[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Baek et al., 2014 - Google Patents

Trust‐Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

Baek et al., 2014

View PDF @Full View
Document ID
5926755073378267850
Author
Baek S
Kim S
Publication year
Publication venue
The Scientific World Journal

External Links

Snippet

There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Similar Documents

Publication Publication Date Title
JP5775003B2 (en) Using social information to authenticate user sessions
Carminati et al. Security and trust in online social networks
US9424612B1 (en) Systems and methods for managing user reputations in social networking systems
Al-Oufi et al. A group trust metric for identifying people of trust in online social networks
Muscanell et al. Weapons of influence misused: A social influence analysis of why people fall prey to internet scams
Aljazzaf et al. Online trust: Definition and principles
Shehab et al. Access control for online social networks third party applications
Abdul-Rahman A framework for decentralised trust reasoning
US8601548B1 (en) Password popularity-based limiting of online account creation requests
Nthala et al. Informal support networks: an investigation into home data security practices
Ladegaard Open secrecy: How police crackdowns and creative problem-solving brought illegal markets out of the shadows
Xia et al. Privacy in Crowdsourcing: a Review of the Threats and Challenges
Al-Charchafchi et al. Threats against information privacy and security in social networks: A review
Alamir et al. Trust evaluation between users of social networks using the quality of service requirements and call log histories
Camp Reconceptualizing the role of security user
Voloch et al. A trust based privacy providing model for online social networks
Aïmeur et al. Upp: User privacy policy for social networking sites
Baek et al. Trust‐Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment
Bi et al. A Privacy‐Preserving Personalized Service Framework through Bayesian Game in Social IoT
Aïmeur et al. Privacy, trust, and manipulation in online relationships
Voloch et al. An access control model for data security in online social networks based on role and user credibility
Nepal et al. Behavior‐Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation
Jethava et al. Exploring security and trust mechanisms in online social networks: An extensive review
Ali-Eldin et al. A risk evaluation approach for authorization decisions in social pervasive applications
Mulaji et al. The Practicality of Adopting Blockchain‐Based Distributed Identity Management in Organisations: A Meta‐Synthesis