A Logical Framework for Verifying Privacy Breaches of Social Networks
@article{Catao2018ALF, title={A Logical Framework for Verifying Privacy Breaches of Social Networks}, author={N{\'e}stor Cata{\~n}o}, journal={ArXiv}, year={2018}, volume={abs/1806.03519} }
We present a novel approach to deal with transitivity permission-delegation threats that arise in social networks when content is granted permissions by third-party users thereby breaking the privacy policy of the content owner. These types of privacy breaches are often unintentional in social networks like Facebook, and hence, (more) in-place mechanisms are needed to make social network users aware of the consequences of changing their privacy policies. Our approach is unique in its use of…
References
SHOWING 1-10 OF 27 REFERENCES
Privacy Protection for Social Networking APIs
- Computer Science
- 2008
This work addresses the privacy risks associated with social networking APIs by presenting a privacy-by-proxy design for a privacypreserving API that is motivated by an analysis of the data needs and uses of Facebook applications.
Privacy suites: shared privacy for social networks
- Computer ScienceSOUPS
- 2009
A new paradigm is proposed which allows users to easily choose "suites" of privacy settings which have been specified by friends or trusted experts, only modifying them if they wish, which could dramatically increase the privacy protection that most users experience with minimal time investment.
Inferring privacy policies for social networking services
- Computer ScienceAISec '09
- 2009
A machine learning approach is used to extract automatically privacy settings based on the policy that information produced within a social context should remain in that social context, both to ensure privacy as well as maximising utility.
Information revelation and privacy in online social networks
- Computer ScienceWPES '05
- 2005
This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.
Efficient comparison of enterprise privacy policies
- Computer ScienceSAC '04
- 2004
A practical algorithm is presented, concentrating on those aspects that make refinement of privacy policies more difficult than, for example refinement for access control policies, such as a more sophisticated treatment of deny rules and a suitable way for dealing with obligations and conditions on context information.
Understanding and capturing people’s privacy policies in a mobile social networking application
- Computer SciencePersonal and Ubiquitous Computing
- 2008
This article reports on the work on PeopleFinder, an application that enables cell phone and laptop users to selectively share their locations with others, and explores technologies that empower users to more effectively and efficiently specify their privacy preferences.
Semantic web technologies to reconcile privacy and context awareness
- Computer ScienceJ. Web Semant.
- 2004
Formal Methods for Privacy
- Computer ScienceFM
- 2009
It is argued technology's dual role in privacy: new technologies raise new threats to privacy rights and new technologies can help preserve privacy, which raises new challenges and thus new research opportunities for the formal methods community.
Security policy compliance with violation management
- Computer ScienceFMSE '07
- 2007
This paper formally defines conditions to be satisfied by an information system to comply with its security policy and presents a proof-based approach to check if these conditions are enforced.
A Theory of Expressiveness in Mechanisms
- Computer ScienceAAAI
- 2008
A theory that ties the expressiveness of mechanisms to their efficiency in a domain-independent manner and derives an upper bound on the expected efficiency of any mechanism under its most efficient Nash equilibrium, which depends only on the mechanism's expressiveness.