Privacy policy inference of multiple user-uploaded images on social context websites (Automated generation of privacy policy)

Social networking websites are the most active websites on the Internet and millions of people use them every day to engage and connect with other people. Twitter, Facebook, LinkedIn and Google Plus seems to be the most popular Social networking websites on the Internet. In this manner, recommendation policy is required which supply client with an adaptable help for organizing security settings in much easier way. Images are shared extensively now days on social sharing sites. Sharing takes place between friends and acquaintances on a daily basis. In this thesis, we are implementing an Adaptive Privacy Policy Prediction (A3P) system which will provide users a disturbance free privacy settings experience by automatically generating personalized policies.

[1]  Ranjita Bhagwan,et al.  Baaz: A System for Detecting Access Control Misconfigurations , 2010, USENIX Security Symposium.

[2]  Trent Jaeger,et al.  Policy management using access control spaces , 2003, TSEC.

[3]  Anabel Quan-Haase,et al.  Information revelation and internet privacy concerns on social network sites: a case study of facebook , 2009, C&T.

[4]  Lujo Bauer,et al.  Detecting and resolving policy misconfigurations in access-control systems , 2011, TSEC.

[5]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .

[6]  Heather Richter Lipford,et al.  Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.

[7]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[8]  Gail-Joon Ahn,et al.  Detecting and resolving privacy conflicts for collaborative data sharing in online social networks , 2011, ACSAC '11.

[9]  O. Günther,et al.  Privacy concerns and identity in online social networks , 2009 .

[10]  Steven M. Bellovin,et al.  Facebook and privacy: it's complicated , 2012, SOUPS.

[11]  Karin Strauss,et al.  Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications , 2012, SOUPS.

[12]  Krishna P. Gummadi,et al.  Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.

[13]  Jessica Staddon,et al.  Are privacy concerns a turn-off?: engagement and privacy in social networks , 2012, SOUPS.

[14]  Blase Ur,et al.  Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.