Abstract
We hypothesize that, in a Facebook-style social network system, proper visualization of one’s extended neighbourhood could help the user understand the privacy implications of her access control policies. However, an unrestricted view of one’s extended neighbourhood may compromise the privacy of others. To address this dilemma, we propose a privacy-enhanced visualization tool, which approximates the extended neighbourhood of a user in such a way that policy assessment can still be conducted in a meaningful manner, while the privacy of other users is preserved.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Goffman, E.: The Presentation of Self in Everyday Life. Anchor-Doubleday, New York (1961)
Patil, S., Kobsa, A.: Privacy as impression management. Technical Report UCI-ISR-03-13, Institute for Software Research, University of California - Irvine, Irvine, CA, USA (December 2003)
Fong, P.W.L., Anwar, M., Zhao, Z.: A privacy preservation model for Facebook-style social network systems. In: Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint Malo, France (September 2009)
Dennis, J.B., van Horn, E.C.: Programming semantics for multiprogrammed computations. Communications of the ACM 9(3), 143–155 (1966)
Miller, M.S., Yee, K.P., Shapiro, J.: Capability myths demolished. Technical Report SRL2003-02, System Research Lab, Department of Computer Science, The John Hopkins University, Baltimore, Maryland, USA (2003)
Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the internet topology. In: Proceedings of ACM Special Interest Group on Data Communications (SIGCOMM 1999), pp. 251–262 (1999)
Milgram, S.: The small world problem. Psychology Today 1, 60–67 (1967)
Chakrabarti, D., Faloutsos, C., Zhan, Y.: Visualization of large networks with min-cut plots, A-plots and R-MAT. International Journal of Human-Computer Studies 65, 434–445 (2007)
Lamping, J., Rao, R.: The hyperbolic browser: A focus+context technique for visualizing large hierarchies. Journal of Visual Languages and Computing 7(1), 33–35 (1996)
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM 19(8), 461–471 (1976)
Lipton, R.J., Snyder, L.: A linear time algorithm for deciding subject security. Journal of the ACM 24(3), 455–464 (1977)
Li, N., Winsborough, W.H., Mitchell, J.C.: Beyond proof-of-compliance: Safety and availability analysis in trust management. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 123–139 (2003)
Li, N., Tripunitara, M.V.: Security analysis in role-based access control. In: Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004), pp. 126–135 (2004)
Freeman, L.C.: Visualizing social networks. Journal of Social Structure 1(1) (2000)
Heer, J., boyd, d.: Vizster: Visualizing online social networks. In: Proceeding of IEEE Symposium on Information Visualization, pp. 33–40 (2005)
Reeder, R.W., Bauer, L., Cranor, L.F., Reiter, M.K., Bacon, K., How, K., Strong, H.: Expandable grids for visualizing and authoring computer security policies. In: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems (CHI 2008), pp. 1473–1482. ACM, New York (2008)
Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4278, pp. 1734–1744. Springer, Heidelberg (2006)
Carminati, B., Ferrari, E., Perego, A.: Private relationships in social networks. In: Proceedings of Workshops in Conjunction with the International Conference on Data Engineering – ICDE 2007, Istanbul, Turkey, pp. 163–171. Springer, Heidelberg (2007)
Carminati, B., Ferrari, E.: Privacy-aware collaborative access control in web-based social networks. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 81–96. Springer, Heidelberg (2008)
Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Transactions on Information and System Security (to appear, 2009)
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: SACMAT 2009: Proceedings of the 14th ACM symposium on Access control models and technologies, pp. 177–186. ACM, New York (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anwar, M., Fong, P.W.L., Yang, XD., Hamilton, H. (2010). Visualizing Privacy Implications of Access Control Policies in Social Network Systems. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2009 2009. Lecture Notes in Computer Science, vol 5939. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11207-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-11207-2_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11206-5
Online ISBN: 978-3-642-11207-2
eBook Packages: Computer ScienceComputer Science (R0)