{"id":"https://openalex.org/W2009714374","doi":"https://doi.org/10.1109/dsn.2014.38","title":"Social Puzzles: Context-Based Access Control in Online Social Networks","display_name":"Social Puzzles: Context-Based Access Control in Online Social Networks","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2009714374","doi":"https://doi.org/10.1109/dsn.2014.38","mag":"2009714374"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2014.38","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012114492","display_name":"Murtuza Jadliwala","orcid":"https://orcid.org/0000-0001-9316-1943"},"institutions":[{"id":"https://openalex.org/I39587148","display_name":"Wichita State University","ror":"https://ror.org/00c4e7y75","country_code":"US","type":"education","lineage":["https://openalex.org/I39587148"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Murtuza Jadliwala","raw_affiliation_strings":["Wichita State University, Wichita KS, USA"],"affiliations":[{"raw_affiliation_string":"Wichita State University, Wichita KS, USA","institution_ids":["https://openalex.org/I39587148"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045020872","display_name":"Anindya Maiti","orcid":"https://orcid.org/0000-0001-6461-2805"},"institutions":[{"id":"https://openalex.org/I39587148","display_name":"Wichita State University","ror":"https://ror.org/00c4e7y75","country_code":"US","type":"education","lineage":["https://openalex.org/I39587148"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anindya Maiti","raw_affiliation_strings":["Wichita State University, Wichita KS, USA"],"affiliations":[{"raw_affiliation_string":"Wichita State University, Wichita KS, USA","institution_ids":["https://openalex.org/I39587148"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008657111","display_name":"Vinod Namboodiri","orcid":"https://orcid.org/0000-0003-0705-6990"},"institutions":[{"id":"https://openalex.org/I39587148","display_name":"Wichita State University","ror":"https://ror.org/00c4e7y75","country_code":"US","type":"education","lineage":["https://openalex.org/I39587148"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vinod Namboodiri","raw_affiliation_strings":["Wichita State University, Wichita KS, USA"],"affiliations":[{"raw_affiliation_string":"Wichita State University, Wichita KS, USA","institution_ids":["https://openalex.org/I39587148"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.452577,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":79},"biblio":{"volume":"11","issue":null,"first_page":"299","last_page":"310"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Trust and Reputation Systems in Online Environments","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.69595873},{"id":"https://openalex.org/keywords/access-control","display_name":"Access Control","score":0.554869},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4730025},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.45850876}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81143564},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6976437},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.69595873},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6056018},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.56297815},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.539767},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.49463508},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47482094},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4730025},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.45850876},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.43526614},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41330394},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32650584},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.097075015},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.087827325},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2014.38","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.52,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1980032486","https://openalex.org/W1982103655","https://openalex.org/W2016563917","https://openalex.org/W2045802490","https://openalex.org/W2063703813","https://openalex.org/W2077347451","https://openalex.org/W2103230119","https://openalex.org/W2108072891","https://openalex.org/W2125974619","https://openalex.org/W2139812911","https://openalex.org/W2141420453","https://openalex.org/W2146095252","https://openalex.org/W2170269683","https://openalex.org/W2537742203","https://openalex.org/W27283053","https://openalex.org/W4386450912"],"related_works":["https://openalex.org/W2546066963","https://openalex.org/W2414507368","https://openalex.org/W2357522001","https://openalex.org/W2284242097","https://openalex.org/W2277948094","https://openalex.org/W2166798126","https://openalex.org/W2121067221","https://openalex.org/W2086058948","https://openalex.org/W2045901755","https://openalex.org/W1495119096"],"abstract_inverted_index":{"The":[0],"increasing":[1],"popularity":[2],"of":[3,18,42,138,158,182,192],"online":[4],"social":[5,43,90],"networks":[6],"(OSNs)":[7],"is":[8,58,93,176],"spawning":[9],"new":[10],"security":[11,203],"and":[12,52,64,80,89,210,215],"privacy":[13],"concerns.":[14],"Currently,":[15],"a":[16,135,179],"majority":[17],"OSNs":[19],"offer":[20],"very":[21],"naive":[22],"access":[23,32,69,140,149,170],"control":[24,33,68,141,171],"mechanisms":[25],"that":[26,221],"are":[27,146],"primarily":[28],"based":[29,48,72,177],"on":[30,73,86,178,227,234],"static":[31,46],"lists":[34],"(ACL)":[35],"or":[36,109,124],"policies.":[37],"But":[38],"as":[39,100,231],"the":[40,74,101,150,159,174,188,222],"number":[41],"connections":[44],"grow,":[45],"ACL":[47],"approaches":[49],"become":[50],"ineffective":[51],"unappealing":[53],"to":[54,67,70,125,148],"OSN":[55,98],"users.":[56],"There":[57],"an":[59,193],"increased":[60],"need":[61],"in":[62,142,172],"social-networking":[63],"data-sharing":[65],"applications":[66,207],"data":[71,87,107,152],"associated":[75,161],"context":[76,160],"(e.g.,":[77,116],"event,":[78],"location,":[79],"users":[81,112,145],"involved),":[82],"rather":[83],"than":[84],"solely":[85],"ownership":[88],"connections.":[91],"Surveillance":[92],"another":[94],"critical":[95],"concern":[96],"for":[97,113,119,168,208],"users,":[99],"service":[102],"provider":[103],"may":[104],"further":[105],"scrutinize":[106],"posted":[108],"shared":[110,151],"by":[111,121],"personal":[114],"gains":[115],"targeted":[117],"advertisements),":[118],"use":[120,191],"corporate":[122],"partners":[123],"comply":[126],"with":[127,162],"legal":[128],"orders.":[129],"In":[130],"this":[131],"paper,":[132],"we":[133,200],"introduce":[134],"novel":[136,180],"paradigm":[137],"context-based":[139,169],"OSNs,":[143],"where":[144],"able":[147],"only":[153],"if":[154],"they":[155],"have":[156],"knowledge":[157],"it.":[163],"We":[164],"propose":[165],"two":[166],"constructions":[167,224],"OSNs:":[173],"first":[175],"application":[181],"Shamir's":[183],"secret":[184],"sharing":[185],"scheme,":[186],"whereas":[187],"second":[189],"makes":[190],"attribute-based":[194],"encryption":[195],"scheme.":[196],"For":[197],"both":[198],"constructions,":[199],"analyze":[201],"their":[202,213],"properties,":[204],"implement":[205],"proof-of-concept":[206],"Facebook":[209],"empirically":[211],"evaluate":[212],"functionality":[214],"performance.":[216],"Our":[217],"empirical":[218],"measurements":[219],"show":[220],"proposed":[223],"execute":[225],"efficiently":[226],"standard":[228],"computing":[229],"hardware,":[230],"well":[232],"as,":[233],"portable":[235],"mobile":[236],"devices.":[237]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2009714374","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2024-12-03T11:07:19.531255","created_date":"2016-06-24"}