Affiliation:
1. DICOM, Università degli Studi dell'Insubria, Varese, Italy
Abstract
In this article, we propose an access control mechanism for Web-based social networks, which adopts a rule-based approach for specifying access policies on the resources owned by network participants, and where authorized users are denoted in terms of the type, depth, and trust level of the relationships existing between nodes in the network. Different from traditional access control systems, our mechanism makes use of a semidecentralized architecture, where access control enforcement is carried out client-side. Access to a resource is granted when the requestor is able to demonstrate being authorized to do that by providing a proof. In the article, besides illustrating the main notions on which our access control model relies, we present all the protocols underlying our system and a performance study of the implemented prototype.
Funder
Ministero dell'Istruzione, dell'Università e della Ricerca
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference40 articles.
1. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions
2. A trust based approach for protecting user data in social networks
3. A trust-enhanced recommender system application
4. N3Logic: A logical framework for the World Wide Web
5. Berteau S. 2007. Facebook's misrepresentation of Beacon's threat to privacy: Tracking users who opt out or are not logged in. CA Security Advisor Research Blog. http://community.ca.com/blogs/securityadvisor/archive/2007/11/29/facebook-s-isrepresentation-ofbeacon-s-threat-to-privacy-tracking-users-who-opt-out-or-are-not-logged-in.aspx. Berteau S. 2007. Facebook's misrepresentation of Beacon's threat to privacy: Tracking users who opt out or are not logged in. CA Security Advisor Research Blog. http://community.ca.com/blogs/securityadvisor/archive/2007/11/29/facebook-s-isrepresentation-ofbeacon-s-threat-to-privacy-tracking-users-who-opt-out-or-are-not-logged-in.aspx.
Cited by
145 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献