Filters








20,097 Hits in 7.9 sec

User Centric Policy Management in Online Social Networks

Mohamed Shehab, Gorrell Cheek, Hakim Touati, Anna C. Squicciarini, Pau-Chen Cheng
2010 2010 IEEE International Symposium on Policies for Distributed Systems and Networks  
In this paper, we propose a Policy Manager (PolicyMgr) Framework for social networks.  ...  Online social networking sites are experiencing tremendous user growth with hundreds of millions of active users.  ...  Current social network architectures adopt a simple user centric policy management approach [5] , [9] , [3] , where a security aware user is able to specify a policy that manages access to their posted  ... 
doi:10.1109/policy.2010.10 dblp:conf/policy/ShehabCTSC10 fatcat:qzvqhiybrzbgrf572enklqca4y

Self-service Privacy: User-Centric Privacy for Network-Centric Identity [chapter]

Jose M. del Alamo, Miguel A. Monjas, Juan C. Yelmo, Beatriz San Miguel, Ruben Trapero, Antonio M. Fernandez
2010 IFIP Advances in Information and Communication Technology  
This study explores how best to set up a single control point for users to manage privacy policies for their personal information, which may be distributed (scattered) across a set of network-centric identity  ...  Our goal is a user-centric approach to privacy management.  ...  Self-service Privacy: User-Centric Privacy for Network-Centric Identity  ... 
doi:10.1007/978-3-642-13446-3_2 fatcat:27lfarm47jfgla2uohxqbxdklq

Personal Semantics: Personal Information Management in the Web with Semantic Technologies [chapter]

Salman Elahi
2011 Lecture Notes in Computer Science  
the user, maintained in a profile management system and controlled by the user herself.  ...  To tackle issues associated with current service-centric approaches, we propose a user-centric architecture where the interaction between a user and other agents is managed based on a global profile for  ...  Research Problem Web users maintain several online profiles across e-commerce websites, social networks and others, making it difficult for them to realize how much information is exchanged and what happens  ... 
doi:10.1007/978-3-642-21064-8_41 fatcat:z5nil3zey5fjlhqbr7vhovnpcy

Consumer-centric protection for online social networks

Raja Naeem Akram, Ryan K. L. Ko, Tsz Fung Law
2014 Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)  
Online Social Networks (OSNs) are a unique construct that is shaped by the advancement and availability of Internet technologies.  ...  However, these protections are, to a great extent, not consumer-centric: this is the main focus of this study. In this paper, we define the notion of Consumer-Centric Protection (CCP) for OSNs.  ...  A large number of online users engage in one way or another with these social network sites, which are also called "Online Social Networks (OSNs)".  ... 
doi:10.1109/iri.2014.7051872 dblp:conf/iri/AkramKL14 fatcat:cus2e3ufefbkviczv5bosdw7xi

The Internet of People: A human and data-centric paradigm for the Next Generation Internet

Marco Conti, Andrea Passarella
2018 Computer Communications  
It will require a radical change of the Internet data-management paradigm, from the current platform-centric to a human-centric model.  ...  In this paper we present a new paradigm for Internet data management that we name Internet of People (IoP) because it embeds human behavior models in its algorithms.  ...  In [ALPC16] , the authors have investigated the impact of the ego network structures on information diffusion in Online Social Networks by exploiting the online social links.  ... 
doi:10.1016/j.comcom.2018.07.034 fatcat:kwu5j2wm3nat3irzsstbjg3kcm

Virtual communities, a typology

Pierre Maret, Rajendra Akerkar, Laurent Vercouter, Pierre Maret, Rajendra Akerkar, Laurent Vercouter
2017 Web Intelligence: an international journal  
The papers included in this special issue show some examples of research works lead in some of these categories of communities.  ...  We propose here to identify usual functions provided by virtual communities and define a typology based on the common objects or goals shared by their users.  ...  Introduction There is a consensus to define Virtual Communities (sometimes called Online or Web Communities) as social networks of individuals or artifacts with a shared interest or a shared goal, using  ... 
doi:10.3233/web-170359 fatcat:kv44w65rabf55cvqfc3rxufg6e

User Centric Access control policy management framework for Cloud applications

Abdul Ghafoor, Misbah Irum, Muhammad Qaisar
2013 2013 2nd National Conference on Information Assurance (NCIA)  
Privacy leakage Yes Policy specification module allow users to specify access control on their personal information in the form of profiles on blog and social networking websites according to their requirements  ...  to all three applications • , K." xAccess: A unified user-centric access control framework for web applications," Network Operations and Management Symposium ( Policy management framework for Cloud  ... 
doi:10.1109/ncia.2013.6725338 fatcat:mv433coz2bcp7a4zw54urpqfxm

Ontology-Based Risk Evaluation in User-Centric Identity Management

Gail-Joon Ahn, Pradeep Sekar
2011 2011 IEEE International Conference on Communications (ICC)  
We demonstrate the feasibility of our approach on dynamic online social networks where the user's identity plays a major role for access control and privacy management.  ...  Recent trends in the area of identity management have evolved from a traditional identification solution to a distributed user-centric identity management mechanism.  ...  ACKNOWLEDGMENTS This work was partially supported by the grants from National Science Foundation, Department of Energy and Open Invention Network.  ... 
doi:10.1109/icc.2011.5962948 dblp:conf/icc/AhnS11 fatcat:x6yw3tp7vna4tdniaaz2ht5bea

SocioPlatform: A Platform for Social Context-Aware Applications [chapter]

Muhammad Ashad Kabir, Alan Colman, Jun Han
2014 Context in Computing  
With an explosive growth in the popularity of social media and increasing prevelance and features of advanced mobile devices, interest has grown significantly in applications that are aware of users' social  ...  The platform hides the complexity of managing social context, and thus assists the development of social context-aware applications.  ...  Privacy policy module -It provides a policy interface to allow users to specify and manage their privacy preferences.  ... 
doi:10.1007/978-1-4939-1887-4_19 fatcat:6elxaildajekbht5yon3bqbffi

Understanding Risk Communication Gaps through E-Government Website and Twitter Hashtag Content Analyses: The Case of Indonesia's Mt. Sinabung Eruption

Akemi Takeoka Chatfield, Christopher G. Reddick
2015 Journal of Homeland Security and Emergency Management  
Our Twitter analysis of #sinabung found evidence for the absence of government engagement in risk perception communications and leadership in responding to the Indonesian public's expressed concerns for  ...  Sinabung eruptions in February 2014, causing 16 deaths and continuous evacuations of 30,000 residents.  ...  This is not surprising since the online social network has only 532 unique #sinabung users.  ... 
doi:10.1515/jhsem-2014-0086 fatcat:vboszh7c4vdevc2rpkiaxbxqkq

Mobile social networking middleware: A survey

Paolo Bellavista, Rebecca Montanari, Sajal K. Das
2013 Pervasive and Mobile Computing  
Indeed, MSN enhances the capabilities of more traditional Online Social Networking (OSN) to a great extent by enabling mobile users to benefit from opportunistically created social communities; these communities  ...  The convergence of social networking and mobile computing is expected to generate a new class of applications, called Mobile Social Networking (MSN) applications, that will be of significant importance  ...  This middleware allows mobile users to maintain and extend their online social networks through opportunistic encounters, thus promoting user-centric MSNs.  ... 
doi:10.1016/j.pmcj.2013.03.001 fatcat:pvtkbe5unvgjrcupo6inxq4qqe

Three Level Based Security for Improvised User Privacy in Human Computer Interaction

2019 International Journal of Engineering and Advanced Technology  
Privacy can be a key aspect of the user experience with computers, online systems, and new technologies.  ...  In this paper, a three-level model-based approach is provided for the end user privacy in the human computer interaction as the end user's privacy in the area of HCI is emerging as critical design element  ...  [4] discussed about neighborhood attacks in social network data publishing. In the paper the main focus is given on the one of the significant and challenging problem in social networks i.e.  ... 
doi:10.35940/ijeat.f9313.088619 fatcat:liauxigmvrd4lpyk325niwusfi

An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control [chapter]

Michael Netter, Sabri Hassan, Günther Pernul
2012 Lecture Notes in Computer Science  
The rise of online social networks (OSNs) has traditionally been accompanied by privacy concerns.  ...  In this paper, we argue in favor of a new paradigm, decoupling the management of social identities in OSNs from other social network services and providing access controls that take social contexts into  ...  Any opinion, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the European Union.  ... 
doi:10.1007/978-3-642-32287-7_6 fatcat:lmqri3jxbfbwjm5g4bxdd3oqpq

Vulnerability to social engineering in social networks: a proposed user-centric framework

Samar Albladi, George R. S. Weir
2016 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)  
Yet little research has discussed social engineering in the virtual environments of social networks.  ...  In this context, the present study proposes a user-centric framework to understand the userÕs susceptibility, relevant factors and dimensions.  ...  The present research proposes a user-centric framework in order to build a coherent understanding of user vulnerability to social engineering-based attacks in the social network context. II.!  ... 
doi:10.1109/icccf.2016.7740435 fatcat:n4zd66jhobf6rdhvymzzglbmbq

Privacy in the clouds

Ann Cavoukian
2008 Identity in the Information Society  
The paper advocates a "user-centric" approach to managing personal data online.  ...  However, user-centricity can be problematic when the user-the data subject-is not directly involved in transactions involving the disclosure, collection, processing, and storage of their personal data.  ...  Acknowledgements The author would like to acknowledge and thank IBM Research Systems & Software experts, in particular, Dr. Jan Camenisch, Anthony Nadalin, Michael R. Nelson and Dr.  ... 
doi:10.1007/s12394-008-0005-z fatcat:axlydx6e3vaqjm2dluraqd32g4
« Previous Showing results 1 — 15 out of 20,097 results