2014
DOI: 10.1007/978-3-319-10431-7_30
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Privacy Policy Framework for Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 8 publications
0
17
0
Order By: Relevance
“…In particular, for online social networks, relationship-based access control [27,54] supports policies depending on connections in the social graph, e.g., friendship links. Here, we aimed for more than access control: We wanted to protect secrets not only from direct illegitimate access, but also from leaking to unintended recipients who draw inferences based on observations of the system.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, for online social networks, relationship-based access control [27,54] supports policies depending on connections in the social graph, e.g., friendship links. Here, we aimed for more than access control: We wanted to protect secrets not only from direct illegitimate access, but also from leaking to unintended recipients who draw inferences based on observations of the system.…”
Section: Related Workmentioning
confidence: 99%
“…• A Formal Privacy Policy Framework for Social Networks [28]. In this paper the static part of FPPF (called PPF) is presented (Chapter 2), but everything was built using propositional logic.…”
Section: Statement Of Contributionsmentioning
confidence: 99%
“…Instead we describe a schema composed by the generic structure of the privacy policies that users in Twitter can write. The schema is based on the set of Twitter privacy policies presented in [28], which was shown to express all possible policies of Twitter nowadays.…”
Section: Instantiation Of Twittermentioning
confidence: 99%
“…Policy languages for social media platforms have been proposed in the context of Relationship-based Access Control [12], or using epistemic logic [28]. These approaches focus on specifying policies for granting or denying access to data based on the social graph, e.g.…”
Section: Related Workmentioning
confidence: 99%