Hu et al., 2011 - Google Patents
Detecting and resolving privacy conflicts for collaborative data sharing in online social networksHu et al., 2011
View PDF- Document ID
- 12655726900308242684
- Author
- Hu H
- Ahn G
- Jorgensen J
- Publication year
- Publication venue
- Proceedings of the 27th annual computer security applications conference
External Links
Snippet
We have seen tremendous growth in online social networks (OSNs) in recent years. These OSNs not only offer attractive means for virtual social interactions and information sharing, but also raise a number of security and privacy issues. Although OSNs allow a single user to …
- 238000011156 evaluation 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hu et al. | Detecting and resolving privacy conflicts for collaborative data sharing in online social networks | |
Zhang et al. | Social media security and trustworthiness: overview and new direction | |
Hu et al. | Multiparty access control for online social networks: model and mechanisms | |
Dupree et al. | Privacy personas: Clustering users via attitudes and behaviors toward security practices | |
Pardo et al. | Ethical and privacy principles for learning analytics | |
Malatji et al. | Validation of a socio-technical management process for optimising cybersecurity practices | |
Weber | Cloud computing in education | |
Barrett-Maitland et al. | Security in social networking services: a value-focused thinking exploration in understanding users’ privacy and security concerns | |
Wolf et al. | An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication | |
Noor et al. | Customer-oriented ranking of cyber threat intelligence service providers | |
Chennamaneni et al. | The privacy protection behaviours of the mobile app users: exploring the role of neuroticism and protection motivation theory | |
Nthala et al. | “If it’s urgent or it is stopping me from doing something, then I might just go straight at it”: a study into home data security decisions | |
Fischer-Hübner et al. | Online privacy: towards informational self-determination on the internet | |
Li et al. | Using user behavior to measure privacy on online social networks | |
Buchmann et al. | Personal information dashboard: putting the individual back in control | |
Ryutov et al. | Predicting information security policy compliance intentions and behavior for six employee-based risks | |
Seng et al. | A look into user privacy andthird-party applications in Facebook | |
Realpe-Munoz et al. | An integration of usable security and user authentication into the ISO 9241-210 and ISO/IEC 25010: 2011 | |
Sithipolvanichgul et al. | Factors affecting cloud computing adoption and continuance intention of students in Thailand | |
Liu | The effects of ontology-based and password-protected blog access control on perceived privacy benefit and perceived ease of use | |
Cormack | Thinking with GDPR: A guide to better system design | |
Laurent et al. | Privacy management and protection of personal data | |
Deng et al. | A reference model for privacy protection in social networking service | |
AlKalbani et al. | Using a Q-Methodology in demystifying typologies for cybersecurity practitioners: A case study | |
Almousa et al. | Awareness and working knowledge of secure design principles: A user study |