Paper Abstract and Keywords |
Presentation |
2008-03-07 08:15
Social Networking Architecture
-- Network Construction, Operation, and Utilization based on Human Trust Chain -- Katsunori Yamaoka, Akira Sasaki, Kenta Yasukawa, Takamichi Miyata, Yoshinori Sakai (Tokyo Tech.) IN2007-190 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Current service authorization systems have mostly assumed administrators are divided from ordinal users and the
all the responsibility and cost for managing services are concentrated on the administrators. Moreover, as the number of users
gets larger, the human relation between administrators and users get more scarce and users tend to behave more selfish and maliciously.
In this paper, we propose a new architecture named Social Networking Architecture (SNA) in which users authorize
each other when using services. In the SNA, a user who is authorized to use a service is able to be an inviter for the service.
An inviter is allowed to invite his or her trusted people based on his or her own responsibility and share the resources and
permissions that he or she has on the service with invitees. An invitee is also allowed to be an inviter and able to invite his or
her trusted people. Since each invitation is done with the human trust between two people, a network based on the human trust
chain is constructed for each service. Because of the properties, under the SNA, the management cost and risk for malicious
users due to the increase of number of users does not overwhelm administrators, and therefore, it is possible to construct a
scalable service network. Furthermore, since an invitation is performed based on the human relationship in the actual society,
invitees are discouraged to behave selfish and cause their inviters trouble. Because of this feature, it is expected that the SNA
automatically makes a secure service network. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Human trust chain / Authorization / Security / Scalability / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 107, no. 525, IN2007-190, pp. 187-192, March 2008. |
Paper # |
IN2007-190 |
Date of Issue |
2008-02-28 (IN) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IN2007-190 |
Conference Information |
Committee |
NS IN |
Conference Date |
2008-03-06 - 2008-03-07 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Bankoku Shinryokan |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
General issues |
Paper Information |
Registration To |
IN |
Conference Code |
2008-03-NS-IN |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Social Networking Architecture |
Sub Title (in English) |
Network Construction, Operation, and Utilization based on Human Trust Chain |
Keyword(1) |
Human trust chain |
Keyword(2) |
Authorization |
Keyword(3) |
Security |
Keyword(4) |
Scalability |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Katsunori Yamaoka |
1st Author's Affiliation |
Tokyo Institute of Technology (Tokyo Tech.) |
2nd Author's Name |
Akira Sasaki |
2nd Author's Affiliation |
Tokyo Institute of Technology (Tokyo Tech.) |
3rd Author's Name |
Kenta Yasukawa |
3rd Author's Affiliation |
Tokyo Institute of Technology (Tokyo Tech.) |
4th Author's Name |
Takamichi Miyata |
4th Author's Affiliation |
Tokyo Institute of Technology (Tokyo Tech.) |
5th Author's Name |
Yoshinori Sakai |
5th Author's Affiliation |
Tokyo Institute of Technology (Tokyo Tech.) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2008-03-07 08:15:00 |
Presentation Time |
20 minutes |
Registration for |
IN |
Paper # |
IN2007-190 |
Volume (vol) |
vol.107 |
Number (no) |
no.525 |
Page |
pp.187-192 |
#Pages |
6 |
Date of Issue |
2008-02-28 (IN) |
|