Open Access
ARTICLE
Access Control Policy Based on Friend Circle
Qin Liu1, Tinghuai Ma1, 2, *, Fan Xing1, Yuan Tian3, Abdullah Al-Dhelaan3, Mohammed Al-Dhelaan3
1 School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, 210044, China.
2 CICAEET, Jiangsu Engineering Centre of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, 210044, China.
3 Computer Science Department, College of Computer and Information Sciences, King Saud University,
Riyadh, 11362, Saudi Arabia.
* Corresponding Author: Tinghuai Ma. Email: .
Computers, Materials & Continua 2020, 62(3), 1143-1159. https://doi.org/10.32604/cmc.2020.04949
Abstract
Nowadays, the scale of the user’s personal social network (personal network, a
network of the user and their friends, where the user we call “center user”) is becoming
larger and more complex. It is difficult to find a suitable way to manage them
automatically. In order to solve this problem, we propose an access control model for
social network to protect the privacy of the central users, which achieves the access
control accurately and automatically. Based on the hybrid friend circle detection
algorithm, we consider the aspects of direct judgment, indirect trust judgment and
malicious users, a set of multi-angle control method which could be adapted to the social
network environment is proposed. Finally, we propose the solution to the possible
conflict of rights in the right control, and assign the rights reasonably in the case of
guaranteeing the privacy of the users.
Keywords
Cite This Article
APA Style
Liu, Q., Ma, T., Xing, F., Tian, Y., Al-Dhelaan, A. et al. (2020). Access control policy based on friend circle. Computers, Materials & Continua, 62(3), 1143-1159. https://doi.org/10.32604/cmc.2020.04949
Vancouver Style
Liu Q, Ma T, Xing F, Tian Y, Al-Dhelaan A, Al-Dhelaan M. Access control policy based on friend circle. Comput Mater Contin. 2020;62(3):1143-1159 https://doi.org/10.32604/cmc.2020.04949
IEEE Style
Q. Liu, T. Ma, F. Xing, Y. Tian, A. Al-Dhelaan, and M. Al-Dhelaan "Access Control Policy Based on Friend Circle," Comput. Mater. Contin., vol. 62, no. 3, pp. 1143-1159. 2020. https://doi.org/10.32604/cmc.2020.04949