Multiuser access control for online social networks: by using of multiparty access control
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Now a day Online social networks (OSNs) have got an exponential growth and become a fame to millions of Internet users. These OSNs offer attractive ways and methods for social interactions and information sharing, Also OSNs allow users to restrict access to shared data but it is not effective in enforcing security over the data. In this paper , we propose an approach to provide the protection by considering multiparty authorization requirements. It also explained a logical representation of our access control model that allows us to leverage the features of existing logic solvers to perform various analysis tasks on our model.
Authors and Affiliations
A. M. Prasanth Kumar, J. Ravi Kumar
Review on Novel Approach to Filter Unwanted Messages in On-line Social Networks
Nowadays, online social networking websites are used frequently. These websites are known as social sites. Social networking sites works like an online internet users community. Depending on the websites many of these...
Improved Routing Mechanism for Enhancing Mobile Adhoc Network By Using Elliptic Curve Algorithm
In mobile adhoc network routing optimization along with security is enhancing. Mobile adhoc networks have constantly changing topologies; hence several routing protocols must satisfy the challenge of link quality, de...
Enhance The Performance Of Mobile Presence Services By Scalable Server Architecture (Presence Cloud)
A mobile existence overhaul is a necessary constituent of a social network application as it uphold each mobile user’s presence information such as the current status, GPS location and network address. Also updates t...
Monitoring the efficiency of workflow in industry and secure access using NFC and Ethernet
Mobile phones have evolved from their usual function of calling to a lot more in the last decade, the 4G networks are being used for microwave access, But the use of mobile in field of Tele-monitoring is still a open...
Defence Consideration of Strategy Classifiers under Assault
Pattern arrangement of action structures are for the most part used as a piece of hostile applications, as biometric affirmation, framework intrusion area, and spam isolating, in which data can be purposely controlle...