A Lattice-Based Access Control Model for Social Networks

Y Zhang, K Chen, Y Liu, Y Lian - … International Conference on …, 2016 - ieeexplore.ieee.org
Nowadays, social networks have been used widely. They help people communicate with
family, friends or colleagues easily. However, they are lack of effective protection and …

Access control taxonomy for social networks

A Ahmad, B Whitworth - 2011 7th International Conference on …, 2011 - ieeexplore.ieee.org
Social networks are online platforms where users form relationships with others by sharing
resources. Access control for these social networks is different from other systems as it fulfills …

Policy language for access control in social network cloud

K Morovat, B Panda - 2016 IEEE International Conference on …, 2016 - ieeexplore.ieee.org
Over the past several decades, the number of peopleusing online social networks for public
relations or sharingdocuments have increased significantly. This worldwide use ofsocial …

Request evaluation for policy-based attribute access control in social network cloud

K Morovat, B Panda - 2016 IEEE International Conference on …, 2016 - ieeexplore.ieee.org
In recent years, millions of people are connected on social networks. Social networks have
become an excellent platform for sharing information and communication that reflects real …

A lattice-based privacy aware access control model

K Ghazinour, M Majedi, K Barker - … International Conference on …, 2009 - ieeexplore.ieee.org
As the amount of data being collected by service providers increases, privacy concerns
increase for the data owners that must provide private data to get services. Legislative acts …

A ralation declaration-based access control scheme for social networks

Q Chen, J Liu, J Liu, T Shang - 2011 2nd International …, 2011 - ieeexplore.ieee.org
Secure and fine-grained access control could hardly be guaranteed in today's centralized
social networks which imply to totally delegate to the social networking management system …

A contextual attribute based access control model based on T-JClassicδ∊

K Guesmia, N Boustia - 2015 12th International Symposium on …, 2015 - ieeexplore.ieee.org
Recently, people spend plenty of times daily in social network activities, hence a large
amount of information is created by people which move up a number of privacy and security …

Policy templates for relationship-based access control

E Aktoudianakis, J Crampton… - … on Privacy, Security …, 2013 - ieeexplore.ieee.org
Social Networks were created to allow users to maintain circles of friends and
acquaintances. Over time, they have come to be used to share data objects such as pictures …

RuleSN: Research and application of social network access control model

L Ma, L Tao, Y Zhong, K Gai - … on Big Data Security on Cloud …, 2016 - ieeexplore.ieee.org
Current rapid increasing implementations in data diversity, autonomy and dynamic privilege
management, fine-grained access control in social networks have resulted in various …

[PDF][PDF] Personalized Privacy Protecting Model in Mobile Social Network.

P Wang, Z Wang, T Chen, Q Ma - Computers, Materials & …, 2019 - cdn.techscience.cn
With the rapid development of the new generation of information technology, the analysis of
mobile social network big data is getting deeper and deeper. At the same time, the risk of …