Skip to main content

Reputation based Access Control in Social Networks for Persona Management

  • Conference paper
  • First Online:
  • 1351 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 2))

Abstract

Social network is a way of representing the personality. Postings which is written by an owner, and comments which are produced by friends are the significant elements in social network. Unintended postings are not made but unsolicited comments can be produced and influence the online persona of the owner. Therefore a method of preventing such comments is needed. In this paper, we propose a reputation based access control for persona management. This method is to allow the right of making comments to only the deserved friends. This qualification is determined by comparing the reputation of each friend and the characteristic of each posting. The reputation of each social network user is made from the behaviors and their social evaluation. With this method, unnecessary fray and controversy are avoided without provoking social alienation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. “The 10 Top Reasons Why We Use Social Networks,” WeRSM | We Are Social Media, 06-May-2015

    Google Scholar 

  2. R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE Communications Magazine, vol. 32, no. 9, pp. 40–48, Sep. 1994

    Google Scholar 

  3. D. F. Ferraiolo and D. R. Kuhn, “Role-Based Access Controls,” arXiv:0903.2171 [cs], Mar. 2009

    Google Scholar 

  4. L. Rostad and O. Nytro, “Personalized Access Control for a Personally Controlled Health Record,” in Proceedings of the 2Nd ACM Workshop on Computer Security Architectures, New York, NY, USA, 2008, pp. 9–16

    Google Scholar 

  5. “Definition of REPUTATION.” [Online]. Available: http://www.merriam-webster.com/dictionary/reputation. [Accessed: 31-Aug-2016]

    Google Scholar 

  6. B. T. Adler, L. de Alfaro, A. Kulshreshtha, and I. Pye, “Reputation Systems for Open Collaboration,” Commun ACM, vol. 54, no. 8, pp. 81–87, Aug. 2011

    Google Scholar 

  7. S. D. Ramchurn, D. Huynh, and N. R. Jennings, “Trust in multi-agent systems,” The Knowledge Engineering Review, vol. 19, no. 1, Mar. 2004

    Google Scholar 

  8. J. Jolande, Complex/Archetype/Symbol In The Psychology Of C G Jung. Routledge, 2013

    Google Scholar 

  9. “Twitter.” [Online]. Available: https://twitter.com/. [Accessed: 09-Sep-2016].

    Google Scholar 

  10. “Facebook.” [Online]. Available: https://www.facebook.com/. [Accessed: 09-Sep-2016].

    Google Scholar 

  11. “Twitter Natural Language Processing – Noah’s ARK.” [Online]. Available: http://www.cs.cmu.edu/~ark/TweetNLP/. [Accessed: 09-Sep-2016].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keonsoo Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Lee, K., Nam, Y. (2017). Reputation based Access Control in Social Networks for Persona Management. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49106-6_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49105-9

  • Online ISBN: 978-3-319-49106-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics