Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service |
Kwon, Keun
(Sungkyunkwan University)
Jung, Youngman (Sungkyunkwan University) Jung, Jaewook (Sungkyunkwan University) Choi, Younsung (Sungkyunkwan University) Jeon, Woongryul (Sungkyunkwan University) Won, Dongho (Sungkyunkwan University) |
1 | B Debatin, et al. "Facebook and online privacy: attitudes, behaviors, and unintended consequences," Journal of Computer Mediated Communication, vol. 15, no. 1, pp. 83-108, Oct. 2009. DOI |
2 | NB Ellison, "Social network sites: definition, history, and scholarship," Journal of Computer Mediated Communication, vol. 13, no. 1, pp. 210-230, Oct. 2007. DOI |
3 | KY Lin and HP Lu, "Why people use social networking sites: an empirical study integrating network externalities and motivation theory," Computers in Human Behavior, vol. 27, no. 3, pp. 1152-1161, May. 2011. DOI ScienceOn |
4 | R Gross and A Acquisti, "Information revelation and privacy in online social networks," ACM workshop on Privacy in the electronic society, pp. 71-80, Nov. 2005. |
5 | S Ye and S. F Wu, "Measuring message propagation and social influence on Twitter. com," Springer Social informatics, LNCS 6430, pp. 216-231, Oct. 2010. |
6 | B Krishnamurthy and CE. Wills, "On the leakage of personally identifiable information via online social networks," 2nd ACM workshop on Online social networks, pp. 7-12, Aug. 2009. |
7 | G Hogben, "Security issues and recommendations for online social networks," ENISA Position Paper, no. 1, Oct. 2007. |
8 | R Baden, et al. "Persona: an online social network with user-defined privacy," ACM SIGCOMM Computer Communication Review, vol. 39, no. 4, pp. 135-146, Aug. 2009. DOI |
9 | S Jahid, P Mittal, and N Borisov, "EASiER: Encryption-based access control in social networks with efficient revocation," 6th ACM Symposium on Information, Computer and Communications Security, pp. 411-415, Mar. 2011. |
10 | Y Cheng, J Park, and R Sandhu, "A user-to-user relationship-based access control model for online social networks," Data and Applications Security and Privacy XXVI, LNCS 7371, pp. 8-24, Jul. 2012. |
11 | F Raji, et al. "Online social network with flexible and dynamic privacy policies," CSI International Symposium on. IEEE, pp. 135-142, Jun. 2011. |
12 | CH Lee, et al. "Dynamic user reliability evaluation scheme for social network service," Journal of the Korea Institute of Information Security and Cryptology, 23(2), pp. 157-168, Apr. 2013. 과학기술학회마을 DOI ScienceOn |
13 | PW.L. Fong and I Siahaan, "Relationship-based access control policies and their policy languages," 6th ACM symposium on Access control models and technologies, pp. 51-60, Jun. 2011. |
14 | B Carminati, et al. "Semantic web-based social network access control," computers & security, vol. 30, no. 2, pp. 108-115, Aug. 2010. |
15 | L Banks, SF Wu, "All friends are not created equal: an interaction intensity based approach to privacy in online social networks," CSE 09. International Conference on IEEE, vol. 4, pp. 970-974, Aug. 2009. |
16 | J Park, R Sandhu, and Y Cheng, "Acon: activity-centric access control for social computing," Availability, Reliability and Security (ARES), 2011 Sixth International Conference on IEEE, pp. 242-247, Aug. 2011. |
17 | J Park, R Sandhu, and Y Cheng, "A user-activity-centric framework for access control in online social networks," Internet Computing, vol. 15, no. 5, pp. 62-65, Oct. 2011. DOI |
18 | S Guha, K Tang, and P Francis, "NOYB: Privacy in online social networks," 1st workshop on Online social networks ACM, pp. 49-54, Aug. 2008. |
19 | MM. Lucas and N Borisov, "Flybynight: mitigating the privacy risks of social networking," 7th ACM workshop on Privacy in the electronic society, pp. 1-8, Oct. 2008. |
20 | A Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979. DOI ScienceOn |
21 | HS Song, "A study on transitivity and composability of trust in social network," Journal of Information Technology Applications & Management, 18(4), pp. 41-53, Oct. 2011. |
22 | G Ateniese, et al. "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1-30, Feb. 2006. DOI |
23 | L Backstrom, et al. "Four degrees of separation," 3rd Annual ACM Web Science Conference, pp. 33-42, Jun. 2012. |
24 | J. A. Akinyele, et al. "Securing electronic medical records using attribute-based encryption on mobile devices," 1st ACM workshop on security and privacy in smartphones and mobile devices, pp. 75-86, Oct. 2011. |
25 | J Nutzel, and A Beyer, "Towards trust in digital rights management systems," Trust and Privacy in Digital Business, LNCS 4083, pp. 162-171, Sep. 2006. |
26 | T Acar, et al. "Affine pairings on ARM," Pairing - Based Cryptography, Pairing 2012 5th International Conference, LNCS 7708, pp. 203-209, May. 2012. |
27 | C Zhang, et al. "Privacy and security for online social networks: challenges and opportunities," IEEE Network, vol. 24, no. 4, pp. 13-18, Aug. 2010. DOI ScienceOn |