scholarly journals Access Control Mechanism Based on Key Assignment and User Trust Level for Social Network Services

Author(s):  
Wenji Quan ◽  
Junho Hwang ◽  
Myungsik Yoo
2013 ◽  
Vol 756-759 ◽  
pp. 390-394
Author(s):  
Li Ting Gao ◽  
Zhen Yan Wang

This paper proposed a model for user security management. This model can establish the blacklist and white list to achieve the control of the user subsequent actions through monitoring the changing of user trust level. It also can establish trust policy based on assets importance and user trust level, specify the relationship between user trust and assets value and take it as a dynamic trust constraint for access control. The experiments show that this model combines trust level with access control mechanism; it can enhance the user security management.


Electronics ◽  
2019 ◽  
Vol 8 (10) ◽  
pp. 1165
Author(s):  
Kyoungsoo Bok ◽  
Inbae Jeon ◽  
Jongtae Lim ◽  
Jaesoo Yoo

Recently, social network services that express individual opinions and thoughts have been significantly developed. As unreliable information is generated and shared by arbitrary users in social network services, many studies have been conducted to find users who provide reliable and professional information. In this paper, we propose an expert finding scheme to discover users who can answer users’ questions professionally in social network services. We use a dynamic profile to extract the user’s latest interest through an analysis of the user’s recent activity. To improve the accuracy of the expert finding results, we consider the user trust and response quality. We conduct a performance evaluation with the existing schemes through various experiments to verify the superiority of the proposed scheme.


2021 ◽  
Vol 11 (6) ◽  
pp. 2530
Author(s):  
Minsoo Lee ◽  
Soyeon Oh

Over the past few years, the number of users of social network services has been exponentially increasing and it is now a natural source of data that can be used by recommendation systems to provide important services to humans by analyzing applicable data and providing personalized information to users. In this paper, we propose an information recommendation technique that enables smart recommendations based on two specific types of analysis on user behaviors, such as the user influence and user activity. The components to measure the user influence and user activity are identified. The accuracy of the information recommendation is verified using Yelp data and shows significantly promising results that could create smarter information recommendation systems.


2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


Sign in / Sign up

Export Citation Format

Share Document