Carminati et al., 2012 - Google Patents
Trust and share: Trusted information sharing in online social networksCarminati et al., 2012
- Document ID
- 6061944324602126821
- Author
- Carminati B
- Ferrari E
- Girardi J
- Publication year
- Publication venue
- 2012 IEEE 28th international conference on data engineering
External Links
Snippet
At the beginning of Web 2.0 era, Online Social Networks (OSNs) appeared as just another phenomenon among wikis, blogs, video sharing, and so on. However, they soon became one of the biggest revolution of the Internet era. Statistics confirm the continuing rise in the …
- 238000004422 calculation algorithm 0 description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30699—Filtering based on additional data, e.g. user or group profiles
- G06F17/30702—Profile generation, learning or modification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
- H04L67/306—User profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3061638C (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
US10572684B2 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
US10043035B2 (en) | Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments | |
US10467387B2 (en) | Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content | |
Seong et al. | Prpl: a decentralized social networking infrastructure | |
EP3063691A2 (en) | Dynamic de-identification and anonymity | |
WO2015066523A2 (en) | Dynamic de-identification and anonymity | |
Beye et al. | Privacy in online social networks | |
WO2012083278A2 (en) | Aggregated profile and online concierge | |
Ajami et al. | Security challenges and approaches in online social networks: A survey | |
Carminati et al. | Trust and share: Trusted information sharing in online social networks | |
US20170103083A1 (en) | System and method for searching distributed files across a plurality of clients | |
Carminati et al. | Access control and privacy in web‐based social networks | |
Kirkham et al. | The personal data store approach to personal data security | |
US11418500B2 (en) | User authentication based on cognitive profiling | |
KR101086452B1 (en) | Identity Management System with Class Privacy Policy and Method | |
Elliot et al. | Dictionary of privacy, data protection and information security | |
US11983284B2 (en) | Consent management methods | |
Islam et al. | Privacy architectures in social networks' state-of-the-art survey | |
CN105320728A (en) | Aggregation of separate domain data | |
Elmisery et al. | Privacy aware group based recommender system in multimedia services | |
EP3893177A1 (en) | Cross-service rulebook management in a dynamic and adversarial environment | |
Islam | Privacy by design for social networks | |
Li | Context-aware attribute-based techniques for data security and access control in mobile cloud environment | |
Ben Ayed | Digital Identity Management |