Modeling Access Control Policy of a Social Network

被引:0
作者
Belbergui, Chaimaa [1 ]
Elkamoun, Najib [1 ]
Hilal, Rachid [2 ]
机构
[1] Chouaib Doukkali Univ, STIC Lab, El Jadida, Morocco
[2] Chouaib Doukkali Univ, Presidency, El Jadida, Morocco
关键词
social network; Facebook; access control; OrBAC; study of coherence;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Social networks bring together users in a virtual platform and offer them the ability to share - within the Community-personal and professional information's, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information), privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.
引用
收藏
页码:198 / 206
页数:9
相关论文
共 14 条
[1]  
Ajami R, 2011, INT J COMPUT SCI NET, V11, P1
[2]  
AUTREL F, 2008, 3 C SEC NETW ARCH IN, P273
[3]  
Brown G, 2008, CSCW: 2008 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK, CONFERENCE PROCEEDINGS, P403
[4]  
Cheek GP, 2012, P 17 ACM S ACC CONTR, P23
[5]  
El Kalam A.A., 2003, CAHIERS FRANCOPHONES, V1, P30
[6]  
Estienne Y., 2011, MONDE VERRE FACEBOOK
[7]  
Ferraiolo D., 1995, ROLE BASED ACCESS CO
[8]  
Ferraiolo D. F., 2009, ARXIV09032171
[9]  
Madejski M., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P340, DOI 10.1109/PerComW.2012.6197507
[10]  
Masoumzadeh Amirreza, 2011, International Journal of Information Privacy, Security and Integrity, V1, P59