Trust-based Information Sharing in Collaborative Communities: Issues and Challenges

  • Barbara Carminati
  • Elena Ferrari


Collaborative communities are today one of the emerging trends in the ICT area. This is mainly due to the widespread adoption of Web 2.0 related technologies, having, as one of their major goal, that of facilitating user collaboration and knowledge sharing. Clearly, the wide adoption of collaborative tools would take place only if users have assurance that their privacy and security requirements are preserved when sharing information. In this paper, we focus on access control and the related privacy issues. We start by revising the state of the art in the field, then we discuss which are the main requirements for a privacy-aware access control mechanism for collaborative communities. Then, we briefly describe some of the results we have achieved in this field.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Ali, B. Villegas, W. Maheswaran, M: A Trust based Approach for Protecting User Data in Social Networks. In: 2007 Conference of the Center for Avanced Studies on Collaborative Research (CAS-CON’07), 288-293, 2007.Google Scholar
  2. Berteau, S: Facebook’s Misrepresentation of Beacon’s Threat to Privacy: Tracking Users who Opt out or are not Logged in. Security Advisor Research Blog. Available at:, 2007.
  3. Canadian Privacy Commission. Social Networking and Privacy. Available at:, 2007.
  4. Carminati, B. Ferrari, E: Privacy-aware Collaborative Access Control in Web-based Social Networks. In: Proc. of the 22nd IFIP WG 11.3 Working Conference on Data and Applications Security (DB-SEC2008). Springer, London, UK, July 2008.Google Scholar
  5. Carminati, B. Ferrari, E. Perego, A: Rule-based Access Control for Social Networks. In: Proc. of the OTM Workshops. Springer, Montpellier, France, November 2006.Google Scholar
  6. Carminati, B. Ferrari, E. Perego, A: Private Relationships in Social Networks. In: Proc. of the ICDE 2007 Workshops. IEEE CS Press, Istanbul, Turkey, April 2007.Google Scholar
  7. B. Carminati, E. Ferrari, A. Perego. Enforcing Access Control in Web-based Social Networks. ACM Transactions on Information and System Security, to appear.Google Scholar
  8. Chen, L: Facebook’s Feeds Cause Privacy Concerns. the Amherst Student. Available at:, October 2006.
  9. Golbeck, J. Hendler, J. A: Inferring Binary Trust Relationships in Web-based Social Networks. In: ACM Trans. Internet Techn. 6(4): 497–529, 2006.CrossRefGoogle Scholar
  10. Hart, M. Johnson, R. Stent, A: More Content - Less Control: Access Control in the Web 2.0. In: Proc. of the Web 2.0 Security and Privacy Workshop, 2007. Available at:
  11. Hogben, G: Security Issues and Recommendations for Online Social Networks. European Network and Information Security Agency (ENISA), position paper, 2007. Available at:
  12. Liu, K. Das, K. Grandison, T. Kargupta, H: Privacy-Preserving Data Analysis on Graphs and Social Networks. Next Generation Data Mining, to appear.Google Scholar
  13. McAfee, A.P: Enterprise 2.0: The Dawn of Emergent Collaboration. In: MIT Sloan Management Review, 47(3):21–28, 2006.Google Scholar
  14. Nin, J. Carminati, B. Ferrari, E. Torra, V: Dynamic Reputation-based Trust Computation in Private Networks. Technical Report, University of Insubria, 2008, submitted for publication.Google Scholar
  15. Staab, S. Domingos, P. Mika, P. Golbeck, J. Ding, L. Finin, T. et al: Social Networks Applied. In: IEEE Intelligent Systems, 20(1): 80–93, 2005.CrossRefGoogle Scholar

Copyright information

© Vieweg+Teubner | GWV Fachverlage GmbH 2009

Authors and Affiliations

  • Barbara Carminati
    • 1
  • Elena Ferrari
    • 1
  1. 1.Department of Computer Science and CommunicationUniversity of InsubriaVareseItaly

Personalised recommendations