CooPeD: Co-owned Personal Data management
نویسندگان
چکیده
With the spread of Web-Based Social Networks (WBSNs) managing access to data is a challenging matter. Providing personalized, ne-grained access control is essential to build trusted WBSNs. WBSNs data can be associated with owners and co-owners, namely users who upload the data and users who are linked to uploaded data respectively. Thus, a privacy-friendly WBSN must allow users the management of elements related to them. In this regard, CooPeD (Co-owned Personal Data management), a system that deals with co-ownership management of decomposable objects, is proposed. CooPeD is formed by a model and a mechanism. CooPeD is developed on the bases of SoNeUCONABC usage control model. Particularly, an extension of SoNeUCONABC is proposed to support co-ownership management by means of access control and administrative management. In CooPeD's mechanism objects, decomposed in parts, are attached to owners and co-owners who individually set their access control preferences. The evaluation of CooPeD consists of three parts. Firstly, a feasibility analysis for di erent architectures of CooPeD's model and mechanism, as well as of CooPeD's mechanism in Facebook is performed. Secondly, a prototype proves the feasibility of implementing CooPeD. Lastly, a survey study assesses the acceptance of CooPeD. ∗Corresponding author Email addresses: [email protected] (Lorena González-Manzano ), [email protected] (Ana I. González-Tablas), [email protected] (José M. de Fuentes), [email protected] (Arturo Ribagorda) Preprint submitted to Journal of Computers & Security June 18, 2014
منابع مشابه
Hash-based document extraction in corporate mobile devices using ontological architectures
Due to the rapid technological advances in mobile and wireless networking devices, personal computing has moved towards into ad hoc and pervasive environments. Today, the dynamic nature of mobile applications and services have integrated them far more in end-users’ lives. Organizations need an effective way of handling their information system for their employees and customers. Mobile devices s...
متن کاملDeterminants of Adoption of Mini-Tuber Seed Potato: A Case in Ardabil Province of Iran
The aim of this study was to examine factors affecting adoption of mini-tuber seed potato. Survey research design was used in this study. A sample of 100 potato growers who were informed about mini-tuber was selected and divided into adopter and non-adopter groups. Questionnaire was used as the instrument for data collection and was validated by a panel of experts. A pilot study was conducted f...
متن کاملInternal Positioning Model for Banking Services (Public Sector Banks)
Purpose: The purpose of this study was to design an internal positioning model of state-owned banking services and accreditation. Method: The present study was applied and exploratory. The statistical population of the qualitative stage were the managers of the branches of agricultural, national and housing banks of Khorasan Razavi province and university professors in the field of managemen...
متن کاملInvestigating Tax Avoidance Incentives in Corporations with Governmental Ownership based on CEO Tenure
The present study investigates the motivation for paying taxes in public companies based on the continuity of the CEO. Managers of public corporations may seek to increase profits and tax avoidance activities to provide a better image of the company and to preserve their personal position and interests. For this purpose, the data of the companies listed in the Tehran Stock Exchange for the peri...
متن کاملEvolving the Ecosystem of Personal Behavioral Data
Everyday, people generate lots of personal data. Driven by the increasing use of online services and widespread adoption of smartphones (owned by 68% of U.S. residents (Anderson, 2015)), personal data takes many forms including: communications (e.g. email, SMS, Facebook), plans and coordination (e.g. calendars, TripIt, to-do lists), entertainment consumption (e.g. YouTube, Spotify, Netflix), fi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 47 شماره
صفحات -
تاریخ انتشار 2014