Identifying Transitivity Threats in Social Networks

Sorren Hanvey, Néstor Cataño
{"title":"Identifying Transitivity Threats in Social Networks","authors":"Sorren Hanvey, Néstor Cataño","doi":"10.1109/TELERISE.2015.11","DOIUrl":null,"url":null,"abstract":"Transitivity threats refer to the unintended disclosure of information to unintended recipients as a consequence of an unrelated action. In the context of social networking sites, transitivity threats refer to potential privacy policy breaches that stem from the automated transmission of data/content due to user actions within the social network. For example, commenting on some content within the social network makes the commented content visible to the recipients of the comment, thereby breaching the privacy policy under which the original/commented content was shared. This paper presents a novel approach for modelling and comparing social network privacy policies to deal with transitivity threats. Our approach differs from existing approaches in its use of formal methods techniques to compare social network privacy policies. This work builds on a predicate calculus definition for social networking, modelling social network content, people, friendship relations, and privacy policies as access permissions to content. We have implemented our approach as a tool called Poporo. The tool extends on a previous version of the Poporo tool that checked a third party application's compliance with system invariants. We validate our approach by using Poporo on several examples.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TELERISE.2015.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Transitivity threats refer to the unintended disclosure of information to unintended recipients as a consequence of an unrelated action. In the context of social networking sites, transitivity threats refer to potential privacy policy breaches that stem from the automated transmission of data/content due to user actions within the social network. For example, commenting on some content within the social network makes the commented content visible to the recipients of the comment, thereby breaching the privacy policy under which the original/commented content was shared. This paper presents a novel approach for modelling and comparing social network privacy policies to deal with transitivity threats. Our approach differs from existing approaches in its use of formal methods techniques to compare social network privacy policies. This work builds on a predicate calculus definition for social networking, modelling social network content, people, friendship relations, and privacy policies as access permissions to content. We have implemented our approach as a tool called Poporo. The tool extends on a previous version of the Poporo tool that checked a third party application's compliance with system invariants. We validate our approach by using Poporo on several examples.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
识别社交网络中的及物性威胁
传递性威胁是指由于不相关的行为而导致信息意外泄露给意外的接收者。在社交网站的背景下,传递性威胁是指由于用户在社交网络内的行为而导致的数据/内容的自动传输而导致的潜在隐私政策泄露。例如,在社交网络中评论某些内容,使得评论的内容对评论的接收者可见,从而违反了共享原始/评论内容的隐私政策。本文提出了一种新的方法来建模和比较社交网络隐私策略,以处理传递性威胁。我们的方法不同于现有的方法,它使用形式化方法技术来比较社交网络隐私政策。这项工作建立在社交网络的谓词演算定义之上,将社交网络内容、人员、友谊关系和隐私政策建模为内容的访问权限。我们已经将我们的方法作为一个叫做Poporo的工具来实现。该工具扩展了以前版本的Poporo工具,该工具检查第三方应用程序对系统不变量的遵从性。我们通过在几个示例上使用Poporo来验证我们的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Introducing New Technology into Italian Certified Electronic Mail: A Proposal Common Length Name Representation: An Efficient Privacy-Preserving Scheme Assessment of Access Control Systems Using Mutation Testing A Guide to End-to-End Privacy Accountability Privacy Points as a Method to Support Privacy Impact Assessments
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1