Karuppanan, 2012 - Google Patents
Security, privacy, and trust in social networksKaruppanan, 2012
- Document ID
- 15650745486638559451
- Author
- Karuppanan K
- Publication year
- Publication venue
- Computational Social Networks: Security and Privacy
External Links
Snippet
Millions of people worldwide are connected through networked digital infrastructure that grows increasingly sophisticated and contextually rich. A social network service is an online service, platform, or site that focuses on building and reflecting of social relations among …
- 238000000034 method 0 abstract description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements or network protocols for addressing or naming
- H04L61/30—Arrangements for managing names, e.g. use of aliases or nicknames
- H04L61/306—Name types
- H04L61/307—E-mail addresses
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sahoo et al. | Classification of various attacks and their defence mechanism in online social networks: a survey | |
Rahman et al. | Blockchain-based access control management for decentralized online social networks | |
Zhang et al. | Privacy and security for online social networks: challenges and opportunities | |
Oukemeni et al. | Privacy analysis on microblogging online social networks: a survey | |
Kumar et al. | Online social network security: A comparative review using machine learning and deep learning | |
Chen et al. | Privacy issues and solutions in social network sites | |
Ajami et al. | Security challenges and approaches in online social networks: A survey | |
Cutillo et al. | Security and privacy in online social networks | |
Bani Yassein et al. | Hybrid real-time protection system for online social networks | |
Faynberg et al. | On dynamic access control in Web 2.0 and beyond: Trends and technologies | |
Mannan et al. | Privacy-enhanced sharing of personal content on the web | |
Azeez et al. | Grid security loopholes with proposed countermeasures | |
Rewaria | Data privacy in social media platform: Issues and challenges | |
Agarwal et al. | Security and Privacy in Social Network | |
Sharma et al. | Security analysis on social media networks via STRIDE model | |
Luntovskyy et al. | Security in distributed systems | |
Anderson | Privacy engineering for social networks | |
Karuppanan | Security, privacy, and trust in social networks | |
Jacobino et al. | TrustVault: A privacy-first data wallet for the European Blockchain Services Infrastructure | |
Drăgan et al. | Bootstrapping online trust: Timeline activity proofs | |
Pallivalappil et al. | Social Engineering Attacks on Facebook–A Case Study | |
Ali et al. | Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence | |
Teerakanok et al. | A privacy-preserving framework for location-based service: a review of structural design and analysis | |
Bolgouras et al. | Enabling qualified anonymity for enhanced user privacy in the digital era | |
Hussien | Public Attitudes Towards Data Privacy on Social Networking Sites Towards Individuals and Organizations: A Review |