Beyond User-to-User Access Control for Online Social Networks

被引:0
|
作者
Shehab, Mohamed [1 ]
Squicciarini, Anna Cinzia [2 ]
Ahn, Gail-Joon [3 ]
机构
[1] Univ N Carolina, Charlotte, NC 28223 USA
[2] Penn State Univ, University Pk, PA 16802 USA
[3] Arizona State Univ, Tempe, AZ 85287 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With Hie development of Web 2.0 technologies, online. social networks are able to provide open platforms to enable the seamless sharing of profile data to enable developers to interface and extend the social network services as applications (or APIs). At, the same time, these open interfaces pose serious privacy concerns as third party applications are usually given full read access to the user profiles. Current, related research has focused on mainly user-to-user interactions in social networks, mid seems to ignore the third party applications. In this paper, we present an access control frame-work to manage the. third party to user interactions. Our framework is based on enabling the user to specify the data attributes to be shared with the application and at the same time be able to specify die degree of specificity of the shared attributes. We, model applications as finite state machines, and use the required user profile attributes is conditions governing the application execution. We formulate the minimal attribute generalization problem and we propose a solution that maps the problem to the shortest path problem to find the minimum set, of attribute generalization required to access the application services.
引用
收藏
页码:174 / +
页数:3
相关论文
共 50 条
  • [11] User-to-User QoS - Management and monitoring
    Zitterbart, M
    [J]. PROTOCOLS FOR HIGH-SPEED NETWORK V, 1997, : 219 - 234
  • [12] A flexible Middleware layer for user-to-user messaging
    Wams, JMS
    van Steen, M
    [J]. DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, PROCEEDINGS, 2003, 2893 : 297 - 309
  • [13] Cooperation in NOMA Networks Under Limited User-to-User Communications: Solution and Analysis
    Due-Dung Tran
    Ha-Vu Tran
    Dae-Binh Ha
    Kaddoum, Georges
    [J]. 2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [14] Abnormal user identification in online social networks based on user behavior
    Wang, Nan
    Sun, Qingyu
    Jiao, Qingju
    [J]. PROCEEDINGS OF 2021 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS '21), 2021,
  • [15] SoNeUCONABCPro: An Access Control Model for Social Networks with Translucent User Provenance
    Gonzalez-Manzano, Lorena
    Slaymaker, Mark
    de Fuentes, Jose M.
    Vayenas, Dimitris
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 234 - 252
  • [16] Access Control Mechanism for Multi User Data Sharing in Social Networks
    Ramteke, Ashwajit
    Talmale, Girish
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 578 - 582
  • [17] Measuring User Behavior in Online Social Networks
    Gyarmati, Laszlo
    Trinh, Tuan Anh
    [J]. IEEE NETWORK, 2010, 24 (05): : 26 - 31
  • [18] Characterizing User Behavior in Online Social Networks
    Benevenuto, Fabricio
    Rodrigues, Tiago
    Cha, Meeyoung
    Almeida, Virgilio
    [J]. IMC'09: PROCEEDINGS OF THE 2009 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, 2009, : 49 - 62
  • [19] On user perception of safety in online social networks
    Lorentzen, Charlott
    Fiedler, Markus
    Johnson, Henric
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2013, 11 (01) : 77 - 91
  • [20] Characterizing User Groups in Online Social Networks
    Gyarmati, Laszlo
    Trinh, Tuan Anh
    [J]. INTERNET OF THE FUTURE, 2009, 5733 : 59 - 68