메뉴 건너뛰기




Volumn , Issue , 2012, Pages 646-655

Relationship-based access control for online social networks: Beyond user-to-user relationships

Author keywords

Access Control; Security; Social Networks

Indexed keywords

ACCESS CONTROL MODELS; AUTHORIZATION POLICY; CONFLICT RESOLUTION; EXPRESSIVE POWER; HOP COUNT; ON-LINE SOCIAL NETWORKS; ONLINE SOCIAL NETWORKS (OSNS); POLICY SPECIFICATION LANGUAGES; RESOURCE OWNERS; SECURITY; SOCIAL GRAPHS; SOCIAL NETWORKS; USER ACTIVITY;

EID: 84873637026     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SocialCom-PASSAT.2012.57     Document Type: Conference Paper
Times cited : (84)

References (29)
  • 4
    • 0040884892 scopus 로고    scopus 로고
    • A flexible authorization mechanism for relational data management systems
    • Apr.
    • E. Bertino, S. Jajodia, and P. Samarati. A flexible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst., 17(2):101-140, Apr. 1999
    • (1999) ACM Trans. Inf. Syst. , vol.17 , Issue.2 , pp. 101-140
    • Bertino, E.1    Jajodia, S.2    Samarati, P.3
  • 7
    • 79951679488 scopus 로고    scopus 로고
    • Semantic web-based social network access control
    • Special Issue on Access Control Methods and Technologies
    • B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. Semantic web-based social network access control. Computers and Security, 30(2C3):108-115, 2011. Special Issue on Access Control Methods and Technologies
    • (2011) Computers and Security , vol.30 , Issue.2-3 , pp. 108-115
    • Carminati, B.1    Ferrari, E.2    Heatherly, R.3    Kantarcioglu, M.4    Thuraisingham, B.5
  • 10
  • 12
    • 34347273369 scopus 로고    scopus 로고
    • High level conflict management strategies in advanced access control models
    • Proceedings of the First Workshop in Information and Computer Security (ICS 2006)
    • F. Cuppens, N. Cuppens-Boulahia, and M. B. Ghorbel. High level conflict management strategies in advanced access control models. Electronic Notes in Theoretical Computer Science, 186(0):3-26, 2007. Proceedings of the First Workshop in Information and Computer Security (ICS 2006)
    • (2007) Electronic Notes in Theoretical Computer Science , vol.1860 , pp. 3-26
    • Cuppens, F.1    Cuppens-Boulahia, N.2    Ghorbel, M.B.3
  • 22
    • 78649313265 scopus 로고    scopus 로고
    • Osnac: An ontology-based access control model for social networking systems
    • A. Masoumzadeh and J. Joshi. Osnac: An ontology-based access control model for social networking systems. In IEEE Social Computing (SocialCom), 2010
    • (2010) IEEE Social Computing (SocialCom
    • Masoumzadeh, A.1    Joshi, J.2
  • 23
    • 0002687371 scopus 로고
    • The small world problem
    • S. Milgram. The small world problem. Psychology Today, 2(1):60-67, 1967
    • (1967) Psychology Today , vol.2 , Issue.1 , pp. 60-67
    • Milgram, S.1
  • 25
    • 80052620039 scopus 로고    scopus 로고
    • A user-activity-centric framework for access control in online social networks
    • sept.-oct.
    • J. Park, R. Sandhu, and Y. Cheng. A user-activity-centric framework for access control in online social networks. Internet Computing, IEEE, 15(5):62-65, sept.-oct. 2011
    • (2011) Internet Computing, IEEE , vol.15 , Issue.5 , pp. 62-65
    • Park, J.1    Sandhu, R.2    Cheng, Y.3
  • 26
    • 0026119329 scopus 로고
    • A model of authorization for next-generation database systems
    • Mar.
    • F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. ACM Trans. Database Syst., 16(1):88-131, Mar. 1991
    • (1991) ACM Trans. Database Syst. , vol.16 , Issue.1 , pp. 88-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 29
    • 0001504032 scopus 로고
    • An experimental study of the small world problem
    • J. Travers and S. Milgram. An experimental study of the small world problem. Sociometry, 32(4):pp. 425-443, 1969.
    • (1969) Sociometry , vol.32 , Issue.4 , pp. 425-443
    • Travers, J.1    Milgram, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.