2008 Third International Conference on Convergence and Hybrid Information Technology 2008
DOI: 10.1109/iccit.2008.197
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Privacy Enhancement for Access Control Model in Web 3.0

Abstract: The recent web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The web technology provides the increment of the social networking ability. However it deepens the exposure of privacy about personal information as more complicating and difficult problems. Representatively, it is impossible to define and manage the specific relation, so the personal information and interest can be inferred from collecting and summarizing the contents. Also, there ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Lockr (Tootoonchian et al, 2008) used social relationships to control access in a Web 2.0 environment. Cho et al (2008) argue that privacy-enhanced access control is an effective method for controlling web data to protect privacy based on the tag ontology. However, no empirical data exist to evaluate these methods.…”
Section: Literature Review 21 Related Workmentioning
confidence: 99%
“…Lockr (Tootoonchian et al, 2008) used social relationships to control access in a Web 2.0 environment. Cho et al (2008) argue that privacy-enhanced access control is an effective method for controlling web data to protect privacy based on the tag ontology. However, no empirical data exist to evaluate these methods.…”
Section: Literature Review 21 Related Workmentioning
confidence: 99%
“…There are several access control mechanisms, which can be used in social environments. For example privacy enhanced access control (PEAC) (Cho et al , 2008) is designed for Web 3.0. The PEAC model includes user, social network, tag, and web content.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Keeping secrets private within groups is important in online social activities. However there is no satisfactory access control mechanism for protecting private data in today's web systems such as blogs (Cho et al , 2008). The goal of access control mechanisms is to achieve confidentiality and integrity in information sharing activities (Ferraiolo et al , 2003; Samarati and Capitani de Vimercati, 2001; He and Antón, 2009).…”
Section: Introductionmentioning
confidence: 99%