期刊文献+

线上社交网络访问控制模型综述 被引量:1

Survey on Access Control Models for Online Social Networks
下载PDF
导出
摘要 就线上社交网络访问控制模型的研究现状进行了分析、总结,指出当前研究中存在的关键问题和面临的挑战,并对此类模型的发展趋势和未来研究方向做出预测.线上社交网络方兴未艾,数据共享、隐私保护等问题日渐引起公众注意.作为信息安全手段,传统访问控制模型已不适应线上社交网络复杂环境下的安全需求.近年来针对线上社交网络访问控制模型的研究正成为热点问题,多个研究小组均从不同角度提出了新的访问控制模型. The research status of access control models for online social networks was analyzed and summarized. The key problems and challenges were also pointed out, and some development trends and future research directions was proposed. Along with the explosive development of online social networks, problems such as data sharing and privacy preservation are gradually grabbing the attention of the public. As information security mechanism, traditional access control models are incompetent to meet the security requirements under the complex circumstances of online social networks. Recent years, research on access control models for online social networks is becoming a hot topic and many new access control models have been proposed based on different perspectives.
作者 刘娜 叶春晓
出处 《计算机系统应用》 2014年第5期1-7,共7页 Computer Systems & Applications
关键词 线上社交网络 访问控制模型 隐私保护 策略语言 策略冲突消解 online social networks (OSNs) access control model privacy preservation policy language policyconflicts solution
  • 相关文献

参考文献3

二级参考文献68

  • 1李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:137
  • 2Hay M, Miklau G, Jensen D, et al. Anonymizing social networks [R]. 07-19. University of Massachusetts Amherst, 2007.
  • 3Liu K, Terzi E. Towards identity anonymization on graphs [C]// Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (SIGMOD' 08). New York, NY, USA, ACM Press, 2008 : 93.
  • 4Liu Kun, Das K, Grandison T, et al. Privacy preserving data analysis on graphs and social networks[C]//Kargupta H, Han J, Yu P, et al. , eds. Nexteneration Data Mining. CRC Press, 2008.
  • 5Zheleva E,Getoor L. Preserving the privacy of sensitive relationships in graph data[C]//Proeeedings of the 1st ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD(PinKDD' 07). 20071153-171.
  • 6Han Jia-wei, Kamber M, Data Ming. Concepts and Techniques(第二版)[M].范明,阵小峰,译.北京:机械:工业出版社,2007:255-259.
  • 7Zhou Bin, Pei J ian, Luk W-S. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data[J]. ACM SIGKDD Explorations, ACM Press, 2008, 10 (2) : 12-22.
  • 8Zhou B, Pei J. Preserving Privacy in Social Networks against Neighborhood Attacks[C]//IEEE International Conference on Data Engineering(ICDE). 2008 : 506-515.
  • 9Byun J W, Kamra A, Bertino E, et al. Efficient k-Anonymization using Clustering Techniques [C] // International Conference on Database Systems for Advanced Applications(DASFAA). 2007:188-200.
  • 10Blake E K C, Merz C J. UCI repository of machine learning databases[EB/OL], http//www, ics. uci. edu/-mlearn/MLReposi- tory. html, 1998.

共引文献24

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部