2006
DOI: 10.1007/11836025_15
|View full text |Cite
|
Sign up to set email alerts
|

D-FOAF: Distributed Identity Management with Access Rights Delegation

Abstract: Todays WWW consists of more than just information. The WWW provides a large number of services, which often require identification of it's users. This has lead to the fact that today users have to maintain a large number of different credentials for different websitesdistributed or shared identification system are not widely deployed. Furthermore current authorisation systems requires strict centralisation of the authorisation procedure-users themselves are usually not enabled to authorise their trusted friend… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
50
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(51 citation statements)
references
References 10 publications
0
50
0
Order By: Relevance
“…The proof is straightforward. New edge is added to currentP ath only when it reaches the target node (lines [8][9][10][11][12] or it may possibly lead to the target…”
Section: A Proof Of Correctnessmentioning
confidence: 99%
“…The proof is straightforward. New edge is added to currentP ath only when it reaches the target node (lines [8][9][10][11][12] or it may possibly lead to the target…”
Section: A Proof Of Correctnessmentioning
confidence: 99%
“…In contrast to the first prototype, we aim at enhancing privacy within the existing centralized OSN landscape while the second prototype differs from our approach as we aim at managing identities and access to personal information beyond OSN boundaries. To additionally improve selective sharing, OSN-specific access control models have been proposed [13], [7], [8], [1]. The D-FOAF architecture proposed in [13] relies on semantic web technologies and utilizes existing OSNs to define access rights based on the relationship between users, which are described by trust level and path length between requester and resource owner.…”
Section: Related Workmentioning
confidence: 99%
“…To additionally improve selective sharing, OSN-specific access control models have been proposed [13], [7], [8], [1]. The D-FOAF architecture proposed in [13] relies on semantic web technologies and utilizes existing OSNs to define access rights based on the relationship between users, which are described by trust level and path length between requester and resource owner. Similar, the works by Carminati et al [7], [8] employ semantic web technologies to create a Social Network Knowledge Base (SNKB) that contains OSN related information.…”
Section: Related Workmentioning
confidence: 99%
“…Social networks and their analysis have lots of potential in various domains, from learning [18] to knowledge management [19] and access control [20]. Social computing (the use of wikis, blogs, networking sites, collaborative filtering, and so on) helped to the birth of a new broad phase in knowledge management [21,22].…”
Section: Background and Related Workmentioning
confidence: 99%
“…As an example, instead of using percentage for expressing the trust level (e.g. friend 80%) like in [20], end users can express degrees of friendship in a more natural way with an annotation like closeFriendOf. The model becomes in this way more realistic, as we don't really label our friends in real-life with numerical values.…”
Section: Fig 3 a Snapshot Of Who-with-whommentioning
confidence: 99%