[go: up one dir, main page]

Shilbayeh et al., 2014 - Google Patents

Protecting the privacy and trust of VIP users on social network sites

Shilbayeh et al., 2014

View PDF
Document ID
10724112192642197589
Author
Shilbayeh N
Khuffash S
Allymoun M
Al-Saidi R
Publication year
Publication venue
Int. J. Comput. Inf. Eng

External Links

Snippet

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Similar Documents

Publication Publication Date Title
US11914684B2 (en) Secure messaging service with digital rights management using blockchain technology
US7822620B2 (en) Determining website reputations using automatic testing
US9384345B2 (en) Providing alternative web content based on website reputation assessment
US7765481B2 (en) Indicating website reputations during an electronic commerce transaction
US7562304B2 (en) Indicating website reputations during website manipulation of user information
US8438499B2 (en) Indicating website reputations during user interactions
US8566726B2 (en) Indicating website reputations based on website handling of personal information
Weber The digital future–A challenge for privacy?
Xia et al. Privacy in Crowdsourcing: a Review of the Threats and Challenges
Aimeur et al. Towards a privacy-enhanced social networking site
US20140331119A1 (en) Indicating website reputations during user interactions
US20060253582A1 (en) Indicating website reputations within search results
US20060253584A1 (en) Reputation of an entity associated with a content item
Olteanu et al. Consensual and privacy-preserving sharing of multi-subject and interdependent data
Patsakis et al. Privacy and security for multimedia content shared on OSNs: issues and countermeasures
Rewaria Data privacy in social media platform: Issues and challenges
Shilbayeh et al. Protecting the privacy and trust of VIP users on social network sites
Mutula Policy gaps and technological deficiencies in social networking environments: Implications for information sharing
US12143503B2 (en) Verifying ownership using decentralized verification
Allymoun et al. A New Secure Architecture for Trust and Privacy on Social Network Sites
US20240113879A1 (en) Generating ownership tags for decentralized verification
HK40058685A (en) Method and system for verifying the authenticity of content associated with an entity
CN113821733A (en) Method and system for verifying authenticity of content associated with an entity
Martinez-Pelaez et al. By Clicking Submit Button, You will Lose Your Privacy and Control Over Your Personal Information
Anwer et al. Security Issues in Social Media: Challenges and Solutions