[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hu et al., 2011 - Google Patents

Detecting and resolving privacy conflicts for collaborative data sharing in online social networks

Hu et al., 2011

View PDF
Document ID
12655726900308242684
Author
Hu H
Ahn G
Jorgensen J
Publication year
Publication venue
Proceedings of the 27th annual computer security applications conference

External Links

Snippet

We have seen tremendous growth in online social networks (OSNs) in recent years. These OSNs not only offer attractive means for virtual social interactions and information sharing, but also raise a number of security and privacy issues. Although OSNs allow a single user to …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Hu et al. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
Zhang et al. Social media security and trustworthiness: overview and new direction
Hu et al. Multiparty access control for online social networks: model and mechanisms
Dupree et al. Privacy personas: Clustering users via attitudes and behaviors toward security practices
Pardo et al. Ethical and privacy principles for learning analytics
Malatji et al. Validation of a socio-technical management process for optimising cybersecurity practices
Weber Cloud computing in education
Barrett-Maitland et al. Security in social networking services: a value-focused thinking exploration in understanding users’ privacy and security concerns
Wolf et al. An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication
Noor et al. Customer-oriented ranking of cyber threat intelligence service providers
Chennamaneni et al. The privacy protection behaviours of the mobile app users: exploring the role of neuroticism and protection motivation theory
Nthala et al. “If it’s urgent or it is stopping me from doing something, then I might just go straight at it”: a study into home data security decisions
Fischer-Hübner et al. Online privacy: towards informational self-determination on the internet
Li et al. Using user behavior to measure privacy on online social networks
Buchmann et al. Personal information dashboard: putting the individual back in control
Ryutov et al. Predicting information security policy compliance intentions and behavior for six employee-based risks
Seng et al. A look into user privacy andthird-party applications in Facebook
Realpe-Munoz et al. An integration of usable security and user authentication into the ISO 9241-210 and ISO/IEC 25010: 2011
Sithipolvanichgul et al. Factors affecting cloud computing adoption and continuance intention of students in Thailand
Liu The effects of ontology-based and password-protected blog access control on perceived privacy benefit and perceived ease of use
Cormack Thinking with GDPR: A guide to better system design
Laurent et al. Privacy management and protection of personal data
Deng et al. A reference model for privacy protection in social networking service
AlKalbani et al. Using a Q-Methodology in demystifying typologies for cybersecurity practitioners: A case study
Almousa et al. Awareness and working knowledge of secure design principles: A user study