Modeling Access Control Policy of a Social Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information), privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.
Authors and Affiliations
Chaimaa Belbergui, Najib Elkamoun, Rachid Hilal
Design Patterns and General Video Game Level Generation
Design patterns have become a vital solution for a number of problems in software engineering. In this paper, we have performed rhythmic analysis of General Video Game Level Generation (GVG-LG) framework and have discern...
An Adaptive Multimodal Biometrics System using PSO
Multimodal biometric systems which fuse information from a number of biometrics, are gaining more attentions lately because they are able to overcome limitations in unimodal biometric systems. These systems are suited fo...
The Art of Crypto Currencies
Crypto Currencies have recently gained enormous popularity amongst the general public. With each passing day, more and more companies are radically accepting crypto cur-rencies in their payment systems, paving way for an...
Different Protocols for High Speed Networks
New challenges arise with the presence of various types of physical links, such as wireless networks, high speed and satellite in today’s ever-changing network. It is clear that the TCP throughput deteriorates in h...
Deep Transfer Learning Application for Automated Ischemic Classification in Posterior Fossa CT Images
Computed Tomography (CT) imaging is one of the conventional tools used to diagnose ischemic in Posterior Fossa (PF). Radiologist commonly diagnoses ischemic in PF through CT imaging manually. However, such a procedure co...