Proceedings of the 2nd International Workshop on Keyword Search on Structured Data 2010
DOI: 10.1145/1868366.1868370
|View full text |Cite
|
Sign up to set email alerts
|

Search in social networks with access control

Abstract: More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks provide sophisticated privacy settings to control this flow. Creating such extensive access control knobs makes the search for content a hard problem since each user sees a unique subset of all the data.In this work, we take a first step at integrating access control based on a social network in a search system. We describe a set of sol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 15 publications
(16 reference statements)
0
7
0
Order By: Relevance
“…Access control is enforced through intersection of the search result with the identifiers (author list) of documents authored by a particular set of users [4]. Alternative cost models are examined to optimally include specific friends in the author list of each user, and the HeapUnion operator is introduced to efficiently process multiple lists of document identifiers [5].…”
Section: Related Workmentioning
confidence: 99%
“…Access control is enforced through intersection of the search result with the identifiers (author list) of documents authored by a particular set of users [4]. Alternative cost models are examined to optimally include specific friends in the author list of each user, and the HeapUnion operator is introduced to efficiently process multiple lists of document identifiers [5].…”
Section: Related Workmentioning
confidence: 99%
“…Existing indexing techniques for OSN content searching can be classified into two types: federated searching [4] and centralized index with access filtering [5].…”
Section: Related Workmentioning
confidence: 99%
“…A federated search engine maintains a local index for the content generated by each user [4], where an inverted index can be easily implemented atop popular OSN Key-Value stores following the widely used column family data model [6]. When a user issues a query, the search engine broadcasts the query messages to all his/her neighbors and performs a search in their local indices.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, several models have been proposed, and some have gained serious attention. Among them are the rule based privilege computation model [23], privacy aware keyword search [37], and access control based on ontology [38], learning [39], evolution [40] and roles [41].…”
Section: Access Control As a Privacy Theorymentioning
confidence: 99%