Nothing Special   »   [go: up one dir, main page]

Hu et al., 2012 - Google Patents

Enabling collaborative data sharing in google+

Hu et al., 2012

View PDF
Document ID
7005198127225166210
Author
Hu H
Ahn G
Jorgensen J
Publication year
Publication venue
2012 IEEE Global Communications Conference (GLOBECOM)

External Links

Snippet

Most of existing online social networks, such as Facebook and Twitter, are designed to bias towards information disclosure to a large audience. Google recently launched a new social network platform, Google+. By introducing the notion ofcircles', Google+ enables users to …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0807Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using tickets, e.g. Kerberos

Similar Documents

Publication Publication Date Title
Hu et al. Enabling collaborative data sharing in google+
Hu et al. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
Hu et al. Multiparty access control for online social networks: model and mechanisms
Debatin Ethics, privacy, and self-restraint in social networking
Romansky A survey of digital world opportunities and challenges for user’s privacy
Bräunlich et al. Linking loose ends: An interdisciplinary privacy and communication model
Abdessalem et al. A reachability-based access control model for online social networks
Grodzinsky et al. Privacy in" the cloud" applying Nissenbaum's theory of contextual integrity
Ma et al. RCBAC: A risk-aware content-based access control model for large-scale text data
Kim et al. Identity management‐based social trust model for mediating information sharing and privacy enhancement
Abomhara et al. Towards Risk-aware Access Control Framework for Healthcare Information Sharing.
Guo et al. Fuzzy TOPSIS-based privacy measurement in multiple online social networks
Toomim et al. Access control by testing for shared knowledge
Bachpalle et al. Data security approach for online social network
He et al. Analysis of trust-based access control using game theory
Li et al. Trust-aware privacy control for social media
Chen et al. A privacy settings prediction model for textual posts on social networks
Deng et al. A reference model for privacy protection in social networking service
Helil et al. Trust and risk based access control and access control constraints
Xie et al. Cloud Multidomain Access Control Model Based on Role and Trust‐Degree
Ganesh et al. Protection of shared data among multiple users for online social networks
Díaz Ferreyra et al. Access-control prediction in social network sites: Examining the role of homophily
Ghosh et al. R2q: A risk quantification framework to authorize requests in web-based collaborations
Nakerekanti et al. Secured Multiparty Access Control Model for Online Social Networking using Machine Learning
Obrezkov et al. A Category-Based Framework for Privacy-Aware Collaborative Access Control