Proceedings of the 14th ACM Symposium on Access Control Models and Technologies 2009
DOI: 10.1145/1542207.1542237
|View full text |Cite
|
Sign up to set email alerts
|

A semantic web based framework for social network access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
96
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 131 publications
(96 citation statements)
references
References 6 publications
0
96
0
Order By: Relevance
“…As of late, semantic web advances, for example, Resource Description Framework (RDF) and the Web Ontology Language (OWL) have been utilized for social network community information [235] [236]. In spite of the fact that the objective in these papers is not to propose new semantic methodologies for demonstrating online social network information, it has been taken into account to give a brief review of current methodologies for culmination by indicating out additionally other social network data that could be displayed by semantic innovations.…”
Section: Modeling Social Network Using Semantic Web Technologiesmentioning
confidence: 99%
“…As of late, semantic web advances, for example, Resource Description Framework (RDF) and the Web Ontology Language (OWL) have been utilized for social network community information [235] [236]. In spite of the fact that the objective in these papers is not to propose new semantic methodologies for demonstrating online social network information, it has been taken into account to give a brief review of current methodologies for culmination by indicating out additionally other social network data that could be displayed by semantic innovations.…”
Section: Modeling Social Network Using Semantic Web Technologiesmentioning
confidence: 99%
“…In contrast to the first prototype, we aim at enhancing privacy within the existing centralized OSN landscape while the second prototype differs from our approach as we aim at managing identities and access to personal information beyond OSN boundaries. To additionally improve selective sharing, OSN-specific access control models have been proposed [13], [7], [8], [1]. The D-FOAF architecture proposed in [13] relies on semantic web technologies and utilizes existing OSNs to define access rights based on the relationship between users, which are described by trust level and path length between requester and resource owner.…”
Section: Related Workmentioning
confidence: 99%
“…The D-FOAF architecture proposed in [13] relies on semantic web technologies and utilizes existing OSNs to define access rights based on the relationship between users, which are described by trust level and path length between requester and resource owner. Similar, the works by Carminati et al [7], [8] employ semantic web technologies to create a Social Network Knowledge Base (SNKB) that contains OSN related information. Based thereupon, the authors propose a rule-based access control model that takes type, depth and trust level of a relationship into consideration.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, recent work proposed to adopt semantic policies to control access to resources in social networking applications, such as Facebook [16] [17]. Both works propose, with some differ-ences, to represent policies as Semantic Web Rule Language (SWRL) rules 7 : by reasoning on the social knowledge base, represented in OWL, they derive the set of active permissions.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly to us, these approaches provide rich descriptions of social interactions via semantic modeling. In [16] authors also introduce the concept of trust in a relationship, which we do not currently handle. However, since reasoning is performed on the whole knowledge base to infer the current list of permissions, this rule-based approach has two main limitations: first, forward reasoning requires the whole social knowledge to be stored in the same node in order to obtain all valid permissions, thus making the system inherently centralized.…”
Section: Related Workmentioning
confidence: 99%