2016
DOI: 10.1016/j.comcom.2016.01.001
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-driven access control in social networks by means of automatic semantic annotation

Abstract: In online social networks (OSN), users quite usually disclose sensitive information about themselves by publishing messages. At the same time, they are (in many cases) unable to properly manage the access to this sensitive information due to the following issues: i) the rigidness of the access control mechanism implemented by the OSN, and ii) many users lack of technical knowledge about data privacy and access control. To tackle these limitations, in this paper, we propose a dynamic, transparent and privacy-dr… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 24 publications
(53 reference statements)
0
16
0
Order By: Relevance
“…Tsai et al [17] built a cloud access control model by using roles ontology based RBAC model, and proposed an ontology transfer algorithm for similarity calculating in different ontology. Imran-Daud et al [56] used semantic network technology and raised a dynamic and privacy-driven access control model. By using knowledge base and language tools to replace the pre-defined sensitive words set, they propose an automatically method to assess the degree of sensitiveness.…”
Section: Researches On Multi-clouds Access Controlmentioning
confidence: 99%
“…Tsai et al [17] built a cloud access control model by using roles ontology based RBAC model, and proposed an ontology transfer algorithm for similarity calculating in different ontology. Imran-Daud et al [56] used semantic network technology and raised a dynamic and privacy-driven access control model. By using knowledge base and language tools to replace the pre-defined sensitive words set, they propose an automatically method to assess the degree of sensitiveness.…”
Section: Researches On Multi-clouds Access Controlmentioning
confidence: 99%
“…However, in our setting, documents are generated independently by each user and, thus, they should be protected individually according to the semantics they disclose; free text is also unstructured and unbounded. Moreover, we would like the instantiation of the privacy model to be intuitive enough so that it can be employed by users to clearly define their privacy requirements; at this respect, most privacy models are instantiated by means of abstract numerical values [21,28,30], which many users find difficult to understand [31,32]. Finally, we would also like to seamlessly support protection against identity and/or attribute disclosure.…”
Section: Data Protection With Privacy Guaranteesmentioning
confidence: 99%
“…Anwar and Fong [22] designed a visualization tool to show the result of policy configurations. In [23], the authors presented an access control mechanism to protect textual contents in online social networks which is enforced to be transparent to content publishers and readers. The proposed system leveraged automatic semantic annotation to analyze the semantics of the contents in order to generate different versions according to types of readers.…”
Section: Related Workmentioning
confidence: 99%