2008
DOI: 10.1007/978-3-540-88625-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Beyond User-to-User Access Control for Online Social Networks

Abstract: Abstract. With the development of Web 2.0 technologies, online social networks are able to provide open platforms to enable the seamless sharing of profile data to enable public developers to interface and extend the social network services as applications (or APIs). At the same time, these open interfaces pose serious privacy concerns as third party applications are usually given full read access to the user profiles. Current related research has focused on mainly user-to-user interactions in social networks,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 15 publications
0
15
0
Order By: Relevance
“…Researchers have examined various security mechanisms for protecting personal information, such as on social network sites [3,8,21]. Others have investigated interfaces for representing such policies [18,20,24].…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have examined various security mechanisms for protecting personal information, such as on social network sites [3,8,21]. Others have investigated interfaces for representing such policies [18,20,24].…”
Section: Introductionmentioning
confidence: 99%
“…Several works address the problem of untrustworthy TPAs by limiting their access to sensitive user data in the first place [1,3,5,21,22]: Anthonysamy et al [1] implement a trusted proxy through which all requests to the Facebook API are redirected. Responses from Facebook are only forwarded to the TPA after sensitive data was sanitized in correspondence with the user's configuration.…”
Section: Limitationsmentioning
confidence: 99%
“…We found their research indicates user's utilization of community data in making their privacy descisions.they proposed two approaches for reducing the effects and we believe the can complement our work. Shehab et al [10] proposed an access control framework which allows users to specify their data attributes to share with applications which demands many changes to the existing authorization models and also requires developers to go through a prominent process of deployment model. Our proposed framework consolidate seamlessly into existing authorization model and requires no additional efforts from the developers as well.…”
Section: Related Workmentioning
confidence: 99%