Zhang, Yang ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Han, Weili
Pang, Jun ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
External co-authors :
yes
Language :
English
Title :
An Empirical Study on User Access Control in Online Social Networks
Publication date :
2016
Event name :
21st ACM Symposium on Access Control Models and Technologies (SACMAT'16)
Event date :
2016
Audience :
International
Main work title :
Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT'16)
D. Blei, A. Ng, and M. Jordan. Latent dirichlet allocation. Journal of Machine Learning Research, 3:993-1022, 2003.
G. Bruns, P. W. L. Fong, I. Siahaan, and M. Huth. Relationship-based access control: its expression and en-forcement through hybrid logic. In Proc. 2nd ACM Con-ference on Data and Application Security and Privacy (CO-DASPY), pages 117-124. ACM, 2012.
B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. A semantic web based framework for social network access control. In Proc. 14th ACM Sym-posium on Access Control Models and Technologies (SAC-MAT), pages 177-186. ACM, 2009.
B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In Proc. IFIP WG 2.12 and 2.14 Semantic Web Workshop (OTM), volume 4278 of LNCS, pages 1734-1744. Springer, 2006.
M. Cha, H. Haddadi, and F. B. K. P. Gummadi. Measuring user inuence in Twitter: The million follower fallacy. In Proc. 4th AAAI Conference on Weblogs and Social Media (ICWSM), pages 10-17. The AAAI Press, 2010.
M. Cramer, J. Pang, and Y. Zhang. A logical approach to restricting access in online social networks. In Proc. 20th ACM Symposium on Access Control Models and Technolo-gies (SACMAT), pages 75-86. ACM, 2015.
J. Crampton and J. Sellwood. Path conditions and principal matching: A new approach to access control. In Proc. 19th ACM Symposium on Access Control Models and Technolo-gies (SACMAT), pages 187-198. ACM, 2014.
R. Dey, Z. Jelveh, and K. Ross. Facebook users have be-come much more private: A large-scale study. In Proc. 2012 IEEE International Conference on Pervasive Comput-ing and Communications Workshops, pages 346-352. IEEE, 2012.
P. W. L. Fong. Preventing sybil attacks by privilege at-Tenuation: A design principle for social network systems. In Proc. 32nd IEEE Symposium on Security and Privacy (SandP), pages 263-278. IEEE CS, 2011.
P. W. L. Fong, M. M. Anwar, and Z. Zhao. A privacy preser-vation model for Facebook-style social network systems. In Proc. 14th European Symposium on Research in Computer Security (ESORICS), volume 5789 of LNCS, pages 303-320. Springer, 2009.
P. W. L. Fong and I. Siahaan. Relationship-based access control policies and their policy languages. In Proc. 16th ACM Symposium on Access Control Models and Technolo-gies (SACMAT), pages 51-60. ACM, 2011.
Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing Facebook privacy settings: user expectations vs. reality. In Proc. 2011 ACM SIGCOMM conference on In-Ternet measurement conference (IMC), pages 61-70. ACM, 2011.
M. Mondal, Y. Liu, B. Viswanath, K. P. Gummadi, and A. Mislove. Understanding and specifying social access con-Trol lists. In Proc. 10th Symposium on Usable Privacy and Security (SOUPS), pages 271-283. USENIX Association, 2012.
J. Pang and Y. Zhang. A new access control scheme for Facebook-style social networks. In Proc. 9th Conference on Availability, Reliability and Security (ARES), pages 1-10. IEEE CS, 2014.
J. Pang and Y. Zhang. Cryptographic protocols for enforcing relationship-based access control policies. In Proc. 39th An-nual IEEE Computers, Software & Applications Conference (COMPSAC), pages 484-493. IEEE CS, 2015.
J. Pang and Y. Zhang. Location prediction: communities speak louder than friends. In Proc. 3rd ACM on Conference on Online Social Networks (COSN), pages 161-171. ACM, 2015.
J. Pang and Y. Zhang. A new access control scheme for Facebook-style social networks. Computers & Security, 54:44-59, 2015.
M. J. Paul and M. Dredze. You are what you tweet: Analyz-ing twitter for public health. In Proc. 5th AAAI Conference on Weblogs and Social Media (ICWSM), pages 265-272. The AAAI Press, 2011.
M. Redi, D. Quercia, L. Graham, and S. Gosling. Like party-ing? your face says it all. Predicting the ambiance of places with profile pictures. In Proc. 9th AAAI Conference on We-blogs and Social Media (ICWSM), pages 347-356. The AAAI Press, 2015.
F. Souza, D. de Las Casas, V. Flores, S. Youn, M. Cha, D. Quercia, and V. Almeida. Dawn of the selfie era: The whos, wheres, and hows of selfies on Instagram. In Proc. 3rd ACM on Conference on Online Social Networks (COSN), pages 221-231. ACM, 2015.
F. Stutzman, R. Gross, and A. Acquisti. Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality, 4(2):2, 2013.
E. Tarameshloo, P. W. L. Fong, and P. Mohassel. On pro-Tection in federated social computing systems. In Proc. 4th ACM Conference on Data and Application Security and Pri-vacy (CODASPY), pages 75-86. ACM, 2014.
J. W. Tukey. Exploratory Data Analysis. Pearson, 1977.
W. X. Zhao, J. Jiang, J. Weng, J. He, E.-P. Lim, H. Yan, and X. Li. Comparing Twitter and traditional media us-ing topic models. In Proc. 33rd European Conference on IR Research (ECIR), volume 6611 of LNCS, pages 338-349. Springer, 2011.
Y. Zhong, N. J. Yuan, W. Zhong, F. Zhang, and X. Xie. You are where you go: Inferring demographic attributes from location check-ins. In Proc. 8th ACM International Con-ference on Web Search and Data Mining (WSDM), pages 295-304. ACM, 2015.