Ali-Eldin et al., 2016 - Google Patents
A risk evaluation approach for authorization decisions in social pervasive applicationsAli-Eldin et al., 2016
- Document ID
- 14429903073159840271
- Author
- Ali-Eldin A
- van den Berg J
- Ali H
- Publication year
- Publication venue
- Computers & Electrical Engineering
External Links
Snippet
Most research in social networks has focused on the assumption that unknown entities are malicious and thus the traditional approach was to detect them and deny their access to sensitive data. In this paper, we propose a new computational model that helps users predict …
- 238000011156 evaluation 0 title description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Almogren et al. | Ftm-iomt: Fuzzy-based trust management for preventing sybil attacks in internet of medical things | |
| Friedman et al. | Privacy aspects of recommender systems | |
| Carminati et al. | Security and trust in online social networks | |
| Zhang et al. | Social media security and trustworthiness: overview and new direction | |
| Hu et al. | Multiparty access control for online social networks: model and mechanisms | |
| Amintoosi et al. | A reputation framework for social participatory sensing systems | |
| Alamir et al. | Trust evaluation between users of social networks using the quality of service requirements and call log histories | |
| Ahmed et al. | Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches | |
| Adams | Introduction to privacy enhancing technologies: a classification-based approach to understanding PETs | |
| Ali-Eldin et al. | A risk evaluation approach for authorization decisions in social pervasive applications | |
| Marulli et al. | A security-oriented architecture for federated learning in cloud environments | |
| Singh et al. | An adaptive mutual trust based access control model for electronic healthcare system | |
| Vahabli et al. | A novel trust-based access control for social networks using fuzzy systems | |
| Barhoun et al. | Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system | |
| Ruotsalainen | Privacy, trust and security in two-sided markets | |
| Manna et al. | A survey of trust models for enterprise information systems | |
| Baek et al. | Trust‐based access control model from sociological approach in dynamic online social network environment | |
| Lin et al. | DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing | |
| Trujillo et al. | A traffic analysis attack to compute social network measures | |
| Alraddadi et al. | Towards Understanding the Critical Role of Human Behavior in Smart and Cognitive City Cybersecurity | |
| Amintoosi et al. | Providing trustworthy contributions via a reputation framework in social participatory sensing systems | |
| Seigneur et al. | The role of identity in pervasive computational trust | |
| Kumar et al. | Review on social network trust with respect to big data analytics | |
| O’Regan | Ethics and privacy | |
| Junquera-Sánchez et al. | JBCA: Designing an adaptative continuous authentication architecture |