A user-to-user relationship-based access control model for online social networks

Yuan Cheng, Jaehong Park, Ravi Sandhu

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

57 Citations (Scopus)

Abstract

Users and resources in online social networks (OSNs) are interconnected via various types of relationships. In particular, user-to-user relationships form the basis of the OSN structure, and play a significant role in specifying and enforcing access control. Individual users and the OSN provider should be allowed to specify which access can be granted in terms of existing relationships. We propose a novel user-to-user relationship-based access control (UURAC) model for OSN systems that utilizes regular expression notation for such policy specification. We develop a path checking algorithm to determine whether the required relationship path between users for a given access request exists, and provide proofs of correctness and complexity analysis for this algorithm.

Original languageEnglish
Title of host publicationData and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Proceedings
Pages8-24
Number of pages17
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event26th Annual WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2012 - Paris, France
Duration: 11 Jul 201213 Jul 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7371 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference26th Annual WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2012
Country/TerritoryFrance
CityParis
Period11/07/1213/07/12

Keywords

  • Access Control
  • Security
  • Social Networks

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A user-to-user relationship-based access control model for online social networks'. Together they form a unique fingerprint.

Cite this