2011
DOI: 10.1504/ijwbc.2011.041199
|View full text |Cite
|
Sign up to set email alerts
|

Decentralised social network management

Abstract: Social networking sites have gained much popularity in the recent years because of the opportunities they give to people to connect to each other in an easy and timely manner, and to exchange and share various kinds of information. However, these sites are based on a centralised paradigm, which limits the mobility of their users, and ultimately, their chances to establish new relationships and benefit from diverse networking services. In this paper, we argue for a decentralised paradigm for social networking, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
12
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…Without loss of generality, we can assume that the selected privacy enforcement models allow users to protect the contents they publish by defining the group of users who can access these contents. As a matter of fact, Section 2 shows that a very common solution to express privacy preferences in DOSNs LKH+TGDH [31] Vis-a-Vis [8] LifeSocial.KOM [10] DOSN LKH [28,32] My3 [34] DECENT [43] LKH+OFT [30] DiDuSoNet [36] SocialGate [12] Shi R.H. et al [44] Privacy Policy [38,39] LotusNet [13] ELK [45] Trust [35] Contrail [42] OFT [33] Zeng S. et al [46] ProofBook [40] LKH [29] eXO [47] Safebook [7] DGKD [48] Solid [49] SuperNova [14] Bortoli S. et al [50] LibreSocial [41] BCOSN [51] WebP2P [52] Megaphone [53] SEDOSN [54] ReClaim [55] PSON [56] (and OSNs) is the definition of groups of users. An alternative solution to specify the users who can access a content is the one that expresses privacy preferences through attribute based access control policies.…”
Section: Classification Of the Content Privacy Enforcement Modelsmentioning
confidence: 99%
“…Without loss of generality, we can assume that the selected privacy enforcement models allow users to protect the contents they publish by defining the group of users who can access these contents. As a matter of fact, Section 2 shows that a very common solution to express privacy preferences in DOSNs LKH+TGDH [31] Vis-a-Vis [8] LifeSocial.KOM [10] DOSN LKH [28,32] My3 [34] DECENT [43] LKH+OFT [30] DiDuSoNet [36] SocialGate [12] Shi R.H. et al [44] Privacy Policy [38,39] LotusNet [13] ELK [45] Trust [35] Contrail [42] OFT [33] Zeng S. et al [46] ProofBook [40] LKH [29] eXO [47] Safebook [7] DGKD [48] Solid [49] SuperNova [14] Bortoli S. et al [50] LibreSocial [41] BCOSN [51] WebP2P [52] Megaphone [53] SEDOSN [54] ReClaim [55] PSON [56] (and OSNs) is the definition of groups of users. An alternative solution to specify the users who can access a content is the one that expresses privacy preferences through attribute based access control policies.…”
Section: Classification Of the Content Privacy Enforcement Modelsmentioning
confidence: 99%
“…Despite interesting success stories attributed to well known social networks like Facebook3, they also have some limitations [17]. While it is easy to share data on a single social network, it is much challenging to share it across different social networks, because each network has its own data schema and conceptual space [8].…”
Section: Related Workmentioning
confidence: 99%
“…Decentralization and cross-OSNs management of identities has been studied by various research groups [4], [15], [19]. Bortoli et al [4] propose a web-based application for automatic social network integration, based on globally unique identifiers and semantic web technologies.…”
Section: Related Workmentioning
confidence: 99%
“…Bortoli et al [4] propose a web-based application for automatic social network integration, based on globally unique identifiers and semantic web technologies. The authors focus on the decentralized and boundary-crossing management of OSN identities.…”
Section: Related Workmentioning
confidence: 99%