify die degree of specificity of the shared attributes. We, model applications as finite state machines, and use the required user profile attributes is conditions governing the application execution. We formulate the minimal attribute generalization problem and we propose a solution that maps the problem to the shortest path problem to find the minimum set, of attribute generalization required to access the application services.
引用
收藏
页码:174 / +
页数:3
相关论文
共 50 条
  • [1] Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships
    Cheng, Yuan
    Park, Jaehong
    Sandhu, Ravi
    [J]. PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 646 - 655
  • [2] An Access Control Model for Online Social Networks Using User-to-User Relationships
    Cheng, Yuan
    Park, Jaehong
    Sandhu, Ravi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) : 424 - 436
  • [3] A User-to-User Relationship-Based Access Control Model for Online Social Networks
    Cheng, Yuan
    Park, Jaehong
    Sandhu, Ravi
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 8 - 24
  • [4] A smart access control mechanism based on user preference in online social networks
    Shan, Fangfang
    Li, Fuyang
    Ji, Peiyu
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (20):
  • [5] A User-Activity-Centric Framework for Access Control in Online Social Networks
    Park, Jaehong
    Sandhu, Ravi
    Cheng, Yuan
    [J]. IEEE INTERNET COMPUTING, 2011, 15 (05) : 62 - 65
  • [6] Beyond Social Graphs: User Interactions in Online Social Networks and their Implications
    Wilson, Christo
    Sala, Alessandra
    Puttaswamy, Krishna P. N.
    Zhao, Ben Y.
    [J]. ACM TRANSACTIONS ON THE WEB, 2012, 6 (04)
  • [7] Exploiting user-to-user topic inclusion degree for link prediction in social-information networks
    Wang, Zhiqiang
    Liang, Jiye
    Li, Ru
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2018, 108 : 143 - 158
  • [8] Unifying user-to-user messaging systems
    Wams, JMS
    van Steen, M
    [J]. IEEE INTERNET COMPUTING, 2004, 8 (02) : 76 - 82
  • [9] An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility
    Voloch, Nadav
    Levy, Priel
    Elmakies, Mor
    Gudes, Ehud
    [J]. CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2019, 2019, 11527 : 156 - 168
  • [10] User characterization for online social networks
    Tuna, Tayfun
    Akbas, Esra
    Aksoy, Ahmet
    Canbaz, Muhammed Abdullah
    Karabiyik, Umit
    Gonen, Bilal
    Aygun, Ramazan
    [J]. SOCIAL NETWORK ANALYSIS AND MINING, 2016, 6 (01)