By Topic

Role Based Access Control for social network sites

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Jianguo Li ; Dept. of Comput. Sci., Sun Yat-sen Univ., Guangzhou, China ; Yong Tang ; Chengjie Mao ; Hanjiang Lai
more authors

Social network sites are very popular and draw a number of users' attention in the time of Web 2.0. In this paper, we emphasize the access control research about social network sites from the perspective that roles imply patterns of relationships. We analyze the access control requirement of social network site, and introduce the role into it. Most important of all is that we propose the role base access control model for social network sites and define it with formal description. In the end, we build a social network site called SCHOLAT that targets toward specific groups who are scholars. We implement SCHOLAT and give the steps of resource request-reply procedure.

Published in:

Pervasive Computing (JCPC), 2009 Joint Conferences on

Date of Conference:

3-5 Dec. 2009