Understanding and Specifying Social Access Control Lists.
Mainack MondalYabing LiuBimal ViswanathKrishna P. GummadiAlan MislovePublished in: SOUPS (2014)
Keyphrases
- access control
- fine grained
- data security
- security policies
- dynamic access control
- trust relationships
- access control models
- identity management
- security mechanisms
- access control policies
- role based access control
- database security
- access control systems
- social interaction
- social networking
- role based access control model
- social media
- social networks
- security model
- unauthorized access
- rbac model
- role assignment
- social context
- network traffic
- computer systems
- usage control