Beyond User-to-User Access Control for Online Social Networks

被引:0
|
作者
Shehab, Mohamed [1 ]
Squicciarini, Anna Cinzia [2 ]
Ahn, Gail-Joon [3 ]
机构
[1] Univ N Carolina, Charlotte, NC 28223 USA
[2] Penn State Univ, University Pk, PA 16802 USA
[3] Arizona State Univ, Tempe, AZ 85287 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With Hie development of Web 2.0 technologies, online. social networks are able to provide open platforms to enable the seamless sharing of profile data to enable developers to interface and extend the social network services as applications (or APIs). At, the same time, these open interfaces pose serious privacy concerns as third party applications are usually given full read access to the user profiles. Current, related research has focused on mainly user-to-user interactions in social networks, mid seems to ignore the third party applications. In this paper, we present an access control frame-work to manage the. third party to user interactions. Our framework is based on enabling the user to specify the data attributes to be shared with the application and at the same time be able to specify die degree of specificity of the shared attributes. We, model applications as finite state machines, and use the required user profile attributes is conditions governing the application execution. We formulate the minimal attribute generalization problem and we propose a solution that maps the problem to the shortest path problem to find the minimum set, of attribute generalization required to access the application services.
引用
收藏
页码:174 / +
页数:3
相关论文
共 50 条
  • [21] Aggregation Strategies in User-to-User Reciprocal Recommender Systems
    Neve, James
    Palomares, Ivan
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2019, : 4031 - 4036
  • [22] Designing an Enterprise Social Questions and Answers Site to Enable Scalable User-to-User Support
    Gass, Oliver
    Oeztuerk, Guelcan
    Schacht, Silvia
    Maedche, Alexander
    [J]. NEW HORIZONS IN DESIGN SCIENCE: BROADENING THE RESEARCH AGENDA, 2015, 9073 : 3 - 18
  • [23] The impact and implications of the growth in residential user-to-user traffic
    Cho, Kenjiro
    Fukuda, Kensuke
    Esaki, Hiroshi
    Kato, Akira
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) : 207 - 218
  • [24] Distributed user access control in sensor networks
    Wang, Haodong
    Li, Qun
    [J]. DISTRIBUTED COMPUTING IN SENSOR SYSTEMS, PROCEEDINGS, 2006, 4026 : 305 - 320
  • [25] The Effects of Social Influence on User Acceptance of Online Social Networks
    Qin, Li
    Kim, Yongbeom
    Hsu, Jeffrey
    Tan, Xin
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2011, 27 (09) : 885 - 899
  • [26] ONLINE ACCESS - USER REACTION
    PAWLEY, C
    [J]. COLLEGE & RESEARCH LIBRARIES, 1982, 43 (06): : 473 - 477
  • [27] Emerging dynamics of evidence and trust in online user-to-user engagement: the case of "unproven' stem cell therapies
    Datta, Saheli
    [J]. CRITICAL PUBLIC HEALTH, 2018, 28 (03) : 352 - 362
  • [28] Characterizing user navigation and interactions in online social networks
    Benevenuto, Fabricio
    Rodrigues, Tiago
    Cha, Meeyoung
    Almeida, Virgilio
    [J]. INFORMATION SCIENCES, 2012, 195 : 1 - 24
  • [29] Understanding User Behavior in Online Social Networks: A Survey
    Jin, Long
    Chen, Yang
    Wang, Tianyi
    Hui, Pan
    Vasilakos, Athanasios V.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (09) : 144 - 150
  • [30] A Study on Influential User Identification in Online Social Networks
    Wang Nan
    Sun Qindong
    Zhou Yadong
    Shen Si
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (03) : 467 - 473