RuleSN: Research and Application of Social Network Access Control Model

Li Ma, Lixin Tao, Yong Zhong, Keke Gai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

18 Citations (Scopus)

Abstract

Current rapid increasing implementations in data diversity, autonomy and dynamic privilege management, fine-grained access control in social networks have resulted in various challenges in applying existing access control models. We focus on this issue and propose a new social network access control model, RuleSN, using logical authorization language. The model provides high performance of authorization expressiveness and flexibility that can perfectly describe relations of User to User (U2U), User to Resource (U2R), Resource to Resource (R2R) and attributes of users and resources. First, this paper elaborates the formal definitions of the RuleSN model. Second, we describe the model's authorization specification and verification policies and explain the syntax and semantics of the authorization language. Finally, the implementation, application and expressiveness of the model discussed by examples.

Original languageEnglish
Title of host publicationProceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
EditorsMeikang Qiu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages418-423
Number of pages6
ISBN (Electronic)9781509024025
DOIs
Publication statusPublished - 30 Jun 2016
Externally publishedYes
Event2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016 - New York, United States
Duration: 9 Apr 201610 Apr 2016

Publication series

NameProceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016

Conference

Conference2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
Country/TerritoryUnited States
CityNew York
Period9/04/1610/04/16

Keywords

  • RuleSN
  • Social network
  • access control
  • authorization language
  • cybersecurity
  • privilege management

Fingerprint

Dive into the research topics of 'RuleSN: Research and Application of Social Network Access Control Model'. Together they form a unique fingerprint.

Cite this