1 / 13

Tools and Terms for Annotation-Based Access Control

Tools and Terms for Annotation-Based Access Control. Peyman Nasirifard 16/07/2008 DERI Conference Room. Expectation. PLEASE BE AS TOUGH AS YOU CAN! I NEED YOUR CRITICISM. Do you know me?. Who Am I? I don‘t know! Tag me! Who is my supervisor? supervisor wearGlasses wearJeans

arama
Download Presentation

Tools and Terms for Annotation-Based Access Control

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Tools and Terms for Annotation-Based Access Control Peyman Nasirifard 16/07/2008 DERI Conference Room

  2. Expectation • PLEASE BE AS TOUGH AS YOU CAN! • I NEED YOUR CRITICISM.

  3. Do you know me? • Who Am I? • I don‘t know! Tag me! • Who is my supervisor? • supervisor • wearGlasses • wearJeans • wearRedTShirt • Cool • Smiling • Who do I know? • The people tagged as „Participants“

  4. Outline • Hello and Welcome • Some slides • Some demos • Questions • Annotate your friends • Lottery • Have a nice day!

  5. Current Access Control • Sharing data/resources: • Shared Workspaces (BSCW,NetWeaver, SharePoint, etc.) • Social Networking Sites (Flickr, YouTube, del.icio.us, etc.) • Sharing needs access control • Current approaches: • Access control lists (email contacts) • Role-based access control (root, admin, user) • Social-based access control (friend, knows)

  6. Problems with Current Access Control • Problems with current approaches: • Coarse-grained: • Private vs. Public, share with ‘friends‘ • Fixed vocabulary, no flexibility • Too complex? • Result of current approaches: • Messaging, email • To move from messaging to sharing: • Social-awareness based access-control

  7. Real-Life Access control • We share resources based on social relationships we attribute to people • We may share our credit card details with our parents, but not with out friends. • We mentally annotate people, meaning of term may differ between people • parent, supervisor, friend, close friend, director, etc. • Real life model can be applied to online model • Annotation-Based Access Control • more natural and flexible

  8. Annotation-Based Access Control Model

  9. Demo Demos

  10. Object-centric to user-centric

  11. Future Work • Extend the model to include context-aware information, as opposed to user-defined. • Using the Open Social API, embed the uncle-share widget into social networking sites, such as MySpace or Xing. • Integrate Uncle-Share with social bookmarking systems, such as del.icio.us

  12. Annotate your friends • Name 5 of your firends and annotate them with 3 desired annotations • Do not use bald, fatso, ugly, beautiful, etc. • Use Collaboration-based term: researchWith, wirtePaperWith, etc. • Do you find it difficult or easy?

  13. Have a nice day! Thanks for your time and attention!

More Related