Abstract
Social network is a way of representing the personality. Postings which is written by an owner, and comments which are produced by friends are the significant elements in social network. Unintended postings are not made but unsolicited comments can be produced and influence the online persona of the owner. Therefore a method of preventing such comments is needed. In this paper, we propose a reputation based access control for persona management. This method is to allow the right of making comments to only the deserved friends. This qualification is determined by comparing the reputation of each friend and the characteristic of each posting. The reputation of each social network user is made from the behaviors and their social evaluation. With this method, unnecessary fray and controversy are avoided without provoking social alienation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
“The 10 Top Reasons Why We Use Social Networks,” WeRSM | We Are Social Media, 06-May-2015
R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE Communications Magazine, vol. 32, no. 9, pp. 40–48, Sep. 1994
D. F. Ferraiolo and D. R. Kuhn, “Role-Based Access Controls,” arXiv:0903.2171 [cs], Mar. 2009
L. Rostad and O. Nytro, “Personalized Access Control for a Personally Controlled Health Record,” in Proceedings of the 2Nd ACM Workshop on Computer Security Architectures, New York, NY, USA, 2008, pp. 9–16
“Definition of REPUTATION.” [Online]. Available: http://www.merriam-webster.com/dictionary/reputation. [Accessed: 31-Aug-2016]
B. T. Adler, L. de Alfaro, A. Kulshreshtha, and I. Pye, “Reputation Systems for Open Collaboration,” Commun ACM, vol. 54, no. 8, pp. 81–87, Aug. 2011
S. D. Ramchurn, D. Huynh, and N. R. Jennings, “Trust in multi-agent systems,” The Knowledge Engineering Review, vol. 19, no. 1, Mar. 2004
J. Jolande, Complex/Archetype/Symbol In The Psychology Of C G Jung. Routledge, 2013
“Twitter.” [Online]. Available: https://twitter.com/. [Accessed: 09-Sep-2016].
“Facebook.” [Online]. Available: https://www.facebook.com/. [Accessed: 09-Sep-2016].
“Twitter Natural Language Processing – Noah’s ARK.” [Online]. Available: http://www.cs.cmu.edu/~ark/TweetNLP/. [Accessed: 09-Sep-2016].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Lee, K., Nam, Y. (2017). Reputation based Access Control in Social Networks for Persona Management. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-49106-6_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49105-9
Online ISBN: 978-3-319-49106-6
eBook Packages: EngineeringEngineering (R0)