A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Content Privacy Enforcement Models in Decentralized Online Social Networks: State of Play, Solutions, Limitations, and Future Directions
[article]
2022
arXiv
pre-print
Further, we also highlight the limitations of current approaches and show future research directions. ...
In recent years, Decentralized Online Social Networks (DOSNs) have been attracting the attention of many users because they reduce the risk of censorship, surveillance, and information leakage from the ...
The findings are solely responsibility of the authors. ...
arXiv:2206.03084v1
fatcat:zuglnjrfrjaxxfz5dm7gap7lo4
Privacy in Online Social Networks
[chapter]
2012
Computational Social Networks
Online Social Networks (OSNs) have become part of daily life for millions of users. ...
Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. ...
Acknowledgments The research for this work was carried out within the Kindred Spirits project, part of the STW Sentinels research program. ...
doi:10.1007/978-1-4471-4051-1_4
fatcat:nwtbgytkj5duzjcplnqhfcldke
Mobile social networking middleware: A survey
2013
Pervasive and Mobile Computing
The convergence of social networking and mobile computing is expected to generate a new class of applications, called Mobile Social Networking (MSN) applications, that will be of significant importance ...
Indeed, MSN enhances the capabilities of more traditional Online Social Networking (OSN) to a great extent by enabling mobile users to benefit from opportunistically created social communities; these communities ...
A key feature of MobiSoc is also its simple solution for privacy management and enforcement. ...
doi:10.1016/j.pmcj.2013.03.001
fatcat:pvtkbe5unvgjrcupo6inxq4qqe
Privacy in Online Social Networks
[chapter]
2013
Lecture Notes in Social Networks
The chapter concludes with a discussion of some open challenges to address in future privacy-related works. What is a Social Network? ...
Just like relationships, ties also vary in terms of their content, direction, and strength. ...
Concerned about privacy implications, social network users are increasingly interested in solutions that enforce individual privacy and protect sensitive information. ...
doi:10.1007/978-3-7091-0894-9_1
dblp:series/lnsn/RaadC13
fatcat:pxzg2pz5onfppljbhfzs6cg76e
Peer-to-Peer based Social Networks: A Comprehensive Survey
[article]
2020
arXiv
pre-print
As a third point, it gives an overview of proposed P2P-based online social network applications, frameworks and architectures. ...
In specific, it explores the technical details, inter-dependencies and maturity of the available solutions. ...
of online social networks. ...
arXiv:2001.02611v2
fatcat:nrvp45dy3rbnhmajtvqiect3ty
Trust-Involved Access Control in Collaborative Open Social Networks
2010
2010 Fourth International Conference on Network and System Security
Finally a discussion of our work in comparison with other access control and frameworks such as EPAL is discussed. ...
The key component of the framework is an access control model that provides full support for expressing highly complex privacyrelated policies, taking into account features like purposes and obligations ...
There could exist conflicting access policies within TAC in social network, and how to develop algorithms to find and fix the conflicts and their applications are possible avenues for our future work. ...
doi:10.1109/nss.2010.13
dblp:conf/nss/WangS10
fatcat:w7cdonljjvbbpaokhjn5dbmasy
Peer-to-Peer-Based Social Networks: A Comprehensive Survey
2020
SN Computer Science
The use of online social networks, such as Facebook and Twitter, has grown at a phenomenal rate. ...
The goals of this survey are threefold. First, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms. ...
of online social networks. ...
doi:10.1007/s42979-020-00315-8
fatcat:iwktgohkjbdalmalaj5h3lulri
Distributing privacy policies over multimedia content across multiple online social networks
2014
Computer Networks
Online Social Networks (OSNs) are currently playing a crucial role in our everyday social life. ...
The novelty of the proposed scheme is the ability to enforce a user's privacy policies across multiple online social networks, even if she is not subscribed to all of them, without using a trusted third ...
a b s t r a c t Online Social Networks (OSNs) are currently playing a crucial role in our everyday social life. ...
doi:10.1016/j.comnet.2014.08.023
fatcat:sobzigqj3vaxblr4vuacmaavhi
Fictions and frictions: Promises, transaction costs and the innovation of network technologies
2019
Social Studies of Science
However, the actual promise of the elimination of transaction costs seems unfeasible, because of a cyclical pattern in which network technologies that make that promise create processes of institutionalization ...
New network technologies are framed as eliminating 'transaction costs', a notion first developed in economic theory that now drives the design of market systems. ...
Acknowledgements We like to express our gratitude to the useful observations of the anonymous reviewer and to Sergio Sismondo's editorial advice and guidance in the review process. ...
doi:10.1177/0306312719838339
pmid:30880597
pmcid:PMC6902903
fatcat:5m7opu6lefb4xpqrw6gayfihmu
Privacy Law's Precautionary Principle Problem
2014
Social Science Research Network
These two realities are the byproduct of the Internet's decentralized, distributed nature; the unprecedented scale of modern networked communications; the combination of dramatic expansions in computing ...
In this regard, policymakers can draw important lessons from the debate over how best to protect children from objectionable online content. ...
., ENHANCING CHILD SAFETY & ONLINE TECHNOLOGIES: FINAL REPORT OF THE INTERNET SAFETY TECHNICAL TASK FORCE TO THE MULTI-STATE WORKING GROUP ON SOCIAL NETWORKING OF STATE ATTORNEYS GENERAL OF THE UNITED ...
doi:10.2139/ssrn.2449308
fatcat:u3emvsbhabewrib4i2jklaxfli
Discouraging Abusive Behavior in Privacy-Preserving Online Social Networking Applications
2016
Proceedings of the 25th International Conference Companion on World Wide Web - WWW '16 Companion
We expect that privacy will play a bigger role in the design of future decentralized OSNs, and thus abuse detection methods should also be designed to respect privacy requirements. ...
Let G f =(V f , E f ) be a directed graph of social relationships, with a set of vertices V f which are follower users (those who follow or subscribe to other user's posts), and a set of directed edges ...
doi:10.1145/2872518.2888600
dblp:conf/www/Garcia-Recuero16
fatcat:isohjj3xafhf3erypgcmmmz6cq
A Face Tells More than a Thousand Posts: Developing Face Recognition Privacy in Social Networks
2012
Social Science Research Network
their online social lives. 8 To this end, the architectural and market solutions of my proposal are aimed at lowering the cost of switching between social networks to free users from the network effect ...
these social norms and technical and market solutions would complement the legal solution, the law could still play an important role in mandating adjustments to all four constraints. 256
A. ...
Privacy in Public So far, I have outlined how social networks could be designed to allow users to opt out of data collection without foregoing their online social interaction. ...
doi:10.2139/ssrn.2109108
fatcat:qnpsgpsvprfy7eacjlztw52ipi
Collective privacy management in social networks
2009
Proceedings of the 18th international conference on World wide web - WWW '09
In this paper, we model the problem of collaborative enforcement of privacy policies on shared data by using game theory. ...
Social networks enable a form of self expression for users, and help them to socialize and share content with other users. ...
We would like to thank Marco Rossi for his useful advices on the Clarke-Tax algorithm and Shitij Kulshreshtha for his help with the development of the private box application. ...
doi:10.1145/1526709.1526780
dblp:conf/www/SquicciariniSP09
fatcat:tiq5s6nfbzbepkq7iohu2a6pya
Some Simple Economics of the Blockchain
2016
Social Science Research Network
contribution of the resources needed to operate, scale, and secure a decentralized network. ...
The cost of verification relates to the ability to cheaply verify state, including information about past transactions and their attributes, and current ownership in a native digital asset. ...
Solutions like the Lightning Network From a standards perspective, whereas there are advantages to being able to rely on a single blockchain because of economies of scale in security and direct and indirect ...
doi:10.2139/ssrn.2874598
fatcat:3ab7mhd5bnfapjbitzqkey6fj4
Privacy Preserving Reputation Management in Social Networks
[chapter]
2013
Lecture Notes in Social Networks
In this chapter, we describe privacy preserving reputation management in social networks and the associated challenges. ...
In particular we will look at privacy preserving reputation management in decentralized social networks, where there is no central authority or trusted third parties, thus making the task of preserving ...
Social Networks and Relationships We take a look at the key social concepts of social networks and social relationships. ...
doi:10.1007/978-3-7091-0894-9_8
dblp:series/lnsn/HasanB13
fatcat:dyeswkwtmvfurgsefr7y64lgga
« Previous
Showing results 1 — 15 out of 5,014 results