10
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A New Access Control Scheme for Facebook-style Social Networks

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The popularity of online social networks (OSNs) makes the protection of users' private information an important but scientifically challenging problem. In the literature, relationship-based access control schemes have been proposed to address this problem. However, with the dynamic developments of OSNs, we identify new access control requirements which cannot be fully captured by the current schemes. In this paper, we focus on public information in OSNs and treat it as a new dimension which users can use to regulate access to their resources. We define a new OSN model containing users and their relationships as well as public information. Based on this model, we introduce a variant of hybrid logic for formulating access control policies. We exploit a type of category information and relationship hierarchy to further extend our logic for its usage in practice. In the end, we propose a few solutions to address the problem of information reliability in OSNs, and formally model collaborative access control in our access control scheme.

          Related collections

          Author and article information

          Journal
          2013-04-09
          2016-04-01
          Article
          1304.2504
          f2d22b7e-971d-4121-8852-34d3b23911ff

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          Computers & Security, 54, 2015
          cs.CR cs.SI

          Social & Information networks,Security & Cryptology
          Social & Information networks, Security & Cryptology

          Comments

          Comment on this article