Proceedings of the 4th ACM Conference on Data and Application Security and Privacy 2014
DOI: 10.1145/2557547.2557555
|View full text |Cite
|
Sign up to set email alerts
|

On protection in federated social computing systems

Abstract: Nowadays, a user may belong to multiple social computing systems (SCSs) in order to benefit from a variety of services that each SCS may provide. To facilitate the sharing of contents across the system boundary, some SCSs provide a mechanism by which a user may "connect" his accounts on two SCSs. The effect is that contents from one SCS can now be shared to another SCS. Although such a connection feature delivers clear usability advantages for users, it also generates a host of privacy challenges. A notable ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…A fragment of hybrid logic was used to express complex relationship-based access control policies such as "at least three friends". Several other works [19][20][21] also utilized the hybrid logic to support better expression capacity of access control needs.…”
Section: Related Workmentioning
confidence: 99%
“…A fragment of hybrid logic was used to express complex relationship-based access control policies such as "at least three friends". Several other works [19][20][21] also utilized the hybrid logic to support better expression capacity of access control needs.…”
Section: Related Workmentioning
confidence: 99%
“…Vulnerabilities and implementation problems have been reported in the SDKs of OSNs [115], and security APIs have been proposed for OSNs [116]. Anderson et al focus on privacy in OSNs in general [117], Tarameshloo et al propose specific privacy policies for information sharing in OSNs [118], which is similar to our work on permission agreements (app-rights), and Ko et al also do research on this subject by studying the flows of private data between third-party applications and sites they connect to [119]. In a broader sense, Birrell and Schneider [64] have compared both existing and deprecated SSO solutions from a privacy perspective, similarly to our early work on authentication solutions.…”
Section: Factors In Third-party Authenticationmentioning
confidence: 99%
“…Later, the authors of [12,4] exploit hybrid logics to specify these fine-grained policies. Their logic is quite expressive and has been used in several other systems [20,21,18], and we adopt the same logic to specify restricted access. In [8], Cheng et al consider not only user-to-user, but also user-to-resource and resource-to-resource relationships in OSNs, which enables them to express new types of policies such as users who are tagged in the same photo with the owner can view his profile can be expressed.…”
Section: Related Workmentioning
confidence: 99%