[go: up one dir, main page]

Karuppanan, 2012 - Google Patents

Security, privacy, and trust in social networks

Karuppanan, 2012

Document ID
15650745486638559451
Author
Karuppanan K
Publication year
Publication venue
Computational Social Networks: Security and Privacy

External Links

Snippet

Millions of people worldwide are connected through networked digital infrastructure that grows increasingly sophisticated and contextually rich. A social network service is an online service, platform, or site that focuses on building and reflecting of social relations among …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/30Network-specific arrangements or communication protocols supporting networked applications involving profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/22Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/24Presence management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements or network protocols for addressing or naming
    • H04L61/30Arrangements for managing names, e.g. use of aliases or nicknames
    • H04L61/306Name types
    • H04L61/307E-mail addresses

Similar Documents

Publication Publication Date Title
Sahoo et al. Classification of various attacks and their defence mechanism in online social networks: a survey
Rahman et al. Blockchain-based access control management for decentralized online social networks
Zhang et al. Privacy and security for online social networks: challenges and opportunities
Oukemeni et al. Privacy analysis on microblogging online social networks: a survey
Kumar et al. Online social network security: A comparative review using machine learning and deep learning
Chen et al. Privacy issues and solutions in social network sites
Ajami et al. Security challenges and approaches in online social networks: A survey
Cutillo et al. Security and privacy in online social networks
Bani Yassein et al. Hybrid real-time protection system for online social networks
Faynberg et al. On dynamic access control in Web 2.0 and beyond: Trends and technologies
Mannan et al. Privacy-enhanced sharing of personal content on the web
Azeez et al. Grid security loopholes with proposed countermeasures
Rewaria Data privacy in social media platform: Issues and challenges
Agarwal et al. Security and Privacy in Social Network
Sharma et al. Security analysis on social media networks via STRIDE model
Luntovskyy et al. Security in distributed systems
Anderson Privacy engineering for social networks
Karuppanan Security, privacy, and trust in social networks
Jacobino et al. TrustVault: A privacy-first data wallet for the European Blockchain Services Infrastructure
Drăgan et al. Bootstrapping online trust: Timeline activity proofs
Pallivalappil et al. Social Engineering Attacks on Facebook–A Case Study
Ali et al. Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
Teerakanok et al. A privacy-preserving framework for location-based service: a review of structural design and analysis
Bolgouras et al. Enabling qualified anonymity for enhanced user privacy in the digital era
Hussien Public Attitudes Towards Data Privacy on Social Networking Sites Towards Individuals and Organizations: A Review