Loading...
Please wait, while we are loading the content...
Similar Documents
Towards provenance and risk-awareness in social computing
| Content Provider | ACM Digital Library |
|---|---|
| Author | Cheng, Yuan Nguyen, Dang Krishnan, Ram Bijon, Khalid Sandhu, Ravi Park, Jaehong |
| Abstract | Although social computing (SC) has been growing phenomenally, it still lacks an appropriate way of protecting the security and privacy of data shared in the system. Current access control mechanisms in the domain of SC mainly rely on pre-defined access control policies to achieve authorization statically, which are intrinsically unsuitable for capturing the dynamic changes in social environment. In this paper, we explore the approach towards a more flexible and adaptive control through the incorporation of risk awareness in SC. In particular, risk values are associated with users and objects; meanwhile, risk thresholds are defined for each of the permissions. Risk values and risk thresholds can be derived from provenance data in a timely manner. Such dynamic computation can be enabled and facilitated with the incorporation of provenance awareness in SC systems. |
| Starting Page | 25 |
| Ending Page | 30 |
| Page Count | 6 |
| File Format | |
| ISBN | 9781450317771 |
| DOI | 10.1145/2420936.2420941 |
| Language | English |
| Publisher | Association for Computing Machinery (ACM) |
| Publisher Date | 2012-09-19 |
| Publisher Place | New York |
| Access Restriction | Subscribed |
| Subject Keyword | Social computing Provenance Risk |
| Content Type | Text |
| Resource Type | Article |