SoNeUCONABC, an expressive usage control model for Web-Based Social Networks

نویسندگان

  • Lorena González-Manzano
  • Ana Isabel González-Tablas Ferreres
  • José María de Fuentes
  • Arturo Ribagorda
چکیده

In the era of hyper-connectivity Web-Based Social Networks (WBSNs) are demanding applications. They facilitate the interaction of huge amounts of users and the development of appropriate Access Control Models (ACMs) is an arising necessity. Particularly, the development of WBSNs ACMs with expressive power and capable of managing access control along the whole usage process is the challenge pursued. To contribute on this issue, rst, 23 proposals have been analysed and second, SoNeUCONABC , an expressive usage control model for WBSNs, is proposed. It extends UCONABC [1] including relationships management and it is formally de ned, specifying entities and elements involved and an access control policy language. Moreover, policy construction is carefully detailed by using regular expressions and access control enforcement functions are described. Finally, the evaluation shows, theoretically, the signi cant expressive power of SoNeUCONABC and, empirically, the feasibility of its implementation by the development of a proof of concept system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CooPeD: Co-owned Personal Data management

With the spread of Web-Based Social Networks (WBSNs) managing access to data is a challenging matter. Providing personalized, ne-grained access control is essential to build trusted WBSNs. WBSNs data can be associated with owners and co-owners, namely users who upload the data and users who are linked to uploaded data respectively. Thus, a privacy-friendly WBSN must allow users the management o...

متن کامل

Representing, Querying and Transforming Social Networks with RDF/SPARQL

As social networks are becoming ubiquitous on the Web, the Semantic Web goals indicate that it is critical to have a standard model allowing exchange, interoperability, transformation, and querying of social network data. In this paper we show that RDF/SPARQLmeet this desiderata. Building on developments of social network analysis, graph databases and Semantic Web, we present a social networks ...

متن کامل

Data protection in heterogeneous distributed systems: A smart meter example

Usage control is concerned with how data is used after access has been granted. Enforcement mechanisms have been implemented for distributed systems like web based social networks (WBSN) at various levels of abstraction. We extend data usage control to heterogeneous distributed systems by implementing a policy enforcement mechanism for a smart meter connected to a WBSN. The idea is to provide u...

متن کامل

Modeling, Designing and Evaluating A Social Network in the Field of Health

Background and Aim: Social networks that provide users with health data not only educate them but also play an active role in the health decision-making process. Health social networks, in addition to being a good tool for better patient communication with health care providers, can play an effective role in connecting similar patients with each other to receive social support. Social networkin...

متن کامل

Relationship between the Online Social Networks Addiction and Psychological Disorders

Background: The Online social networks addiction like others type of addiction can lead to ethical dilemmas, as well as it can be affected from psychological disorders. So, the aim of this research is to analyze the effect of depression, anxiety and usage time of online social networks on the level of online social networks addiction and on the life satisfaction. Method: The method of research ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 43  شماره 

صفحات  -

تاریخ انتشار 2014