Trust-Based Access Control in Multi-role Environment of Online Social Networks (original) (raw)

Access this article

Log in via an institution

Subscribe and save

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Takalkar, V., & Mahalle, P. N. (2015). Data confidentiality in online social networks: A survey. IJSR, 4(1), 78–82.
    Google Scholar
  2. http://mashable.com/2011/12/19/friend-unfriend-facebook.
  3. Takalkar, V., & Mahalle, P. N. (2015). Trustbook: A Trust-based access control in online social networks. WPMC, Global Wireless Summit.
  4. Hu, H., & Ahn, G.-J. (2011). Multiparty authorization framework for data sharing in online social networks data and applications security and privacy XXV. DBSec 2011. Lecture Notes in Computer Science, Vol 6818. Springer, Berlin, Heidelberg.
  5. Hu, H., Ahn, G.-J., & Jorgensen, J. (2013). Multiparty access control for online social model and mechanisms. IEEE Transactions on Knowledge and Data Engineering, 25(7), 1614–1627.
    Article Google Scholar
  6. Omanakuttan, S., & Chatterjee, M. (2014). Experimental analysis on access control using trust parameter for social network. Berlin, Heidelberg: Springer.
    Book Google Scholar
  7. Chang, W.-L., Diaz, A. N., & Hung, P. C. K. (2014). Estimating trust value: A social network perspective. New York: Springer.
    Google Scholar
  8. Ziegler, C.-N., & Lausen, G. (2005). Propagation models for trust and distrust in social networks. Springer.
  9. Hang, C.-W., Wang, Y., & Singh, M. P. (2009). Operators for propagating trust and their evaluation in social networks. International Foundation for Autonomous Agents and Multiagent Systems.
  10. Villegas, W. A trust based approach for protecting user data in social networks. In CASCON'07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research.
  11. Kuter, U., & Golbeck, J. (2007). SUNNY: A new algorithm for trust inference in social networks using probabilistic confidence models’. Association for the Advancement of Artificial Intelligence (www.aaai.org).
  12. Liu, G., Wang, Y., Orgun, M. A., & Lim, E.-P. (2013). Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Transactions on Services Computing, 6(2), 152–167.
    Article Google Scholar
  13. Yeh, L.-Y., Huang, Y.-L., Joseph, A. D., Shieh, S. W., & Tsaur, W.-J. (2012). A batch-authenticated and key agreement framework for P2P-based online social network. IEEE Transactions on Vehicular Technology, 61(4), 1907–1924.
    Article Google Scholar
  14. Van Hieu, D., Wisitpongphan, N., & Meesad, P. Analysis of factors which impact facebook users’ attitudes and behaviours using decision tree techniques. In 11th JCSSE (International Joint Conference in Computer Science and Software Engineering).
  15. Hur, J. (2013). Improving security and efficiency in attribute based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.
    Article Google Scholar
  16. Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010 Proceedings IEEE. https://doi.org/10.1109/INFCOM.2010.5462174.
  17. Shehab, M., Squicciarini, A., Ahn, G.-J., & Kokkinou, I. (2012). Access control for online social networks third party applications. Computers & Security, 31, 897–911.
    Article Google Scholar
  18. Hur, J. (2013). Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2171–2180.
    Article Google Scholar
  19. Goyal, V., Wang, C., Ren, K., & Lou, W. (2010). Attribute Based Data Sharing with Attribute Revocation. ASIACCS’10, Beijing, China. Copyright 2010 ACM 978-1-60558-936-7, April 13–16, 2010.
  20. Takalkar, V., & Mahalle, P. (2015). Handling data confidentiality attack due to data sharing using trust-based approach in online social networks. International Journal of Engineering Research and Technology 4(5).

Download references