2019
DOI: 10.1007/s11280-019-00668-y
|View full text |Cite
|
Sign up to set email alerts
|

A novel trust-based access control for social networks using fuzzy systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…Xu et al 15 proposed a trust‐based access control mechanism Trust2Privacy to protect the privacy of users after releasing information, which can effectively realize the conversion from trust to privacy. Vahabli and Ravanmehr 1 combined with trust‐based access control and fuzzy inference system, by analyzing user requests to determine the user's relationship type, and according to the user's activities in social networks to create attribute matrix, while in the fuzzy inference system to calculate the trust score and specify access permissions. Takalkar and Mahalle 16 realized trust‐based access control according to different roles played by users, and proposed aggregate trust score calculation and security level calculation in multi‐role environment, which solved the access control problem of users playing multiple roles.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Xu et al 15 proposed a trust‐based access control mechanism Trust2Privacy to protect the privacy of users after releasing information, which can effectively realize the conversion from trust to privacy. Vahabli and Ravanmehr 1 combined with trust‐based access control and fuzzy inference system, by analyzing user requests to determine the user's relationship type, and according to the user's activities in social networks to create attribute matrix, while in the fuzzy inference system to calculate the trust score and specify access permissions. Takalkar and Mahalle 16 realized trust‐based access control according to different roles played by users, and proposed aggregate trust score calculation and security level calculation in multi‐role environment, which solved the access control problem of users playing multiple roles.…”
Section: Related Workmentioning
confidence: 99%
“…In this information age, everyone is equivalent to a walking data packet, and food, clothing, housing, and transportation can generate data. Users on social networks can easily share their personal information and access the personal data of their friends and other users 1 . Unfortunately, some attacks threaten social networks because these networks exchange large amounts of data.…”
Section: Introductionmentioning
confidence: 99%
“…Privacy and security scholars have developed several approaches to facilitate the definition of access-control policies in OSNs. Particularly, ACPMs seek to automate the generation of ACLs through machine learning [7,10,[28][29][30], formal logic [31,32], and network analysis [14,17,23] among other methods. On a large scale, ACPMs can be classified into community-based [14,17,23] or attribute-based [7,10,29,33], depending on whether they leverage communities or personal attributes for the automatic generation of access-control policies.…”
Section: A Access-control Predictionmentioning
confidence: 99%
“…Research shows that formal control collects focused information around the focused goal of formal control, and social control collects open information around the divergent goal. 30 Therefore, formal control is more conducive to exploitative learning with clear objectives of engineering project team, and social control is more conducive to exploratory learning that engineering project team needs to disseminate information. Based on this, the following assumptions are put forward: H1: The balanced use of formal control and social control is positively correlated with the ambidextrous learning balance of engineering project team. H1a: Compared with social control, formal control has a stronger positive correlation with exploitative learning of engineering project team. H1b: Compared with formal control, social control has a stronger positive correlation with exploratory learning in engineering project team. …”
Section: Theory and Research Hypothesismentioning
confidence: 99%