Aiello et al., 2012 - Google Patents
LotusNet: Tunable privacy for distributed online social network servicesAiello et al., 2012
View PDF- Document ID
- 7128335327415848148
- Author
- Aiello L
- Ruffo G
- Publication year
- Publication venue
- Computer Communications
External Links
Snippet
The evolution of the role of online social networks in the Web has led to a collision between private, public and commercial spheres that have been inevitably connected together in social networking services since their beginning. The growing awareness on the opaque …
- 238000011161 development 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
- H04L67/2823—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/16—Service discovery or service management, e.g. service location protocol [SLP] or Web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/12—Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
- H04L12/1895—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast for short real-time information, e.g. alarms, notifications, alerts, updates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Aiello et al. | LotusNet: Tunable privacy for distributed online social network services | |
| Masinde et al. | Peer-to-peer-based social networks: A comprehensive survey | |
| Paul et al. | A survey on decentralized online social networks | |
| Carminati et al. | Security and trust in online social networks | |
| Cutillo et al. | Safebook: A privacy-preserving online social network leveraging on real-life trust | |
| Cutillo et al. | Privacy preserving social networking through decentralization | |
| Nilizadeh et al. | Cachet: a decentralized architecture for privacy preserving social networking with caching | |
| Jahid et al. | DECENT: A decentralized architecture for enforcing privacy in online social networks | |
| Oukemeni et al. | Privacy analysis on microblogging online social networks: a survey | |
| Clarke et al. | Private communication through a network of trusted connections: The dark freenet | |
| Taheri-Boshrooyeh et al. | Security and privacy of distributed online social networks | |
| Kumar et al. | Online social network security: A comparative review using machine learning and deep learning | |
| Cutillo et al. | Security and privacy in online social networks | |
| De Salve et al. | A logical key hierarchy based approach to preserve content privacy in decentralized online social networks | |
| Verma et al. | Privacy and security: Online social networking | |
| Beye et al. | Literature overview-privacy in online social networks | |
| Guo et al. | A privacy-preserving framework with self-governance and permission delegation in online social networks | |
| Dobre et al. | Pervasive Computing: Next Generation Platforms for Intelligent Data Collection | |
| Jeong et al. | Navigating decentralized online social networks: An overview of technical and societal challenges in architectural choices | |
| Nunez-Gomez et al. | HyperNet: A conditional k-anonymous and censorship resistant decentralized hypermedia architecture | |
| Ajami et al. | Security challenges and approaches in online social networks: A survey | |
| Freitas | Twister: the development of a peer-to-peer microblogging platform | |
| Paul et al. | Exploring decentralization dimensions of social networking services: adversaries and availability | |
| Shelke et al. | Social networking: its uses and abuses | |
| Abeer et al. | Security issues in social networking sites |