期刊文献+

在线社会网络中基于关系强度的访问控制机制 被引量:2

Access control based on relationship strength for online social network
原文传递
导出
摘要 访问控制是实现OSN隐私保护的有效方法之一,针对已有基于关系的访问控制中存在的控制粒度粗、不够灵活等问题,提出OSN访问控制下的关系度量机制,利用用户间关系强弱进一步区分关系(群组)中不同用户的访问权限。基于OSN用户交互特点,由交互行为分析用户关注度,利用用户关注度相对因子、交互强度、关系强度时间衰减性综合产生用户间关系强度。实验结果证明了所提关系强度度量方法的可行性和有效性。 Access control is one of the effective methods to protect the privacy of people in OSN. However,there are some problems in the relationship-based access control scheme,such as the coarse-grained and inflexibility. So evaluating the relationship strength between users is introduced in relationship-based access control,user's access can be authorized according to relationship strength. Based on the characteristics of users' interaction in OSN,the user's attention is acquired by analyzing interaction behavior between users,and then a newevaluation model for relationship strength is constructed by considering the following features: attention factor,interaction strength and time decay. Experimental results showthat the proposed method is feasible and effective.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2016年第7期90-97,共8页 Journal of Shandong University(Natural Science)
基金 国家自然科学基金资助项目(61170254) 河北省自然科学青年基金资助项目(F2014201165) 河北省高等学校科学技术研究项目(ZD2016043) 河北省自然科学基金项目(F2014201099)
关键词 在线社会网络 隐私保护 访问控制 关系强度 online social network privacy protection access control relationship strength
  • 相关文献

参考文献2

二级参考文献30

  • 1李鼎.基于逻辑编程的安全策略分析系统设计及其关键技术研究[D]解放军信息工程大学,2009.
  • 2SQUICCIARINI A,PACI F,SUNDARESWARAS N.PriMa:an ef-fective privacy protection mechanism for social networks. Pro-ceedings of the 5th ACM Symposium on Information,Computer andCommunications Security . 2010
  • 3ADAM N,ATLURI V,BERTINO E,et al.A Content-Based Authori-zation Model for Digital Libraries. . 2001
  • 4JAYARAMAN K,RINARD M C,TRIPUNITARA M,et al.Auto-matic error finding in access-control policies. Proceedings of 18thACM Conference on Computer and Communications Security . 2011
  • 5ALBERTI F,ARMANDO A,RANISE S.Efficient symbolic auto-mated analysis of administrative attribute-based RBAC-policies. Proceedings of the 6th ACM Symposium on Information,Computerand Communications Security . 2011
  • 6ANWAR M,FANG P,YANG X D,et al.Visualizing privacy implica-tions of access control policies in social network systems. Pro-ceedings of the 27th Annual ACM Symposium on Applied Comput-ing . 2012
  • 7WANG T,SRIVATSA M,LIU L.Fine-grained Access control of personaldata. ACM Symposium on Access Control Models and Technologies . 2012
  • 8LI J,TANG Y,MAO C,et al.Role based access control for socialnetwork sites. Proceedings of Joint Conferences on PervasiveComputing . 2009
  • 9YUAN E,TONG J.Attributed based access control (ABAC)for webservices. Proceedings of the IEEE International Conference onWeb Services . 2005
  • 10GOLBECK J A. Computing and Applying Trust in Web-Based Social Networks[D). University of Maryland at College Park, MD, 2005.

共引文献11

同被引文献24

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部