2012
DOI: 10.1007/978-3-642-32287-7_6
|View full text |Cite
|
Sign up to set email alerts
|

An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control

Abstract: Abstract. The rise of online social networks (OSNs) has traditionally been accompanied by privacy concerns. These typically stem from facts: First, OSN service providers' access to large databases with millions of user profiles and their exploitation. Second, the user's inability to create and manage different identity facets and enforce access to the self as in the real world. In this paper, we argue in favor of a new paradigm, decoupling the management of social identities in OSNs from other social network s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 18 publications
(31 reference statements)
0
5
0
Order By: Relevance
“…Once the algorithm has been executed, the clusters are presented to the user for refinement and approval [13]. [12], based on the Core RBAC model [7] Managing Visibility: A Trust-Based Access Control Model. Besides managing contacts, one of the main drawbacks of existing SNSs is the underlying access control model which is used to define which contacts can see a particular item.…”
Section: Improving Controlmentioning
confidence: 99%
See 3 more Smart Citations
“…Once the algorithm has been executed, the clusters are presented to the user for refinement and approval [13]. [12], based on the Core RBAC model [7] Managing Visibility: A Trust-Based Access Control Model. Besides managing contacts, one of the main drawbacks of existing SNSs is the underlying access control model which is used to define which contacts can see a particular item.…”
Section: Improving Controlmentioning
confidence: 99%
“…However, as stated by Grimmelmann "[people] think about privacy in terms of social rules and social roles, not in terms of access-control lists and file permissions" [8]. In order to incorporate the different levels of trust SNS users have in their contacts, in [12] we propose to extend the existing access control models by incorporating contextual information such as trust and time. Figure 10 depicts the extended access control model.…”
Section: Improving Controlmentioning
confidence: 99%
See 2 more Smart Citations
“…Its implementation and application technologies can be devised in various forms [8][9][10]. Recently, security-related areas that consider context awareness have received attention, and various studies on several security models have been actively carried out [11][12][13]. It is necessary to study a new access control security model, applying this to the smart grid environment to provide security services according to time, space, and user context.…”
Section: Introductionmentioning
confidence: 99%