Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies 2017
DOI: 10.1145/3078861.3078875
|View full text |Cite
|
Sign up to set email alerts
|

Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 42 publications
(33 citation statements)
references
References 22 publications
0
33
0
Order By: Relevance
“…Similarly to a controlled experiment, this type of study involves observing users while they are performing specific access control tasks. However, the main difference lies in the Evaluation Method Feature studied Source Controlled Experiment Usefulness, Understanding, [Squicciarini et al 2010] Fairness of Collaborative Privacy Settings Balance between privacy protection and data sharing [Hu et al 2012] Likability, Simplicity [Hu et al 2011;Hu et al 2013] Control [Hu et al 2011;Hu et al 2013;Vishwamitra et al 2017 [Squicciarini et al 2010] Policy Generation Time ] Policy Integration Time [Mazzoleni et al 2008] Policy Evaluation Time [Damen et al 2014;Hu et al 2013;Mahmudlu et al 2016;Mazzoleni et al 2008;Vishwamitra et al 2017] Certificate Path Discovery Time, [Carminati et al 2009 [Damen et al 2014] Table VII: Evaluation methods applied to access control systems tailored to community-centered environments effect that is assessed: in controlled experiments it can be the cost, effectiveness, correctness of policies, etc., while in this type of study the focus is placed only on usability. -Performance Evaluation.…”
Section: Evaluation Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…Similarly to a controlled experiment, this type of study involves observing users while they are performing specific access control tasks. However, the main difference lies in the Evaluation Method Feature studied Source Controlled Experiment Usefulness, Understanding, [Squicciarini et al 2010] Fairness of Collaborative Privacy Settings Balance between privacy protection and data sharing [Hu et al 2012] Likability, Simplicity [Hu et al 2011;Hu et al 2013] Control [Hu et al 2011;Hu et al 2013;Vishwamitra et al 2017 [Squicciarini et al 2010] Policy Generation Time ] Policy Integration Time [Mazzoleni et al 2008] Policy Evaluation Time [Damen et al 2014;Hu et al 2013;Mahmudlu et al 2016;Mazzoleni et al 2008;Vishwamitra et al 2017] Certificate Path Discovery Time, [Carminati et al 2009 [Damen et al 2014] Table VII: Evaluation methods applied to access control systems tailored to community-centered environments effect that is assessed: in controlled experiments it can be the cost, effectiveness, correctness of policies, etc., while in this type of study the focus is placed only on usability. -Performance Evaluation.…”
Section: Evaluation Methodsmentioning
confidence: 99%
“…A different experimental design that does not suffer of internal validity has been adopted in [Hu et al 2011;Hu et al 2013;Such and Criado 2016;Rajtmajer et al 2016;Vishwamitra et al 2017]. In these experiments, the subjects performed a task using the proposed access control system.…”
Section: Evaluation Methodsmentioning
confidence: 99%
See 3 more Smart Citations