Collaborative Access Control in On-line Social Networks (Invited Paper)

被引:42
作者
Canninati, Barbara [1 ]
Ferrari, Elena [1 ]
机构
[1] Univ Insubria, DICOM, Varese, Italy
来源
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM) | 2011年
关键词
Social Networks; Collaborative Security Policies; Collaborative Access Control;
D O I
10.4108/icst.collaboratecom.2011.247109
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Topology-based access control is today a de-facto standard for protecting resources in On-line Social Networks (OSNs) both within the research community and commercial OSNs. According to this paradigm, authorization constraints specify the relationships (and possibly their depth and trust level) that should occur between the requestor and the resource owner to make the first able to access the required resource. In this paper, we show how topology-based access control can be enhanced by exploiting the collaboration among OSN users, which is the essence of any OSN. The need of user collaboration during access control enforcement arises by the fact that, different from traditional settings, in most OSN services users can reference other users in resources (e.g., a user can be tagged to a photo), and therefore it is generally not possible for a user to control the resources published by another user. For this reason, we introduce collaborative security policies, that is, access control policies identifying a set of collaborative users that must be involved during access control enforcement. Moreover, we discuss how user collaboration can also be exploited for policy administration and we present an architecture on support of collaborative policy enforcement.
引用
收藏
页码:231 / 240
页数:10
相关论文
共 10 条
[1]  
[Anonymous], THESIS
[2]  
Brickley D., 2005, RDF VOCABULARY SPECI
[3]  
Carminati B, 2010, ADV INFORM KNOWL PRO, P181, DOI 10.1007/978-1-84996-238-4_9
[4]   Enforcing Access Control in Web-Based Social Networks [J].
Carminati, Barbara ;
Ferrari, Elena ;
Perego, Andrea .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
[5]  
Cohen E., 2002, SACMAT 02, P97
[6]  
Hoadley C. M., 2005, SIGGROUP Bulletin, V25, P31
[7]  
Jing Jin, 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P200
[8]  
Lin D, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P103
[9]  
Prud'hommeaux E., 2007, TECH REP
[10]  
Schmidt Michael., 2010, ICDT, P4, DOI DOI 10.1145/1804669.1804675