Design Patterns for Multiple Stakeholders in Social Computing - LNCS 8566: Data and Applications Security and Privacy XXVIII Access content directly
Conference Papers Year : 2014

Design Patterns for Multiple Stakeholders in Social Computing

Pooya Mehregan
  • Function : Author
  • PersonId : 978058
Philip L. Fong
  • Function : Author
  • PersonId : 978059


In social computing, multiple users may have privacy stakes in a content (e.g., a tagged photo). They may all want to have a say on the choice of access control policy for protecting that content. The study of protection schemes for multiple stakeholders in social computing has captured the imagination of researchers, and general-purpose schemes for reconciling the differences of privacy stakeholders have been proposed.A challenge of existing multiple-stakeholder schemes is that they can be very complex. In this work, we consider the possibility of simplification in special cases. If we focus on specific instances of multiple stakeholders, are there simpler design of access control schemes? We identify two design patterns for handling a significant family of multiple-stakeholder scenarios. We discuss efficient implementation techniques that solely rely on standard SQL technology. We also identify scenarios in which general-purpose multiple-stakeholder schemes are necessary. We believe that future work on multiple stakeholders should focus on these scenarios.
Fichier principal
Vignette du fichier
978-3-662-43936-4_11_Chapter.pdf (4 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01284852 , version 1 (08-03-2016)





Pooya Mehregan, Philip L. Fong. Design Patterns for Multiple Stakeholders in Social Computing. 28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.163-178, ⟨10.1007/978-3-662-43936-4_11⟩. ⟨hal-01284852⟩
59 View
60 Download



Gmail Facebook X LinkedIn More