Role Based Access Control for Social Network Sites

被引:14
作者
Li, Jianguo [2 ]
Tang, Yong [1 ]
Mao, Chengjie [1 ]
Lai, Hanjiang [2 ]
Zhu, Jun [2 ]
机构
[1] South China Normal Univ, Sch Comp, Guangzhou, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Dept Comp Sci, Guangzhou 510275, Guangdong, Peoples R China
来源
JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING | 2009年
关键词
D O I
10.1109/JCPC.2009.5420153
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Social network sites are very popular and draw a number of users' attention in the time of Web 2.0. In this paper, we emphasize the access control research about social network sites from the perspective that roles imply patterns of relationships. We analyze the access control requirement of social network site, and introduce the role into it. Most important of all is that we propose the role base access control model for social network sites and define it with formal description. In the end, we build a social network site called SCHOLAT that targets toward specific groups who are scholars. We implement SCHOLAT and give the steps of resource request-reply procedure.
引用
收藏
页码:389 / +
页数:2
相关论文
共 10 条
  • [1] Private relationships in social networks
    Carminati, Barbara
    Ferrari, Elena
    Perego, Andrea
    [J]. 2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1-2, 2007, : 163 - 171
  • [2] Carminati B, 2006, LECT NOTES COMPUT SC, V4278, P1734
  • [3] DiMicco J, 2008, CSCW: 2008 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK, CONFERENCE PROCEEDINGS, P711
  • [4] Gross R, 2005, P 2005 ACM WORKSH PR, P71, DOI DOI 10.1145/1102199.1102214
  • [5] Nasirifard P, 2008, LECT NOTES COMPUT SC, V5332, P1122
  • [6] The RRA97 model for role-based administration of role hierarchies
    Sandhu, R
    Munawer, Q
    [J]. 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 39 - 49
  • [7] Sandhu R., 1996, P 1 ACM WORKSH ROL B
  • [8] SANDHU R., 1999, ACM T INFORM SYST SE, V2, P105
  • [9] Simpson A., 2008, Proceedings of the Workshop on Security in Opportunistic and Social Networks, P1, DOI DOI 10.1145/1461469.1461470
  • [10] VASCELLARO JE, 2007, WALL STREET J 0828