2007
DOI: 10.1145/1321211.1321251
|View full text |Cite
|
Sign up to set email alerts
|

A trust based approach for protecting user data in social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(38 citation statements)
references
References 9 publications
0
38
0
Order By: Relevance
“…However, this comparison was performed uniquely on the Epinions.com dataset. Ali et al (2007) proposed an access control scheme called Personal Data Access Control, inspired by multi-level security, to allow users to share data among their friends using a trust computation. The user classifies his friends into one of three protection zones that determine whether that friend can obtain access to the user's data.…”
Section: Collaborative Filteringmentioning
confidence: 99%
“…However, this comparison was performed uniquely on the Epinions.com dataset. Ali et al (2007) proposed an access control scheme called Personal Data Access Control, inspired by multi-level security, to allow users to share data among their friends using a trust computation. The user classifies his friends into one of three protection zones that determine whether that friend can obtain access to the user's data.…”
Section: Collaborative Filteringmentioning
confidence: 99%
“…In 2006, Choi et al proposed another D-FOAF-related paper [8] in which they denote authorized users in terms of the minimum trust level and maximum length of the paths between the requester and the resource owner. Ali et al proposed a social access control (SAC) strategy based on multi-level security model [4]. They adopt a multi-level security approach, where trust is the only parameter used to determine the security level of both users and resources [4].…”
Section: Related Workmentioning
confidence: 99%
“…In contrast to the first prototype, we aim at enhancing privacy within the existing centralized OSN landscape while the second prototype differs from our approach as we aim at managing identities and access to personal information beyond OSN boundaries. To additionally improve selective sharing, OSN-specific access control models have been proposed [13], [7], [8], [1]. The D-FOAF architecture proposed in [13] relies on semantic web technologies and utilizes existing OSNs to define access rights based on the relationship between users, which are described by trust level and path length between requester and resource owner.…”
Section: Related Workmentioning
confidence: 99%
“…Based thereupon, the authors propose a rule-based access control model that takes type, depth and trust level of a relationship into consideration. In [1], Ali et al propose a social access control model in which objects and subjects are annotated with trust levels and authentication and access to objects is controlled by a trusted third party. Our context-aware access control mechanism differs from the aforementioned approaches in the following two ways: First, for defining contextual access constraints we only regard contextual information provided by the user (e.g.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation