Advertisement

Reputation based Access Control in Social Networks for Persona Management

  • Keonsoo LeeEmail author
  • Yunyoung Nam
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 2)

Abstract

Social network is a way of representing the personality. Postings which is written by an owner, and comments which are produced by friends are the significant elements in social network. Unintended postings are not made but unsolicited comments can be produced and influence the online persona of the owner. Therefore a method of preventing such comments is needed. In this paper, we propose a reputation based access control for persona management. This method is to allow the right of making comments to only the deserved friends. This qualification is determined by comparing the reputation of each friend and the characteristic of each posting. The reputation of each social network user is made from the behaviors and their social evaluation. With this method, unnecessary fray and controversy are avoided without provoking social alienation.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    “The 10 Top Reasons Why We Use Social Networks,” WeRSM | We Are Social Media, 06-May-2015Google Scholar
  2. 2.
    R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE Communications Magazine, vol. 32, no. 9, pp. 40–48, Sep. 1994Google Scholar
  3. 3.
    D. F. Ferraiolo and D. R. Kuhn, “Role-Based Access Controls,” arXiv:0903.2171 [cs], Mar. 2009Google Scholar
  4. 4.
    L. Rostad and O. Nytro, “Personalized Access Control for a Personally Controlled Health Record,” in Proceedings of the 2Nd ACM Workshop on Computer Security Architectures, New York, NY, USA, 2008, pp. 9–16Google Scholar
  5. 5.
    “Definition of REPUTATION.” [Online]. Available: http://www.merriam-webster.com/dictionary/reputation. [Accessed: 31-Aug-2016]Google Scholar
  6. 6.
    B. T. Adler, L. de Alfaro, A. Kulshreshtha, and I. Pye, “Reputation Systems for Open Collaboration,” Commun ACM, vol. 54, no. 8, pp. 81–87, Aug. 2011Google Scholar
  7. 7.
    S. D. Ramchurn, D. Huynh, and N. R. Jennings, “Trust in multi-agent systems,” The Knowledge Engineering Review, vol. 19, no. 1, Mar. 2004Google Scholar
  8. 8.
    J. Jolande, Complex/Archetype/Symbol In The Psychology Of C G Jung. Routledge, 2013Google Scholar
  9. 9.
    “Twitter.” [Online]. Available: https://twitter.com/. [Accessed: 09-Sep-2016].Google Scholar
  10. 10.
    “Facebook.” [Online]. Available: https://www.facebook.com/. [Accessed: 09-Sep-2016].Google Scholar
  11. 11.
    “Twitter Natural Language Processing – Noah’s ARK.” [Online]. Available: http://www.cs.cmu.edu/~ark/TweetNLP/. [Accessed: 09-Sep-2016].Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Medical Information Communication TechnologySoonchunhyang UniversityAsanRepublic of Korea
  2. 2.Dept of Computer Science and EngineeringSoonchunhyang UniversityAsanRepublic of Korea

Personalised recommendations