Skip to main content

A Framework of Rights Allocation in Online Social Networks

  • Conference paper
Advances in Information Technology (IAIT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 344))

Included in the following conference series:

Abstract

Access control is the process by which authorized users are granted permission over resources. Access control models incorporate application requirements in their design and evolve with the applications. The rise of online social networks (OSN) like Facebook has posed new social requirements over the privacy of users’ data. This is partially due to the social structure of users and partially due to the complexity of OSN having millions of users interacting with each other. Currently, there are some access control models for OSN but they lack a systematical scheme to allocate and re-allocate rights over social objects and entities. This paper presents a rights allocation framework based on the characteristics of rights allocation in OSN and provides a reduction tree to design the model based on these properties. The proposed framework extends the availability of rights and can be used as a basis for different rights allocation models in online social networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karp, A.H., Haury, H., Davis, M.H.: From ABAC to ZBAC: The Evolution of Access Control Models. Technical Report HPL-2009-30, HP Labs (2009)

    Google Scholar 

  2. Trusted Computer Security Evaluation Criteria (TCSEC), DOD 5200.28-STD. Department of Defense (1985)

    Google Scholar 

  3. Ferraiolo, D., Kuhn, D.R.: Role-Based Access Control. In: NIST-NSA National (USA) Computer Security Conference, pp. 554–563 (1992)

    Google Scholar 

  4. Pujol, J.M., Sangüesa, R., Delgado, J.: Extracting Reputation in Multi Agent System by Means of Social Network Topology. In: International Joint Conference on Autonomous Agents and Multi-Agent Systems AAMAS 2002, Bologna, Italy, vol. 1, pp. 467–474 (2002)

    Google Scholar 

  5. Morchon, O.G., Wehrle, K.: Modular context aware access control for medical sensor networks. In: 15th ACM Symposium on Access Control Models and Technologies (SACMAT), USA (2010)

    Google Scholar 

  6. Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., Essiari, A.: Certificate-based Access Control for Widely Distributed Resources. In: 8th Usenix Security Symposium, pp. 215–228 (August 1999)

    Google Scholar 

  7. Carminati, B., Ferrari, E., Perego, A.: Enforcing Access Control in Web-Based Social Networks. ACM Transactions on Information & System Security, TISSEC (2008)

    Google Scholar 

  8. Whitworth, B., Ahmad, A.: Socio-Technical System Design. In: Soegaard, M., Dam, R.F. (eds.) Encyclopedia of Human-Computer Interaction. The Interaction Design Foundation, Aarhus (2012)

    Google Scholar 

  9. Ahmad, A., Whitworth, B.: Distributed Access Control for Social Networks. In: International Conference of Information Assurance and Security (IAS), Malacca, Malaysia, December 5-8 (2011)

    Google Scholar 

  10. Ali, B., Villegas, W., Maheswaran, M.: A Trust Based Approach for Protecting User Data in Social Networks. In: Conference of The Center for Advanced Studies on Collaborative Research (CASCON 2007), pp. 288–293 (2007)

    Google Scholar 

  11. Tapiador, A., Carrera, D., SalvachĂşa, J.: Tie-RBAC: An Application of RBAC to Social Networks. In: Web 2.0 Security and Privacy, Oakland, California (2011)

    Google Scholar 

  12. Varadharajan, V., Allen, P., Black, S.: An Analysis of the Proxy Problem in Distributed systems. In: IEEE Symposium on Research in Security and Privacy, Oakland, CA (1991)

    Google Scholar 

  13. Gasser, M., McDermott, E.: An Architecture for practical Delegation in a Distributed System. In: IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA (1990)

    Google Scholar 

  14. Barka, E., Sandhu, R.: A Role-Based Delegation Model and Some Extensions. In: 23rd National Information Systems Security Conference (NISSC), USA, (2000)

    Google Scholar 

  15. Barka, E., Sandhu, R.: Framework for Role-Based Delegation Models. In: 16th Annual Computer Security Applications Conference (ACSAC), New Orleans, La, December 11–15, pp. 168–177. IEEE Computer Society Press, Los Alamitos (2000)

    Chapter  Google Scholar 

  16. Tripunitara, M.V., Li, N.: Comparing the Expressive Power of Access Control Models. In: ACM Conference on Computer and Communications Security (CCS) (October 2004)

    Google Scholar 

  17. Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A Logical Framework For Reasoning About Access Control Models. ACM Transactions on Information and System Security 6(1), 71–127 (2003)

    Article  Google Scholar 

  18. Kane, K., Browne, J.C.: On Classifying Access Control Implementations for Distributed Systems. In: ACM Symposium on Access Control Models and Technologies (SACMAT), USA (2006)

    Google Scholar 

  19. Ahmad, A., Whitworth, B.: Access Control Taxonomy for Social Networks. In: International Conference of Information Assurance and Security (IAS 2011), Malacca, Malaysia, December 5-8 (2011)

    Google Scholar 

  20. Whitworth, B., Janczewski, L., Ahmad, A.: A Logic of Creation in Online Social Networks. In: 2012 World Congress in Computer Science, Computer Engineering and Applied Computing (WORLDCOMP 2012), Las Vegas, Nevada, USA, July 16-19 (2012)

    Google Scholar 

  21. Ahmad, A., Whitworth, B., Janczewski, L.: More Choices, More Control: Extending Access Control by Meta-Rights Reallocation. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), Liverpool, United Kingdom, June 25-27 (2012)

    Google Scholar 

  22. Ahmad, A., Whitworth, B., Janczewski, L.: Dynamic Rights Reallocation in Social Networks. In: International Information Security and Privacy Conference (IFIP SEC 2012), Heraklion, Crete, Greece, June 4-6 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahmad, A., Whitworth, B., Janczewski, L. (2012). A Framework of Rights Allocation in Online Social Networks. In: Papasratorn, B., Charoenkitkarn, N., Lavangnananda, K., Chutimaskul, W., Vanijja, V. (eds) Advances in Information Technology. IAIT 2012. Communications in Computer and Information Science, vol 344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35076-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35076-4_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35075-7

  • Online ISBN: 978-3-642-35076-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics