2016
DOI: 10.1016/j.eswa.2016.06.026
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing transparent access to private content in social networks by means of automatic sanitization

Abstract: Social networks have become an essential meeting point for millions of individuals willing to publish and consume huge quantities of heterogeneous information. Some studies have shown that the data published in these platforms may contain sensitive personal information and that external entities can gather and exploit this knowledge for their own benefit. Even though some methods to preserve the privacy of social networks users have been proposed, they generally apply rigid access control measures to the prote… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 30 publications
0
8
0
1
Order By: Relevance
“…Social network sites pave the way for a suitable environment in which individuals can share their personal information via communication networks (Jang et al 2016). These sites have evolved into an indispensable meeting point because it publishes information about millions of people (Viejo and Sanchez, 2016). "People tend to use the Internet and web applications more often owing to the rapid technological developments.…”
Section: Introductionmentioning
confidence: 99%
“…Social network sites pave the way for a suitable environment in which individuals can share their personal information via communication networks (Jang et al 2016). These sites have evolved into an indispensable meeting point because it publishes information about millions of people (Viejo and Sanchez, 2016). "People tend to use the Internet and web applications more often owing to the rapid technological developments.…”
Section: Introductionmentioning
confidence: 99%
“…Information Content (IC) theory, which measures the inverse of the appearance probability of a term in a corpus, has been also used to distinguish between general and specific terms. This idea was used in [120,263] to propose a system for automatic semantic annotation by using knowledge bases and linguistic tools. Their system is able to make distinctions between values of the sensitivity of the information.…”
Section: Sensitivity Inferring Requirementmentioning
confidence: 99%
“…Other approaches [263,120] have considered preserving the users' privacy through the sanitization of the content shared. These research works use machine learning techniques to analyze textual posts, extract features of them, compute their sensitivity 2.3.…”
Section: Privacy-preserving Requirementmentioning
confidence: 99%
See 2 more Smart Citations