User-Managed Access Control in Web Based Social Networks
نویسندگان
چکیده
1 Avda. de la Universidad, 30. Computer Science and Engineering Department. University Carlos III of Madrid, 28911 Leganés, Spain [email protected] 2 Avda. de la Universidad, 30. Computer Science and Engineering Department. University Carlos III of Madrid, 28911 Leganés, Spain [email protected] 3 Avda. de la Universidad, 30. Computer Science and Engineering Department. University Carlos III of Madrid, 28911 Leganés, Spain [email protected] 4 Avda. de la Universidad, 30. Computer Science and Engineering Department. University Carlos III of Madrid, 28911 Leganés, Spain [email protected]
منابع مشابه
Prediction of user's trustworthiness in web-based social networks via text mining
In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...
متن کاملتشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی
Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...
متن کاملBeyond User-to-User Access Control for Online Social Networks
With the development of Web 2.0 technologies, online social networks are able to provide open platforms to enable the seamless sharing of profile data to enable public developers to interface and extend the social network services as applications (or APIs). At the same time, these open interfaces pose serious privacy concerns as third party applications are usually given full read access to the...
متن کاملNovel Architecture for Controlling File System Access
File system administration directly or indirectly affects all users of computer systems today. In an organization, users interact directly with managed file systems, which provide a means of data storage. Users of on-line services, for example, search engines, social networks, photo and video sharing, web based email, etc., rely on managed file systems indirectly, for storing and accessing data...
متن کاملHF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کامل