ABSTRACT

As we stated in Chapter 1, secure social media integrates social media technologies with security technologies. We discussed social media systems in Chapter 2 of this book. In this chapter, we will discuss security technologies. In particular, since much of the discussion in this book is on social data analytics and security, we will provide a fairly comprehensive overview of access control in data management systems. In particular, we will discuss security policies and enforcing the policies in database systems. Our focus will be on discretionary security policies. We will also discuss data privacy aspects. More details of secure data management can be found in Ferrari and Thuraisingham (2000) and Thuraisingham (2005a).