skip to main content
10.1145/2523514.2523545acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Social access control language (SocACL)

Published:26 November 2013Publication History

ABSTRACT

Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the user, to negatively influencing the decision of potential employers, identity theft and even physical harm it is important that they are addressed. In this research we approach privacy management in OSNs as an access control problem. We propose a formal Attribute-Based Access Control (ABAC) language; SocACL. SocACL is based on Answer Set Programming (ASP) and allows for policy specification using the most abundant sources of information available in OSNs; user attributes and relationships. This paper outlines SocACL's core concepts, features, syntax and semantics.

References

  1. C. Baral. Knowledge Representation, Reasoning and Declartive Problem Solving. Cambridge University Press, 1st edition, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Crampton and C. Morisset. PTaCL: A Language for Attribute-Based Access Control in Open Systems. Lecture Notes in Computer Science, 7215 LNCS: 390--409, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. B. Dhia. Access control in social networks: a reachability-based approach. In Proc. of the 2012 Joint EDBT/ICDT Workshops, EDBT-ICDT '12, pages 227--232, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Faber, G. Pfeifer, N. Leone, T. Dell'Armi, and G. Ielpa. Design and implementation of aggregate functions in the DLV system. Theory and Practice of Logic Programming, 8: 545--580, 10 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. W. Fong. Relationship-based access control: protection model and policy language. In Proc. of the 1st ACM Conf. on Data and Application Sec. and Pri., CODASPY '11, pages 191--202, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Gao, J. Hu, T. Huang, J. Wang, and Y. Chen. Security Issues in Online Social Networks. Internet Computing, IEEE, 15(4): 56--63, July-Aug. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Hu, G. Ahn, and J. Jorgensen. Multiparty access control for online social networks: Model and mechanisms. Knowledge and Data Engineering, IEEE Trans. on, 25(7): 1614--1627, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H. R. Lipford, A. Besmer, and J. Watson. Understanding Privacy Settings in Facebook with an Audience View. In Proc. of the 1st Conf. on Usability, Psychology, and Sec., UPSEC'08, pages 2:1--2:8, Berkeley, CA, USA, 2008. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Madejski, M. Johnson, and S. Bellovin. A Study of Privacy Settings Errors in an Online Social Network. In Proc. of Pervasive Computing and Comm. Workshops (PERCOM Workshops), 2012 IEEE Int. Conf. on, pages 340--345, March 2012.Google ScholarGoogle ScholarCross RefCross Ref
  10. E. Yuan and J. Tong. Attributed based access control (ABAC) for web services. In Web Services, 2005. ICWS 2005. Proc. 2005 IEEE Int. Conf. on. IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Social access control language (SocACL)

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
              November 2013
              483 pages
              ISBN:9781450324984
              DOI:10.1145/2523514

              Copyright © 2013 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 26 November 2013

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • short-paper

              Acceptance Rates

              Overall Acceptance Rate102of289submissions,35%
            • Article Metrics

              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader