Baek et al., 2014 - Google Patents
Trust‐Based Access Control Model from Sociological Approach in Dynamic Online Social Network EnvironmentBaek et al., 2014
View PDF- Document ID
- 5926755073378267850
- Author
- Baek S
- Kim S
- Publication year
- Publication venue
- The Scientific World Journal
External Links
Snippet
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously …
- 230000003068 static 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5775003B2 (en) | Using social information to authenticate user sessions | |
Carminati et al. | Security and trust in online social networks | |
US9424612B1 (en) | Systems and methods for managing user reputations in social networking systems | |
Al-Oufi et al. | A group trust metric for identifying people of trust in online social networks | |
Muscanell et al. | Weapons of influence misused: A social influence analysis of why people fall prey to internet scams | |
Aljazzaf et al. | Online trust: Definition and principles | |
Shehab et al. | Access control for online social networks third party applications | |
Abdul-Rahman | A framework for decentralised trust reasoning | |
US8601548B1 (en) | Password popularity-based limiting of online account creation requests | |
Nthala et al. | Informal support networks: an investigation into home data security practices | |
Ladegaard | Open secrecy: How police crackdowns and creative problem-solving brought illegal markets out of the shadows | |
Xia et al. | Privacy in Crowdsourcing: a Review of the Threats and Challenges | |
Al-Charchafchi et al. | Threats against information privacy and security in social networks: A review | |
Alamir et al. | Trust evaluation between users of social networks using the quality of service requirements and call log histories | |
Camp | Reconceptualizing the role of security user | |
Voloch et al. | A trust based privacy providing model for online social networks | |
Aïmeur et al. | Upp: User privacy policy for social networking sites | |
Baek et al. | Trust‐Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment | |
Bi et al. | A Privacy‐Preserving Personalized Service Framework through Bayesian Game in Social IoT | |
Aïmeur et al. | Privacy, trust, and manipulation in online relationships | |
Voloch et al. | An access control model for data security in online social networks based on role and user credibility | |
Nepal et al. | Behavior‐Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation | |
Jethava et al. | Exploring security and trust mechanisms in online social networks: An extensive review | |
Ali-Eldin et al. | A risk evaluation approach for authorization decisions in social pervasive applications | |
Mulaji et al. | The Practicality of Adopting Blockchain‐Based Distributed Identity Management in Organisations: A Meta‐Synthesis |