Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3 2018
DOI: 10.5339/qfarc.2018.ictpd771
|View full text |Cite
|
Sign up to set email alerts
|

Data Privacy in Online Social Networks With FineGrained Access Control

Abstract: Online Social Networks (OSNs), such as Facebook and Twitter, are popular platforms that enable users to interact and socialize through their networked devices. However, the social nature of such applications forces users to share a great amount of personal data with other users and the OSN service providers, including pictures, location check-ins, etc. Even though some OSNs offer configurable privacy controls that limit access to shared data, users might misconfigure these controls due to their complexity or l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
4
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…In contrast, the security of the RSA-based cryptosystem is based on finding the factor of the product of two large prime integers. The factorization Problem (FP) is solved using the Number Field Sieve (NFS) Algorithm with sub-exponential complexity 1 . In contrast, no known sub-exponential algorithm can solve the ECDLP if the curves are chosen suitably.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…In contrast, the security of the RSA-based cryptosystem is based on finding the factor of the product of two large prime integers. The factorization Problem (FP) is solved using the Number Field Sieve (NFS) Algorithm with sub-exponential complexity 1 . In contrast, no known sub-exponential algorithm can solve the ECDLP if the curves are chosen suitably.…”
Section: Introductionmentioning
confidence: 99%
“…If the ballots satisfy these equations, stop the process; otherwise, the process is repeated until the size of the ballot becomes one. Thus, the proposed system has Olog(n) time complexity for the batch of n invalid and valid ballots, the complexities for n valid ballots and single ballot are O(1) and O(n), respectively, as shown in Table4.5.…”
mentioning
confidence: 99%
See 2 more Smart Citations