2018
DOI: 10.1145/3146025
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Access Control for Community-Centered Collaborative Systems

Abstract: The last decades have seen a growing interest and demand for community-centered collaborative systems and platforms. These systems and platforms aim to provide an environment in which users can collaboratively create, share and manage resources. While offering attractive opportunities for online collaboration and information sharing, they also open several security and privacy issues. This has attracted several research efforts towards the design and implementation of novel access control solutions that can ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(40 citation statements)
references
References 110 publications
0
35
0
Order By: Relevance
“…Although the FTC continues to levy hefty fines against companies violating COPPA, adopting effective privacy controls remains a challenge in the field [13]. To address this challenge, we sought to review the main security vulnerabilities of some current smart toys and their resulting user privacy concerns and impact.…”
Section: Table 1 Some Known Privacy Violation and Finesmentioning
confidence: 99%
“…Although the FTC continues to levy hefty fines against companies violating COPPA, adopting effective privacy controls remains a challenge in the field [13]. To address this challenge, we sought to review the main security vulnerabilities of some current smart toys and their resulting user privacy concerns and impact.…”
Section: Table 1 Some Known Privacy Violation and Finesmentioning
confidence: 99%
“…Finally, a policy analysis framework is also required for community centered collaborative systems, such as online social networks and collaborative editing platforms, which may be seen as federated applications that handle Big Data. Recent surveys pointed out that these systems typically provide rudimentary forms of access control (Paci et al 2018). A key requirement for access control models tailored for collaborative systems is to allow users to understand collaborative decisions, as well as to inspect users access preferences, and to evaluate their effects (Paci et al 2018).…”
Section: Policy Analysis Toolsmentioning
confidence: 99%
“…Recent surveys pointed out that these systems typically provide rudimentary forms of access control (Paci et al 2018). A key requirement for access control models tailored for collaborative systems is to allow users to understand collaborative decisions, as well as to inspect users access preferences, and to evaluate their effects (Paci et al 2018). Paci et al (2018) claim that, although a few work exist which explain the effect of access decisions , and the reasons for which certain decisions have been taken (den Hartog and Zannone 2016), the above mentioned requirements are still largely understudied.…”
Section: Policy Analysis Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many definitions for privacy -see for example [31]; [24][33] present surveys on multi-party privacy. Tavani [35] classified privacy theories into four broad types: the nonintrusion, seclusion, limitation, and control theories.…”
Section: Privacymentioning
confidence: 99%