CPBAC: Property-based access control model for secure cooperation in online social networks

Computers & Security - Tập 41 - Trang 19-39 - 2014
Youna Jung1, James B.D. Joshi2
1ACIS Lab., Department of Electrical and Computer Engineering, University of Florida, P.O. Box 116200, 339E Larsen Hall, Gainesville, FL 32611 6200, USA
2LERSAIS, Department of Information Science, University of Pittsburgh, 410 IS Building, 135 N. Bellefield Avenue, Pittsburgh, PA 15260, USA

Tài liệu tham khảo

ABC News, 2011 Bruns G, Fong PWL, Siahaan I, Huth M. Relationship-based access control: its expression and enforcement through hybrid logic. The 2nd ACM Conference on Data and Application Security and Privacy (CODASPY 2012). San Antonio, USA. February 7–9 2012. p.117–124. Carminati, 2011, Semantic web-based social network access control, Computers & Security, 30, 108, 10.1016/j.cose.2010.08.003 Carminati, 2009, Enforcing access control in web-based social networks, ACM Transactions on Informationand System Security (TISSEC), 13, 1, 10.1145/1609956.1609962 Cutillo, 2009, Safebook: a privacy-preserving online social network leveraging on real-life trust, IEEE Communications, 47, 94, 10.1109/MCOM.2009.5350374 Healthcare Ferraiolo D, Cugini J, Kuhn D R. Role-based access control (RBAC): features and motivations. The Computer Security Applications Conference December 1995. pp. 241–248. Fong PWL, Siahaan I. Relationship-based access control policies and their policy languages. 16th ACM symposium on access control models and technologies (SACMAT’11). New York 2011. p.51–60 Fox News Gates CE. Access control requirements for web 2.0 security and privacy. IEEE Workshop on Web 2.0 Security & Privacy (W2SP’07) May 2007. Oakland, California, USA. Jung, 2012, CRiBAC: community-centric role interaction based access control model, Computers & Security, 31, 497, 10.1016/j.cose.2012.02.002 Jung, 2010, Situation-aware community computing model for developing dynamic ubiquitous computing systems, Journal of Universal Computer Science, 16, 2139 Parameswaran, 2007, Social computing: an overview, Communications of the Association for Information Systems, 19, 762, 10.17705/1CAIS.01937 Park J, Sandhu R, Cheng Y. ACON: activity-centric access control for social computing. The 6th International Conference on Availability, Reliability and Security (ARES) August 2011. pp.242–247 Statistic Brain Twitter. Fidofinder. https://twitter.com/fidofinder. Twitter. Lost dog found. https://twitter.com/TheLDFBand. Twitter Zhang, 2010, Privacy and security for online social networks: challenges and opportunities, IEEE Network, 24, 13, 10.1109/MNET.2010.5510913