Filters








5,014 Hits in 8.6 sec

Content Privacy Enforcement Models in Decentralized Online Social Networks: State of Play, Solutions, Limitations, and Future Directions [article]

Andrea De Salve, Paolo Mori, Laura Ricci, Roberto Di Pietro
2022 arXiv   pre-print
Further, we also highlight the limitations of current approaches and show future research directions.  ...  In recent years, Decentralized Online Social Networks (DOSNs) have been attracting the attention of many users because they reduce the risk of censorship, surveillance, and information leakage from the  ...  The findings are solely responsibility of the authors.  ... 
arXiv:2206.03084v1 fatcat:zuglnjrfrjaxxfz5dm7gap7lo4

Privacy in Online Social Networks [chapter]

Michael Beye, Arjan J. P. Jeckmans, Zekeriya Erkin, Pieter Hartel, Reginald L. Lagendijk, Qiang Tang
2012 Computational Social Networks  
Online Social Networks (OSNs) have become part of daily life for millions of users.  ...  Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit.  ...  Acknowledgments The research for this work was carried out within the Kindred Spirits project, part of the STW Sentinels research program.  ... 
doi:10.1007/978-1-4471-4051-1_4 fatcat:nwtbgytkj5duzjcplnqhfcldke

Mobile social networking middleware: A survey

Paolo Bellavista, Rebecca Montanari, Sajal K. Das
2013 Pervasive and Mobile Computing  
The convergence of social networking and mobile computing is expected to generate a new class of applications, called Mobile Social Networking (MSN) applications, that will be of significant importance  ...  Indeed, MSN enhances the capabilities of more traditional Online Social Networking (OSN) to a great extent by enabling mobile users to benefit from opportunistically created social communities; these communities  ...  A key feature of MobiSoc is also its simple solution for privacy management and enforcement.  ... 
doi:10.1016/j.pmcj.2013.03.001 fatcat:pvtkbe5unvgjrcupo6inxq4qqe

Privacy in Online Social Networks [chapter]

Elie Raad, Richard Chbeir
2013 Lecture Notes in Social Networks  
The chapter concludes with a discussion of some open challenges to address in future privacy-related works. What is a Social Network?  ...  Just like relationships, ties also vary in terms of their content, direction, and strength.  ...  Concerned about privacy implications, social network users are increasingly interested in solutions that enforce individual privacy and protect sensitive information.  ... 
doi:10.1007/978-3-7091-0894-9_1 dblp:series/lnsn/RaadC13 fatcat:pxzg2pz5onfppljbhfzs6cg76e

Peer-to-Peer based Social Networks: A Comprehensive Survey [article]

Newton Masinde, Kalman Graffi
2020 arXiv   pre-print
As a third point, it gives an overview of proposed P2P-based online social network applications, frameworks and architectures.  ...  In specific, it explores the technical details, inter-dependencies and maturity of the available solutions.  ...  of online social networks.  ... 
arXiv:2001.02611v2 fatcat:nrvp45dy3rbnhmajtvqiect3ty

Trust-Involved Access Control in Collaborative Open Social Networks

Hua Wang, Lili Sun
2010 2010 Fourth International Conference on Network and System Security  
Finally a discussion of our work in comparison with other access control and frameworks such as EPAL is discussed.  ...  The key component of the framework is an access control model that provides full support for expressing highly complex privacyrelated policies, taking into account features like purposes and obligations  ...  There could exist conflicting access policies within TAC in social network, and how to develop algorithms to find and fix the conflicts and their applications are possible avenues for our future work.  ... 
doi:10.1109/nss.2010.13 dblp:conf/nss/WangS10 fatcat:w7cdonljjvbbpaokhjn5dbmasy

Peer-to-Peer-Based Social Networks: A Comprehensive Survey

Newton Masinde, Kalman Graffi
2020 SN Computer Science  
The use of online social networks, such as Facebook and Twitter, has grown at a phenomenal rate.  ...  The goals of this survey are threefold. First, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms.  ...  of online social networks.  ... 
doi:10.1007/s42979-020-00315-8 fatcat:iwktgohkjbdalmalaj5h3lulri

Distributing privacy policies over multimedia content across multiple online social networks

Constantinos Patsakis, Athanasios Zigomitros, Achilleas Papageorgiou, Edgar Galván-López
2014 Computer Networks  
Online Social Networks (OSNs) are currently playing a crucial role in our everyday social life.  ...  The novelty of the proposed scheme is the ability to enforce a user's privacy policies across multiple online social networks, even if she is not subscribed to all of them, without using a trusted third  ...  a b s t r a c t Online Social Networks (OSNs) are currently playing a crucial role in our everyday social life.  ... 
doi:10.1016/j.comnet.2014.08.023 fatcat:sobzigqj3vaxblr4vuacmaavhi

Fictions and frictions: Promises, transaction costs and the innovation of network technologies

Udo Pesch, Georgy Ishmaev
2019 Social Studies of Science  
However, the actual promise of the elimination of transaction costs seems unfeasible, because of a cyclical pattern in which network technologies that make that promise create processes of institutionalization  ...  New network technologies are framed as eliminating 'transaction costs', a notion first developed in economic theory that now drives the design of market systems.  ...  Acknowledgements We like to express our gratitude to the useful observations of the anonymous reviewer and to Sergio Sismondo's editorial advice and guidance in the review process.  ... 
doi:10.1177/0306312719838339 pmid:30880597 pmcid:PMC6902903 fatcat:5m7opu6lefb4xpqrw6gayfihmu

Privacy Law's Precautionary Principle Problem

Adam D. Thierer
2014 Social Science Research Network  
These two realities are the byproduct of the Internet's decentralized, distributed nature; the unprecedented scale of modern networked communications; the combination of dramatic expansions in computing  ...  In this regard, policymakers can draw important lessons from the debate over how best to protect children from objectionable online content.  ...  ., ENHANCING CHILD SAFETY & ONLINE TECHNOLOGIES: FINAL REPORT OF THE INTERNET SAFETY TECHNICAL TASK FORCE TO THE MULTI-STATE WORKING GROUP ON SOCIAL NETWORKING OF STATE ATTORNEYS GENERAL OF THE UNITED  ... 
doi:10.2139/ssrn.2449308 fatcat:u3emvsbhabewrib4i2jklaxfli

Discouraging Abusive Behavior in Privacy-Preserving Online Social Networking Applications

Álvaro García-Recuero
2016 Proceedings of the 25th International Conference Companion on World Wide Web - WWW '16 Companion  
We expect that privacy will play a bigger role in the design of future decentralized OSNs, and thus abuse detection methods should also be designed to respect privacy requirements.  ...  Let G f =(V f , E f ) be a directed graph of social relationships, with a set of vertices V f which are follower users (those who follow or subscribe to other user's posts), and a set of directed edges  ... 
doi:10.1145/2872518.2888600 dblp:conf/www/Garcia-Recuero16 fatcat:isohjj3xafhf3erypgcmmmz6cq

A Face Tells More than a Thousand Posts: Developing Face Recognition Privacy in Social Networks

Yana Welinder
2012 Social Science Research Network  
their online social lives. 8 To this end, the architectural and market solutions of my proposal are aimed at lowering the cost of switching between social networks to free users from the network effect  ...  these social norms and technical and market solutions would complement the legal solution, the law could still play an important role in mandating adjustments to all four constraints. 256 A.  ...  Privacy in Public So far, I have outlined how social networks could be designed to allow users to opt out of data collection without foregoing their online social interaction.  ... 
doi:10.2139/ssrn.2109108 fatcat:qnpsgpsvprfy7eacjlztw52ipi

Collective privacy management in social networks

Anna Cinzia Squicciarini, Mohamed Shehab, Federica Paci
2009 Proceedings of the 18th international conference on World wide web - WWW '09  
In this paper, we model the problem of collaborative enforcement of privacy policies on shared data by using game theory.  ...  Social networks enable a form of self expression for users, and help them to socialize and share content with other users.  ...  We would like to thank Marco Rossi for his useful advices on the Clarke-Tax algorithm and Shitij Kulshreshtha for his help with the development of the private box application.  ... 
doi:10.1145/1526709.1526780 dblp:conf/www/SquicciariniSP09 fatcat:tiq5s6nfbzbepkq7iohu2a6pya

Some Simple Economics of the Blockchain

Christian Catalini, Joshua S. Gans
2016 Social Science Research Network  
contribution of the resources needed to operate, scale, and secure a decentralized network.  ...  The cost of verification relates to the ability to cheaply verify state, including information about past transactions and their attributes, and current ownership in a native digital asset.  ...  Solutions like the Lightning Network From a standards perspective, whereas there are advantages to being able to rely on a single blockchain because of economies of scale in security and direct and indirect  ... 
doi:10.2139/ssrn.2874598 fatcat:3ab7mhd5bnfapjbitzqkey6fj4

Privacy Preserving Reputation Management in Social Networks [chapter]

Omar Hasan, Lionel Brunie
2013 Lecture Notes in Social Networks  
In this chapter, we describe privacy preserving reputation management in social networks and the associated challenges.  ...  In particular we will look at privacy preserving reputation management in decentralized social networks, where there is no central authority or trusted third parties, thus making the task of preserving  ...  Social Networks and Relationships We take a look at the key social concepts of social networks and social relationships.  ... 
doi:10.1007/978-3-7091-0894-9_8 dblp:series/lnsn/HasanB13 fatcat:dyeswkwtmvfurgsefr7y64lgga
« Previous Showing results 1 — 15 out of 5,014 results