메뉴 건너뛰기




Volumn 25, Issue 7, 2013, Pages 1614-1627

Multiparty access control for online social networks: Model and mechanisms

Author keywords

multiparty access control; policy specification and management; security model; Social network

Indexed keywords

ACCESS CONTROL MODELS; LOGICAL REPRESENTATIONS; ON-LINE SOCIAL NETWORKS; ONLINE SOCIAL NETWORKS (OSNS); POLICY SPECIFICATION; SECURITY AND PRIVACY ISSUES; SECURITY MODEL; SOCIAL NETWORKS;

EID: 84878326313     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2012.97     Document Type: Article
Times cited : (178)

References (41)
  • 1
    • 84878287461 scopus 로고    scopus 로고
    • Facebook Developers
    • Facebook Developers, http://developers.facebook.com/, 2013.
    • (2013)
  • 2
    • 84878299815 scopus 로고    scopus 로고
    • Facebook Privacy Policy
    • Facebook Privacy Policy, http://www.facebook.com/policy.php/, 2013.
    • (2013)
  • 3
    • 84878273980 scopus 로고    scopus 로고
    • Facebook Statistics
    • Facebook Statistics, http://www.facebook.com/press/info. php?statistics, 2013.
    • (2013)
  • 4
    • 84878284313 scopus 로고    scopus 로고
    • Google+ Privacy Policy
    • Google+ Privacy Policy, http://http://www.google.com/intl/en/+/policy/, 2013.
    • (2013)
  • 5
    • 84878316652 scopus 로고    scopus 로고
    • The Google+ Project
    • The Google+ Project, https://plus.google.com, 2013.
    • (2013)
  • 6
    • 34548089388 scopus 로고    scopus 로고
    • Towards realizing a formal RBAC model in real systems
    • DOI 10.1145/1266840.1266875, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
    • G. Ahn and H. Hu, "Towards Realizing a Formal RBAC Model in Real Systems," Proc. 12th ACM Symp. Access Control Models and Technologies, pp. 215-224, 2007. (Pubitemid 47287492)
    • (2007) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , pp. 215-224
    • Ahn, G.-J.1    Hu, H.2
  • 9
    • 84865622599 scopus 로고    scopus 로고
    • All your contacts are belong to us: Automated identity theft attacks on social networks
    • L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, "All Your Contacts Are Belong to Us: Automated Identity theft Attacks on Social Networks," Proc. 18th Int'l Conf. World Wide Web, pp. 551-560, 2009.
    • (2009) Proc. 18th Int'l Conf. World Wide Web , pp. 551-560
    • Bilge, L.1    Strufe, T.2    Balzarotti, D.3    Kirda, E.4
  • 14
    • 78951478727 scopus 로고    scopus 로고
    • Collaborative face recognition for improved face annotation in personal photo collections shared on online social networks
    • Feb.
    • J. Choi, W. De Neve, K. Plataniotis, and Y. Ro, "Collaborative Face Recognition for Improved Face Annotation in Personal Photo Collections Shared on Online Social Networks," IEEE Trans. Multimedia, vol. 13, no. 1, pp. 14-28, Feb. 2011.
    • (2011) IEEE Trans. Multimedia , vol.13 , Issue.1 , pp. 14-28
    • Choi, J.1    De Neve, W.2    Plataniotis, K.3    Ro, Y.4
  • 16
    • 80051972853 scopus 로고    scopus 로고
    • Preventing sybil attacks by privilege attenuation: A design principle for social network systems
    • P. Fong, "Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems," Proc. IEEE Symp. Security and Privacy (SP), pp. 263-278, 2011.
    • (2011) Proc. IEEE Symp. Security and Privacy (SP) , pp. 263-278
    • Fong, P.1
  • 20
    • 0016984825 scopus 로고
    • Protection in operating systems
    • M. Harrison, W. Ruzzo, and J. Ullman, "Protection in Operating Systems," Comm. ACM, vol. 19, no. 8, pp. 461-471, 1976.
    • (1976) Comm. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.1    Ruzzo, W.2    Ullman, J.3
  • 25
    • 84855703428 scopus 로고    scopus 로고
    • Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
    • H. Hu, G.-J. Ahn, and J. Jorgensen, "Detecting and Resolving Privacy Conflicts for Collaborative Data Sharing in Online Social Networks," Proc. 27th Ann. Computer Security Applications Conf, pp. 103-112, 2011.
    • (2011) Proc. 27th Ann. Computer Security Applications Conf , pp. 103-112
    • Hu, H.1    Ahn, G.-J.2    Jorgensen, J.3
  • 29
    • 0031238275 scopus 로고    scopus 로고
    • Application of majority voting to pattern recognition: An analysis of its behavior and performance
    • PII S1083442797062024
    • L. Lam and C.Y. Suen, "Application of Majority Voting to Pattern Recognition: An Analysis of Its Behavior and Performance," IEEE Trans. Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 27, no. 5, pp. 553-568, Sept. 1997. (Pubitemid 127770722)
    • (1997) IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans. , vol.27 , Issue.5 , pp. 553-568
    • Lam, L.1    Suen, C.Y.2
  • 30
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • DOI 10.1145/1066100.1066103
    • N. Li, J. Mitchell, and W. Winsborough, "Beyond Proof-of-Compliance: Security Analysis in Trust Management," J. ACM, vol. 52, no. 3, pp. 474-514, 2005. (Pubitemid 43078378)
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 41
    • 77954584058 scopus 로고    scopus 로고
    • To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
    • E. Zheleva and L. Getoor, "To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles," Proc. 18th Int'l Conf. World Wide Web, pp. 531-540, 2009.
    • (2009) Proc. 18th Int'l Conf. World Wide Web , pp. 531-540
    • Zheleva, E.1    Getoor, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.