Home > Research > Publications & Outputs > IMPROVE

Electronic data

  • IMPROVE

    Rights statement: ©2016 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

    Accepted author manuscript, 177 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

View graph of relations

IMPROVE: Identifying Minimal PROfile VEctors for similarity based access control

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

IMPROVE: Identifying Minimal PROfile VEctors for similarity based access control. / Misra, Gaurav; Such, Jose M.; Balogun, Hamed.
2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE, 2016. p. 868-875 (2016 IEEE Trustcom/BigDataSE/I​SPA).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Misra, G, Such, JM & Balogun, H 2016, IMPROVE: Identifying Minimal PROfile VEctors for similarity based access control. in 2016 IEEE Trustcom/BigDataSE/I​SPA. 2016 IEEE Trustcom/BigDataSE/I​SPA, IEEE, pp. 868-875, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 23/08/16.

APA

Misra, G., Such, J. M., & Balogun, H. (2016). IMPROVE: Identifying Minimal PROfile VEctors for similarity based access control. In 2016 IEEE Trustcom/BigDataSE/I​SPA (pp. 868-875). (2016 IEEE Trustcom/BigDataSE/I​SPA). IEEE.

Vancouver

Misra G, Such JM, Balogun H. IMPROVE: Identifying Minimal PROfile VEctors for similarity based access control. In 2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE. 2016. p. 868-875. (2016 IEEE Trustcom/BigDataSE/I​SPA).

Author

Misra, Gaurav ; Such, Jose M. ; Balogun, Hamed. / IMPROVE : Identifying Minimal PROfile VEctors for similarity based access control. 2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE, 2016. pp. 868-875 (2016 IEEE Trustcom/BigDataSE/I​SPA).

Bibtex

@inproceedings{46ce6005b4bd4ef2a49c625897ac8ddf,
title = "IMPROVE: Identifying Minimal PROfile VEctors for similarity based access control",
abstract = "There is ample evidence which shows that social media users struggle to make appropriate access control decisions while disclosing their information and smarter mechanisms are needed to assist them. Using profile information to ascertain similarity between users and provide suggestions to them during the process of making access control decisions has been put forth as a possible solution to this problem. This paper presents an empirical study aimed at identifying the minimal subset of attributes which are most suitable for being used to create profile vectors for the purpose of predicting access control decisions. We begin with an exhaustive list of 30 profile attributes and identify a subset of 2 profile attributes which are shown to be sufficient in obtaining similarity between profiles and predicting access control decisions with the same accuracy as previous models. We demonstrate that using this pair of attributes will help mitigate the challenges encountered by similarity based access control mechanisms.",
author = "Gaurav Misra and Such, {Jose M.} and Hamed Balogun",
note = "{\textcopyright}2016 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.; 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), IEEE TrustCom 16 ; Conference date: 23-08-2016 Through 26-08-2016",
year = "2016",
month = aug,
day = "23",
language = "English",
isbn = "9781509032068",
series = "2016 IEEE Trustcom/BigDataSE/I​SPA",
publisher = "IEEE",
pages = "868--875",
booktitle = "2016 IEEE Trustcom/BigDataSE/I​SPA",
url = "http://adnet.tju.edu.cn/TrustCom2016/",

}

RIS

TY - GEN

T1 - IMPROVE

T2 - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)

AU - Misra, Gaurav

AU - Such, Jose M.

AU - Balogun, Hamed

N1 - ©2016 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PY - 2016/8/23

Y1 - 2016/8/23

N2 - There is ample evidence which shows that social media users struggle to make appropriate access control decisions while disclosing their information and smarter mechanisms are needed to assist them. Using profile information to ascertain similarity between users and provide suggestions to them during the process of making access control decisions has been put forth as a possible solution to this problem. This paper presents an empirical study aimed at identifying the minimal subset of attributes which are most suitable for being used to create profile vectors for the purpose of predicting access control decisions. We begin with an exhaustive list of 30 profile attributes and identify a subset of 2 profile attributes which are shown to be sufficient in obtaining similarity between profiles and predicting access control decisions with the same accuracy as previous models. We demonstrate that using this pair of attributes will help mitigate the challenges encountered by similarity based access control mechanisms.

AB - There is ample evidence which shows that social media users struggle to make appropriate access control decisions while disclosing their information and smarter mechanisms are needed to assist them. Using profile information to ascertain similarity between users and provide suggestions to them during the process of making access control decisions has been put forth as a possible solution to this problem. This paper presents an empirical study aimed at identifying the minimal subset of attributes which are most suitable for being used to create profile vectors for the purpose of predicting access control decisions. We begin with an exhaustive list of 30 profile attributes and identify a subset of 2 profile attributes which are shown to be sufficient in obtaining similarity between profiles and predicting access control decisions with the same accuracy as previous models. We demonstrate that using this pair of attributes will help mitigate the challenges encountered by similarity based access control mechanisms.

M3 - Conference contribution/Paper

SN - 9781509032068

T3 - 2016 IEEE Trustcom/BigDataSE/I​SPA

SP - 868

EP - 875

BT - 2016 IEEE Trustcom/BigDataSE/I​SPA

PB - IEEE

Y2 - 23 August 2016 through 26 August 2016

ER -