Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance.
Oleksandr BodriagovGunnar KreitzSonja BucheggerPublished in: PerCom Workshops (2014)
Keyphrases
- access control
- online social networks
- access control policies
- protection schemes
- rbac model
- policy enforcement
- social networks
- fine grained
- data security
- security policies
- dynamic access control
- security model
- network structure
- social networking
- social relationships
- social media
- conflict resolution
- high assurance
- security analysis
- security requirements
- role based access control
- xml access control
- security mechanisms
- access control systems
- hash functions
- smart card
- access control mechanism
- rights management
- privacy protection
- security architecture
- access control models
- data collection