modeling social networking privacy
play

Modeling Social Networking Privacy Carolina Dania IMDEA Software - PowerPoint PPT Presentation

Modeling Social Networking Privacy Carolina Dania IMDEA Software Institute - Spain Universidad Complutense de Madrid (Partially funded by NeSSOS) Supervisors Manuel Clavel Marina Egea IMDEA Software Institute Atos Research & Innovation


  1. Outline • Social Networks - Facebook - Privacy - Example • Research project - Goals - Requirements • Preliminary results • Research plan Tuesday, February 21, 12

  2. Goals Tuesday, February 21, 12

  3. Goals • develop a methodology for modeling and analyzing social networking privacy policies Tuesday, February 21, 12

  4. Goals • develop a methodology for modeling and analyzing social networking privacy policies - modeling means for us to use formal model with rigorous semantics Tuesday, February 21, 12

  5. Goals • develop a methodology for modeling and analyzing social networking privacy policies - modeling means for us to use formal model with rigorous semantics - analyzing means for us to use formal methods (as automated as possible) Tuesday, February 21, 12

  6. Goals • develop a methodology for modeling and analyzing social networking privacy policies - modeling means for us to use formal model with rigorous semantics - analyzing means for us to use formal methods (as automated as possible) • validate this methodology with a case study: modeling and analyzing Facebook’s privacy policy Tuesday, February 21, 12

  7. Requirements Tuesday, February 21, 12

  8. Requirements • [modeling] it is crucial to use a language able to formalize fine-grained access control policies (dynamic access control) Tuesday, February 21, 12

  9. Requirements • [modeling] it is crucial to use a language able to formalize fine-grained access control policies (dynamic access control) E.g. Can Peter see a photo in Alice’s wall if Peter is a friend of Alice? Tuesday, February 21, 12

  10. Requirements • [modeling] it is crucial to use a language able to formalize fine-grained access control policies (dynamic access control) E.g. Can Peter see a photo in Alice’s wall if Peter is a friend of Alice? simple RBAC is not sufficient Tuesday, February 21, 12

  11. Requirements • [modeling] it is crucial to use a language able to formalize fine-grained access control policies (dynamic access control) E.g. Can Peter see a photo in Alice’s wall if Peter is a friend of Alice? simple RBAC is not sufficient • [analyzing] it is crucial to use a language with a formal semantics Tuesday, February 21, 12

  12. Requirements • [modeling] it is crucial to use a language able to formalize fine-grained access control policies (dynamic access control) E.g. Can Peter see a photo in Alice’s wall if Peter is a friend of Alice? simple RBAC is not sufficient • [analyzing] it is crucial to use a language with a formal semantics E.g. XACML currently lacks of a formal semantics Tuesday, February 21, 12

  13. SecureUML Tuesday, February 21, 12

  14. SecureUML • formal language for modeling fine-grained access control policies, both static and dynamic Tuesday, February 21, 12

  15. SecureUML • formal language for modeling fine-grained access control policies, both static and dynamic - dynamic access control policies depend on the run-time satisfaction of authorization constraints Tuesday, February 21, 12

  16. OCL Tuesday, February 21, 12

  17. OCL • a strongly typed declarative language Tuesday, February 21, 12

  18. OCL • a strongly typed declarative language • using OCL you can: Tuesday, February 21, 12

  19. OCL • a strongly typed declarative language • using OCL you can: - refer to any, some, or all the elements in a scenario Tuesday, February 21, 12

  20. OCL • a strongly typed declarative language • using OCL you can: - refer to any, some, or all the elements in a scenario - refer to the value of any properties of any element in a scenario Tuesday, February 21, 12

  21. OCL • a strongly typed declarative language • using OCL you can: - refer to any, some, or all the elements in a scenario - refer to the value of any properties of any element in a scenario - perform standard operations on primitive types, or collections of elements in a scenario Tuesday, February 21, 12

  22. Outline • Social Networks - Facebook - Privacy - Example • Research project - Goals - Requirements • Preliminary results • Research plan Tuesday, February 21, 12

  23. Modeling Facebook (posting and tagging) Tuesday, February 21, 12

  24. Modeling Facebook (posting and tagging) • Facebook’s profile, walls, posts, photos, tags, etc, can be modeled as entities, and privacy settings can be modeled as attributes Tuesday, February 21, 12

  25. Modeling Facebook (posting and tagging) • Facebook’s profile, walls, posts, photos, tags, etc, can be modeled as entities, and privacy settings can be modeled as attributes • Facebook’s privacy clauses are modeled using OCL Tuesday, February 21, 12

  26. Facebook data model Tuesday, February 21, 12

  27. Facebook data model Tuesday, February 21, 12

  28. Facebook (authorization constraints) Tuesday, February 21, 12

  29. Facebook (authorization constraints) Tuesday, February 21, 12

  30. Facebook (authorization constraints) • anybody (@caller) can read any post (@post) that is posted in his/her wall, independently of the creator of the post Tuesday, February 21, 12

  31. Facebook (authorization constraints) • anybody (@caller) can read any post (@post) that is posted in his/her wall, independently of the creator of the post @caller=@post.posted.profile Tuesday, February 21, 12

  32. Facebook (authorization constraints) • anybody (@caller) can read any post (@post) that is posted in his/her wall, independently of the creator of the post @caller=@post.posted.profile • anybody (@caller) can read any post (@post) that is posted in a wall when he/she is a friend of the owner of the wall and the audience selected is “Friends” Tuesday, February 21, 12

  33. Facebook (authorization constraints) • anybody (@caller) can read any post (@post) that is posted in his/her wall, independently of the creator of the post @caller=@post.posted.profile • anybody (@caller) can read any post (@post) that is posted in a wall when he/she is a friend of the owner of the wall and the audience selected is “Friends” @post.posted.profile.friends->includes(@caller) and @post.audience=‘Friends’ Tuesday, February 21, 12

  34. Facebook (authorization constraints) Tuesday, February 21, 12

  35. Facebook (authorization constraints) Tuesday, February 21, 12

  36. Facebook (authorization constraints) • anybody (@caller) can read any post (@post) that is posted in a wall, - when the audience selected is “Friends”, - he/she is a friend of somebody tagged on the post, - he/she is not blocked by the owner of the wall, and - the owner of the post happens to be the creator of the post Tuesday, February 21, 12

  37. Facebook (authorization constraints) • anybody (@caller) can read any post (@post) that is posted in a wall, - when the audience selected is “Friends”, - he/she is a friend of somebody tagged on the post, - he/she is not blocked by the owner of the wall, and - the owner of the post happens to be the creator of the post @post.audience=‘Friends’ and @post.tags.profiling.friends->includes(@caller) and @post.posted.profile.blocks->excludes(@caller) and @post.posted.profile=@post.creator Tuesday, February 21, 12

  38. Outline • Social Networks - Facebook - Privacy • Research project - Goals - Requirements • Preliminary results • Research plan Tuesday, February 21, 12

  39. Research plan Tuesday, February 21, 12

  40. Research plan • we have formalized, using SecureUML +OCL, the Facebook’s privacy policy for tagging and posting Tuesday, February 21, 12

  41. Research plan • we have formalized, using SecureUML +OCL, the Facebook’s privacy policy for tagging and posting - our understanding of this policy is based on the available information and our “experiments”. Tuesday, February 21, 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend