2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing 2011
DOI: 10.1109/passat/socialcom.2011.82
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Policy-Private Resource Sharing in an Online Social Network

Abstract: Providing functionalities that allow online social network users to manage in a secure and private way the publication of their information and/or resources is a relevant and far from trivial topic that has been under scrutiny from various research communities. In this work, we provide a framework that allows users to define highly expressive access policies to their resources in a way that the enforcement does not require the intervention of a (trusted or not) third party. This is made possible by the deploym… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…owner-overrides, full-consensus-permit, majority permit). owner-overrides/fullconsensus-permit/ majority permit/ strongmajority permit/ supermajority permit Score based on sensitivity level and its aggregation B. Carminati et al [9] n-distance users/ One, all or the most trust voted option K. Thomas et al [10] Full consensus González-Mazano et al [11] Based on attributes Each user manages conditions and their objects' parts obligations R. Baden et al [14] Based on attributes S. Jahid et al [22] Based on attributes S. Braghin et al [23] Based on attributes Secondly, Squicciarini et al proposals point out the secretly specification of preferences. In particular, work in [6] proposes a voting scheme in which by default, co-owners (called stakeholders) have no knowledge of other users preferences.…”
Section: Approaches To Anonymity In Osnsmentioning
confidence: 99%
See 2 more Smart Citations
“…owner-overrides, full-consensus-permit, majority permit). owner-overrides/fullconsensus-permit/ majority permit/ strongmajority permit/ supermajority permit Score based on sensitivity level and its aggregation B. Carminati et al [9] n-distance users/ One, all or the most trust voted option K. Thomas et al [10] Full consensus González-Mazano et al [11] Based on attributes Each user manages conditions and their objects' parts obligations R. Baden et al [14] Based on attributes S. Jahid et al [22] Based on attributes S. Braghin et al [23] Based on attributes Secondly, Squicciarini et al proposals point out the secretly specification of preferences. In particular, work in [6] proposes a voting scheme in which by default, co-owners (called stakeholders) have no knowledge of other users preferences.…”
Section: Approaches To Anonymity In Osnsmentioning
confidence: 99%
“…Moreover, we can compare our system with closely related work such as the framework in [15] also implemented as a FB application. In their experiments, authors found linearity between the framework performance and the resource size, mainly due to the use of content encryption, e.g.…”
Section: Resource Access Implementation and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Park et al [10] √ √ √ √ √ √ CVD. Munckhof [22] √ √ S. Jahid et al [9] P √ R. Baden et al [8] P √ S. Braghin et al [34] √ P √ OBAC A. Masoumzadeh et al [15] √ P √ √ P √ √ P B. Carminati et al [7] √ √ M. Alizadeh et al [35] √ √ : A feature is completely expressed P : A feature is not completely expressed In regard to exible attributes (F6, P1, P4 and P7), the model proposed by J. Park et al [10] is the most expressive one, attaining the proper specication of P1 and P7.…”
Section: Wbsn Features and Access Control Policiesmentioning
confidence: 99%
“…al. [18] present ways to secure and share private information in social networks and others [19] who use attribute based cryptography to overlay a security layer on information sharing in OSNs. These and other such methods are orthogonal to our problem of finding or recommending profile sharing for enterprise users.…”
Section: Related Workmentioning
confidence: 99%