CRAMER, Marcos ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
PANG, Jun ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
ZHANG, Yang ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
no
Language :
English
Title :
A logical approach to restricting access in online social networks
Publication date :
2015
Event name :
20th ACM Symposium on Access Control Models and Technologies (SACMAT)
Event date :
2015
Audience :
International
Main work title :
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies
L. Adamic and E. Adar. Friends and neighbors on the web. Social Networks, 25(3):211-230, 2003.
M. Alam, X. Zhang, K. Khan, and G. Ali. xDAuth: a scalable and lightweight framework for cross domain access control and delegation. In Proc. SACMAT, pages 31-40. ACM, 2011.
E. Barka and R. S. Sandhu. Framework for role-based delegation models. In Proc. ACSAC, pages 168-176. IEEE CS, 2000.
G. Bruns, P. W. L. Fong, I. Siahaan, and M. Huth. Relationship-based access control: its expression and enforcement through hybrid logic. In Proc. CODASPY, pages 117-124. ACM, 2012.
B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. A semantic web based framework for social network access control. In Proc. SACMAT, pages 177-186. ACM, 2009.
B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In Proc. IFIP WG 2.12 and 2.14 Semantic Web Workshop (OTM), Volume 4278 of LNCS, pages 1734-1744. Springer, 2006.
C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Silvestri. Know your neighbors: web spam detection using the web topology. In Proc. SIGIR, pages 423-430. ACM, 2007.
Y. Cheng, J. Park, and R. S. Sandhu. Relationship-based access control for online social networks: beyond user-to-user relationships. In Proc. PASSAT, pages 646-655. IEEE CS, 2012.
J. Crampton and C. Morisset. An auto-delegation mechanism for access control systems. In Proc. STM, Volume 6710 of LNCS, pages 1-16. Springer, 2011.
J. Crampton and J. Sellwood. Path conditions and principal matching: a new approach to access control. In Proc. SACMAT, pages 187-198. ACM, 2014.
P. W. L. Fong. Preventing sybil attacks by privilege attenuation: a design principle for social network systems. In Proc. S&P, pages 263-278. IEEE CS, 2011.
P. W. L. Fong. Relationship-based access control: protection model and policy language. In Proc. CODASPY, pages 191-202. ACM, 2011.
P. W. L. Fong, M. M. Anwar, and Z. Zhao. A privacy preservation model for Facebook-style social network systems. In Proc. ESORICS, Volume 5789 of LNCS, pages 303-320. Springer, 2009.
C. E. Gates. Access control requirements for Web 2.0 security and privacy. In Proc. IEEE Workshop on Web 2.0 Security and Privacy (W2SP), 2007.
A. Hagstrom, S. Jajodia, F. Parisi-Presicce, and D. Wijesekera. Revocations-a classification. In Proc. CSFW. IEEE CS, 2001.
J. Joshi and E. Bertino. Fine-grained role-based delegation in presence of the hybrid role hierarchy. In Proc. SACMAT, pages 81-80. ACM, 2006.
J. J. McAuley and J. Leskovec. Learning to discover social circles in ego networks. In Proc. NIPS, pages 548-556. NIPS, 2012.
J. Pang and Y. Zhang. A new access control scheme for Facebook-style social networks. In Proc. ARES, pages 1-10. IEEE CS, 2014.
A. Ramachandran, N. Feamster, and S. Vempala. Filtering spam with behavioral blacklisting. In Proc. CCS, pages 342-351. ACM, 2007.
E. Tarameshloo and P. W. L. Fong. Access control models for geo-social computing systems. In Proc. SACMAT, pages 115-126. ACM, 2014.
E. Tarameshloo, P. W. L. Fong, and P. Mohassel. On protection in federated social computing systems. In Proc. CODASPY, pages 75-86. ACM, 2014.
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against sybil attacks. In Proc. S&P, pages 3-17. IEEE CS, 2008.
L. Zhang, G.-J. Ahn, and B.-T. Chu. A rule-based framework for role-based delegation and revocation. ACM TIST, 6(3):404-441, 2003.