메뉴 건너뛰기




Volumn , Issue , 2011, Pages 263-278

Preventing Sybil attacks by Privilege Attenuation: A design principle for Social Network Systems

Author keywords

Access control; Policy analysis; Principle of Privilege Attenuation; Social Network Systems; Soundness and completeness of static analysis; Sybil attacks

Indexed keywords

AUTHORIZATION; COMPUTER CRIME; GRAPH THEORY; SOCIAL NETWORKING (ONLINE);

EID: 80051972853     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.16     Document Type: Conference Paper
Times cited : (32)

References (40)
  • 2
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • Computer Science Laboratory
    • J. Rushby, "Noninterference, transitivity, and channel-control security policies," Computer Science Laboratory, SRI International, Tech. Rep. CSL 92-02, 1992.
    • (1992) SRI International, Tech. Rep. CSL 92-02
    • Rushby, J.1
  • 3
    • 84873621535 scopus 로고    scopus 로고
    • Access control requirements for web 2.0 security and privacy
    • Oakland, California, USA, May
    • C. E. Gates, "Access control requirements for Web 2.0 security and privacy," in IEEE Web 2.0 privacy and security workship (W2SP'07), Oakland, California, USA, May 2007.
    • (2007) IEEE Web 2.0 Privacy and Security Workship (W2SP'07)
    • Gates, C.E.1
  • 8
    • 79952792326 scopus 로고    scopus 로고
    • Department of Computer Science, University of Calgary, Calgary, Alberta, Canada, Tech. Rep. 2010-959-08, Jul. submitted for review
    • M. Anwar, Z. Zhao, and P. W. L. Fong, "An access control model for Facebook-style social network systems," Department of Computer Science, University of Calgary, Calgary, Alberta, Canada, Tech. Rep. 2010-959-08, Jul. 2010, submitted for review.
    • (2010) An Access Control Model for Facebook-style Social Network Systems
    • Anwar, M.1    Zhao, Z.2    Fong, P.W.L.3
  • 13
    • 45749109010 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • Jun.
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, "SybilGuard: Defending against Sybil attacks via social networks," IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 576-589, Jun. 2008.
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.D.4
  • 17
    • 0000338326 scopus 로고
    • Programming semantics for multipro-grammed computations
    • Mar.
    • J. B. Dennis and E. C. V. Horn, "Programming semantics for multipro-grammed computations," Communications of the ACM, vol. 9, no. 3, pp. 143-155, Mar. 1966.
    • (1966) Communications of the ACM , vol.9 , Issue.3 , pp. 143-155
    • Dennis, J.B.1    Horn, E.C.V.2
  • 18
    • 33646166700 scopus 로고    scopus 로고
    • System Research Lab, Department of Computer Science, The John Hopkins University, Baltimore, Maryland, USA, Tech. Rep. SRL2003-02
    • M. S. Miller, K.-P. Yee, and J. Shapiro, "Capability myths demolished," System Research Lab, Department of Computer Science, The John Hopkins University, Baltimore, Maryland, USA, Tech. Rep. SRL2003-02, 2003.
    • (2003) Capability Myths Demolished
    • Miller, M.S.1    Yee, K.-P.2    Shapiro, J.3
  • 20
    • 27544510789 scopus 로고    scopus 로고
    • On safety in discretionary access control
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • N. Li and M. V. Tripunitara, "On safety in discretionary access control," in Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P'05), Oakland, California, USA, May 2005, pp. 96-109. (Pubitemid 41543649)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 96-109
    • Li, N.1    Tripunitara, M.V.2
  • 21
    • 0017271333 scopus 로고
    • Fault tolerant operating systems
    • Dec.
    • P. J. Denning, "Fault tolerant operating systems," ACM Computing Surveys, vol. 8, no. 4, pp. 359-389, Dec. 1976.
    • (1976) ACM Computing Surveys , vol.8 , Issue.4 , pp. 359-389
    • Denning, P.J.1
  • 35
    • 78650520974 scopus 로고    scopus 로고
    • Privacy policies for shared content in social network sites
    • to appear
    • A. C. Squicciarini, M. Shehab, and J. Wede, "Privacy policies for shared content in social network sites," The VLDB Journal, 2010, to appear.
    • (2010) The VLDB Journal
    • Squicciarini, A.C.1    Shehab, M.2    Wede, J.3
  • 38
    • 34548349212 scopus 로고    scopus 로고
    • Limiting sybil attacks in structured P2P networks
    • DOI 10.1109/INFCOM.2007.328, 4215910, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • H. Rowaihy, W. Enck, P. McDaniel, and T. L. Porta, "Limiting Sybil attacks in structured P2P networks," in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM'07), Anchorage, Alaska, USA, May 2007, pp. 2596-2600. (Pubitemid 47334528)
    • (2007) Proceedings - IEEE INFOCOM , pp. 2596-2600
    • Rowaihy, H.1    Enck, W.2    McDaniel, P.3    La Porta, T.4
  • 40
    • 0019713652 scopus 로고
    • Theft and conspiracy in the take-grant protection model
    • DOI 10.1016/0022-0000(81)90069-6
    • L. Snyder, "Theft and conspiracy in the take-grant protection model," Journal of Computer and System Sciences, vol. 23, no. 3, pp. 333-347, 1981. (Pubitemid 12473231)
    • (1981) Journal of Computer and System Sciences , vol.23 , Issue.3 , pp. 333-347
    • Snyder Lawrence1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.