Proceedings of the 20th ACM Symposium on Access Control Models and Technologies 2015
DOI: 10.1145/2752952.2752967
|View full text |Cite
|
Sign up to set email alerts
|

A Logical Approach to Restricting Access in Online Social Networks

Abstract: Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary decisions to utilize users' blacklists in access control policies, resulting into eight access restrictions. We formally define these restrictions in a hybrid logic for relationship-based access control, and provide syntactical transformations to rewrite a hybrid logic access control formula when fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…[11,15], is important in sharing ecosystems. Relationship-based access-control [3,14,31,43], its policy negotiation [31], and its modelling languages [38] seem to fit well user experiences in sharing ecosystems.…”
Section: Sharing and Collaborationmentioning
confidence: 99%
“…[11,15], is important in sharing ecosystems. Relationship-based access-control [3,14,31,43], its policy negotiation [31], and its modelling languages [38] seem to fit well user experiences in sharing ecosystems.…”
Section: Sharing and Collaborationmentioning
confidence: 99%
“…A fragment of hybrid logic was used to express complex relationship-based access control policies such as "at least three friends". Several other works [19][20][21] also utilized the hybrid logic to support better expression capacity of access control needs.…”
Section: Related Workmentioning
confidence: 99%
“…Nowadays, many people use their OSN services on mobile devices, e.g., 80% of Twitter's active users are on mobile 6 . To adapt to this trend, major OSNs add new functionalities to their mobile versions, one of which is location sharing, namely checkin, through mobiles' GPS sensors.…”
Section: The Datasetmentioning
confidence: 99%
“…In [3], access control policies are defined by semantic web technologies. The authors of in [9,2] propose to use hybrid logic as the policy language, this logic has been demonstrated quite powerful and later be used in several works including [22,7,14,17,6,15].…”
Section: Related Workmentioning
confidence: 99%