[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Pathak et al., 2014 - Google Patents

Privacy and access control in federated social networks

Pathak et al., 2014

Document ID
18444188112494554508
Author
Pathak A
Rosca G
Issarny V
Decat M
Lagaisse B
Publication year
Publication venue
Engineering Secure Future Internet Services and Systems: Current Research

External Links

Snippet

Online social networks (OSNs) are increasingly turning mobile and further calling for decentralized social data management. This trend is only going to increase in the near future, based on the increased activity, both by established players like Facebook and new …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security

Similar Documents

Publication Publication Date Title
Yeung et al. Decentralization: The future of online social networking
Benazzouz et al. Sharing user IoT devices in the cloud
Sambra et al. Solid: a platform for decentralized social applications based on linked data
JP6444855B2 (en) How to modify access control to a web service using a query language
De Leusse et al. Self Managed Security Cell, a security model for the Internet of Things and Services
US20100299717A1 (en) System for Annotation-Based Access Control
US11456985B2 (en) Apparatuses, methods, and computer program products for data retention in a common group-based communication channel
CN115668185B (en) Method and apparatus for managing external approval provisioning and external messaging communication requests in a group-based communication system
CA2970951A1 (en) Network-accessible resource management system with distributable governance
Park et al. Acon: Activity-centric access control for social computing
Park et al. Activity control design principles: Next generation access control for smart and collaborative systems
Mijić et al. Unified iot platform architecture platforms as major iot building blocks
Alessi et al. A decentralized personal data store based on ethereum: Towards GDPR compliance
Pathak et al. Privacy and access control in federated social networks
US20160140341A1 (en) Systems and methods for increasing security sensitivity based on social influence
US20190121910A1 (en) Systems and methods for social content discovery and consumption
Islam et al. Privacy architectures in social networks' state-of-the-art survey
Göndör et al. SONIC: bridging the gap between different online social network platforms
Angarita et al. Universal Social Network Bus: Toward the Federation of Heterogeneous Online Social Network Services
Elicegui et al. Design and Implementation of a Cloud‐Based Platform for Unleashing the Personal and Communal Internet of Things
US10839106B2 (en) Creating workflow instances
Famulari et al. A simple architecture for secure and private data sharing solutions
Angarita et al. USNB: Enabling universal online social interactions
Chang et al. The design of an XMPP-based service integration scheme
US20190197456A1 (en) Systems and methods for providing an attributed review framework associated with a social networking system