[go: up one dir, main page]

Ali-Eldin et al., 2016 - Google Patents

A risk evaluation approach for authorization decisions in social pervasive applications

Ali-Eldin et al., 2016

Document ID
14429903073159840271
Author
Ali-Eldin A
van den Berg J
Ali H
Publication year
Publication venue
Computers & Electrical Engineering

External Links

Snippet

Most research in social networks has focused on the assumption that unknown entities are malicious and thus the traditional approach was to detect them and deny their access to sensitive data. In this paper, we propose a new computational model that helps users predict …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Almogren et al. Ftm-iomt: Fuzzy-based trust management for preventing sybil attacks in internet of medical things
Friedman et al. Privacy aspects of recommender systems
Carminati et al. Security and trust in online social networks
Zhang et al. Social media security and trustworthiness: overview and new direction
Hu et al. Multiparty access control for online social networks: model and mechanisms
Amintoosi et al. A reputation framework for social participatory sensing systems
Alamir et al. Trust evaluation between users of social networks using the quality of service requirements and call log histories
Ahmed et al. Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches
Adams Introduction to privacy enhancing technologies: a classification-based approach to understanding PETs
Ali-Eldin et al. A risk evaluation approach for authorization decisions in social pervasive applications
Marulli et al. A security-oriented architecture for federated learning in cloud environments
Singh et al. An adaptive mutual trust based access control model for electronic healthcare system
Vahabli et al. A novel trust-based access control for social networks using fuzzy systems
Barhoun et al. Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system
Ruotsalainen Privacy, trust and security in two-sided markets
Manna et al. A survey of trust models for enterprise information systems
Baek et al. Trust‐based access control model from sociological approach in dynamic online social network environment
Lin et al. DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing
Trujillo et al. A traffic analysis attack to compute social network measures
Alraddadi et al. Towards Understanding the Critical Role of Human Behavior in Smart and Cognitive City Cybersecurity
Amintoosi et al. Providing trustworthy contributions via a reputation framework in social participatory sensing systems
Seigneur et al. The role of identity in pervasive computational trust
Kumar et al. Review on social network trust with respect to big data analytics
O’Regan Ethics and privacy
Junquera-Sánchez et al. JBCA: Designing an adaptative continuous authentication architecture