{"id":"https://openalex.org/W1987202372","doi":"https://doi.org/10.1145/2613087.2613097","title":"Game theoretic analysis of multiparty access control in online social networks","display_name":"Game theoretic analysis of multiparty access control in online social networks","publication_year":2014,"publication_date":"2014-06-25","ids":{"openalex":"https://openalex.org/W1987202372","doi":"https://doi.org/10.1145/2613087.2613097","mag":"1987202372"},"language":"en","primary_location":{"id":"doi:10.1145/2613087.2613097","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2613087.2613097","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056657952","display_name":"Hongxin Hu","orcid":"https://orcid.org/0000-0001-8710-247X"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hongxin Hu","raw_affiliation_strings":["Clemson University, Clemson, SC, USA","Clemson University, Clemson, SC, USA,"],"affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, SC, USA","institution_ids":["https://openalex.org/I8078737"]},{"raw_affiliation_string":"Clemson University, Clemson, SC, USA,","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025770693","display_name":"Gail\u2010Joon Ahn","orcid":"https://orcid.org/0000-0002-4271-1666"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gail-Joon Ahn","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA","Arizona State University , Tempe , AZ , USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Arizona State University , Tempe , AZ , USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073603754","display_name":"Ziming Zhao","orcid":"https://orcid.org/0000-0002-4930-5556"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ziming Zhao","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA","Arizona State University , Tempe , AZ , USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Arizona State University , Tempe , AZ , USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048130147","display_name":"Dejun Yang","orcid":"https://orcid.org/0000-0002-1811-4423"},"institutions":[{"id":"https://openalex.org/I167576493","display_name":"Colorado School of Mines","ror":"https://ror.org/04raf6v53","country_code":"US","type":"education","lineage":["https://openalex.org/I167576493"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dejun Yang","raw_affiliation_strings":["Colorado School of Mines, Golden, CO, USA","Colorado School of Mines, Golden, CO, USA,"],"affiliations":[{"raw_affiliation_string":"Colorado School of Mines, Golden, CO, USA","institution_ids":["https://openalex.org/I167576493"]},{"raw_affiliation_string":"Colorado School of Mines, Golden, CO, USA,","institution_ids":["https://openalex.org/I167576493"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5056657952"],"corresponding_institution_ids":["https://openalex.org/I8078737"],"apc_list":null,"apc_paid":null,"fwci":8.4571,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.97580528,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"93","last_page":"102"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.824813723564148},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.7308849096298218},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6305627226829529},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6304485201835632},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.5677051544189453},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.53853839635849},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.530392587184906},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4601254463195801},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4385160803794861},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.433779776096344},{"id":"https://openalex.org/keywords/potential-game","display_name":"Potential game","score":0.4136781692504883},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32313060760498047},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.13322636485099792},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13225340843200684},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.09298884868621826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.824813723564148},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.7308849096298218},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6305627226829529},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6304485201835632},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.5677051544189453},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.53853839635849},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.530392587184906},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4601254463195801},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4385160803794861},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.433779776096344},{"id":"https://openalex.org/C2778079155","wikidata":"https://www.wikidata.org/wiki/Q288500","display_name":"Potential game","level":3,"score":0.4136781692504883},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32313060760498047},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.13322636485099792},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13225340843200684},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.09298884868621826},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2613087.2613097","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2613087.2613097","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.682.9014","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.682.9014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://sefcom.asu.edu/publications/game-theoretic-analysis-sacmat2014.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.699.9969","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.699.9969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://people.cs.clemson.edu/%7Ehongxih/papers/SACMAT2014.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4300000071525574}],"awards":[{"id":"https://openalex.org/G1588190820","display_name":null,"funder_award_id":"NSF-IIS-0900970","funder_id":"https://openalex.org/F4320337389","funder_display_name":"Division of Information and Intelligent Systems"},{"id":"https://openalex.org/G8242066899","display_name":null,"funder_award_id":"NSF-CNS-0831360","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320337389","display_name":"Division of Information and Intelligent Systems","ror":"https://ror.org/053a2cp42"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1537585243","https://openalex.org/W1555093693","https://openalex.org/W1587574739","https://openalex.org/W1592657892","https://openalex.org/W1600742525","https://openalex.org/W1602027763","https://openalex.org/W1713503745","https://openalex.org/W1973313214","https://openalex.org/W2020250474","https://openalex.org/W2030419219","https://openalex.org/W2036467405","https://openalex.org/W2063703813","https://openalex.org/W2067064328","https://openalex.org/W2073743819","https://openalex.org/W2104730303","https://openalex.org/W2107855415","https://openalex.org/W2108710747","https://openalex.org/W2110522107","https://openalex.org/W2113533904","https://openalex.org/W2120100612","https://openalex.org/W2121863839","https://openalex.org/W2125470616","https://openalex.org/W2127218554","https://openalex.org/W2137685284","https://openalex.org/W2143535483","https://openalex.org/W2148673350","https://openalex.org/W2158074827","https://openalex.org/W2284401123","https://openalex.org/W2545624159","https://openalex.org/W2963934831","https://openalex.org/W4241226388","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4210759752","https://openalex.org/W2528338391","https://openalex.org/W2567986414","https://openalex.org/W2103989257","https://openalex.org/W2953849958","https://openalex.org/W2185830305","https://openalex.org/W3119014777","https://openalex.org/W3123744589","https://openalex.org/W3131767876","https://openalex.org/W4214835929"],"abstract_inverted_index":{"Existing":[0],"online":[1],"social":[2],"networks":[3],"(OSNs)":[4],"only":[5,177],"allow":[6],"a":[7,53,63,128,178],"single":[8],"user":[9,205],"to":[10,13,21,40,66,85,106,153,162,173,212],"restrict":[11],"access":[12,100],"her/his":[14,108,113,155],"data":[15,26,74,118],"but":[16],"cannot":[17],"provide":[18],"any":[19,151],"mechanism":[20],"enforce":[22],"privacy":[23,34,70,114,156],"concerns":[24],"over":[25],"associated":[27],"with":[28],"multiple":[29],"users.":[30],"This":[31],"situation":[32],"leaves":[33],"conflicts":[35,71],"largely":[36],"unresolved":[37],"and":[38,68,132,166,220],"leads":[39],"the":[41,88,92,134,164,169,174,192,197,208,214],"potential":[42],"disclosure":[43],"of":[44,90,95,136,194,207],"users'":[45],"sensitive":[46],"information.":[47],"To":[48],"address":[49],"such":[50],"an":[51,146],"issue,":[52],"MultiParty":[54],"Access":[55],"Control":[56],"(MPAC)":[57],"model":[58],"was":[59],"recently":[60],"proposed,":[61],"including":[62],"systematic":[64],"approach":[65],"identify":[67],"resolve":[69],"for":[72,187],"collaborative":[73,117],"sharing":[75,119],"in":[76,98,116,120,176,196],"OSNs.":[77,121],"In":[78,201],"this":[79,125],"paper,":[80],"we":[81,203],"take":[82],"another":[83],"step":[84],"further":[86],"study":[87],"problem":[89,126],"analyzing":[91],"strategic":[93],"behavior":[94],"rational":[96],"controllers":[97,195],"multiparty":[99,129,198,209],"control,":[101],"where":[102],"each":[103],"controller":[104,149],"aims":[105],"maximize":[107],"own":[109],"benefit":[110],"by":[111],"adjusting":[112],"setting":[115],"We":[122,158],"first":[123],"formulate":[124],"as":[127],"control":[130,199,210],"game":[131,211,217],"show":[133],"existence":[135],"unique":[137],"Nash":[138],"Equilibrium":[139],"(NE)":[140],"which":[141],"is":[142,184],"critical":[143],"because":[144],"at":[145],"NE,":[147],"no":[148],"has":[150],"incentive":[152],"change":[154],"setting.":[157],"then":[159],"present":[160],"algorithms":[161],"compute":[163],"NE":[165,175],"prove":[167],"that":[168,190],"system":[170],"can":[171],"converge":[172],"few":[179],"iterations.":[180],"A":[181],"numerical":[182],"analysis":[183],"also":[185],"provided":[186],"different":[188],"scenarios":[189],"illustrate":[191],"interplay":[193],"game.":[200],"addition,":[202],"conduct":[204],"studies":[206],"explore":[213],"gap":[215],"between":[216],"theoretic":[218],"approaches":[219],"real":[221],"human":[222],"behaviors.":[223]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
