2011 IEEE International Symposium on Policies for Distributed Systems and Networks 2011
DOI: 10.1109/policy.2011.50
|View full text |Cite
|
Sign up to set email alerts
|

Policy-Based Access Control in Mobile Social Ecosystems

Abstract: Abstract-The novel scenarios enabled by emerging mobile social applications raise serious concerns regarding access control of users' contextual and social data. Given the variety of existing and upcoming social applications, it is important to provide (i) generic yet flexible policy models that combine expressivity with personalization, (ii) actual running infrastructures to enforce policy-based access control on heterogenous devices with minimal development/deployment effort, and (iii) user-interfaces to all… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…The important utility function knows as social welfare is given that act as a decreasing function the content age. The objective is finding the optimal bandwidth allocation that can help to maximize the utility [102,103].…”
Section: Opportunistic Approachesmentioning
confidence: 99%
“…The important utility function knows as social welfare is given that act as a decreasing function the content age. The objective is finding the optimal bandwidth allocation that can help to maximize the utility [102,103].…”
Section: Opportunistic Approachesmentioning
confidence: 99%
“…In MSNs, Hachem et al [47] propose a policy framework for controlling access to social data in mobile applications. This framework allows the representation of expressive policies based on users' social interactions while keeping policy model compatibility.…”
Section: A Access Controlmentioning
confidence: 99%
“…The fundamental aim of security is to protect the information and the resources against attacks and misbehavior throughout the network. In order to unify endpoint security technology and define security policies, scholars have equipped MSNs with access controls [41]- [47] as a means of classical defense. However, one cannot suffice to this method alone.…”
Section: Introductionmentioning
confidence: 99%
“…Among others, it also supports addressing of entities and attribute comparisons and is integrated seamlessly with the application model. Hachem et al [11] introduced a policy framework for controlling access in mobile applications. This work featured, among others, a policy language which supported expressive policies.…”
Section: Related Workmentioning
confidence: 99%