2018
DOI: 10.1007/978-3-319-94147-9_5
|View full text |Cite
|
Sign up to set email alerts
|

An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…This paper presents a new privacy model for access control in an OSN, in which the decisions of permission granting combines both pre-defined roles and trust-based factors derived from user-attributes, such as total number of friends, age of user account, and resemblance attributes between the two users. Similar attributes have appeared in a previous work ( [2]), which deals with information-flow control, and creates a model for adversary detection. However, in this paper we present specific parametric values for these attributes, which are experimentally based.…”
Section: Introductionmentioning
confidence: 86%
“…This paper presents a new privacy model for access control in an OSN, in which the decisions of permission granting combines both pre-defined roles and trust-based factors derived from user-attributes, such as total number of friends, age of user account, and resemblance attributes between the two users. Similar attributes have appeared in a previous work ( [2]), which deals with information-flow control, and creates a model for adversary detection. However, in this paper we present specific parametric values for these attributes, which are experimentally based.…”
Section: Introductionmentioning
confidence: 86%
“…An Ego node along with its adjacent nodes are denoted Ego network. The model we have presented in previous work ( [5], [6], [7], [5]) is composed of three main phases addressing three of its major aspects: trust, role-based access control and information flow. In the first phase, the Trust phase, we assign trust values on the edges connecting direct friends to the Ego node in their different roles, e.g., Family, Colleagues etc.…”
Section: Context Independent Trust-based Modelmentioning
confidence: 99%
“…Moreover, users may wish to share a piece of sensitive information in one subject with people they trust in the context of this subject but avoid sharing with the same people sensitive information in other subjects. The GDPR [7] was initiated by the EU for data protection and privacy, and affects most of the commercial companies, government institutions, and other sectors that process personal data of their customers or audiences. This regulation applies by virtue of public international law to organizations located within all EU member states that process personal data.…”
Section: Introductionmentioning
confidence: 99%
“…similarity indexes, user interactions such as comments, private messages and so on (i.e. see works by Misra et al (2016) or Gudes and Voloch (2018)). For online SSN data, there may be potential to adapt trust-based methods to geoprivacy protection in spatial data sharing.…”
Section: Spatial Cloakingmentioning
confidence: 99%