Skip to Main content Skip to Navigation
Conference papers

Design Patterns for Multiple Stakeholders in Social Computing

Abstract : In social computing, multiple users may have privacy stakes in a content (e.g., a tagged photo). They may all want to have a say on the choice of access control policy for protecting that content. The study of protection schemes for multiple stakeholders in social computing has captured the imagination of researchers, and general-purpose schemes for reconciling the differences of privacy stakeholders have been proposed.A challenge of existing multiple-stakeholder schemes is that they can be very complex. In this work, we consider the possibility of simplification in special cases. If we focus on specific instances of multiple stakeholders, are there simpler design of access control schemes? We identify two design patterns for handling a significant family of multiple-stakeholder scenarios. We discuss efficient implementation techniques that solely rely on standard SQL technology. We also identify scenarios in which general-purpose multiple-stakeholder schemes are necessary. We believe that future work on multiple stakeholders should focus on these scenarios.
Document type :
Conference papers
Complete list of metadata

Cited literature [16 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Tuesday, March 8, 2016 - 11:05:57 AM
Last modification on : Monday, May 9, 2016 - 5:58:10 PM
Long-term archiving on: : Sunday, November 13, 2016 - 10:07:31 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Pooya Mehregan, Philip L. Fong. Design Patterns for Multiple Stakeholders in Social Computing. 28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.163-178, ⟨10.1007/978-3-662-43936-4_11⟩. ⟨hal-01284852⟩



Record views


Files downloads