Handbook of Social Network Technologies and Applications 2010
DOI: 10.1007/978-1-4419-7142-5_23
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in Online Social Networks

Abstract: 3Uno solo è il mio desiderio, quello di vedervi felici nel tempo e nell'eternità.sac. Giovanni Bosco 4 Abstract Social network applications allow people to establish links and exchange information based on various interests such as professional activities, hobbies, et similia. Several commercial social networking platforms that came to light recently suddenly became extremely popular at the international arena. Apart from obvious advantages in terms of fast community building, rapid exchange of information at … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 56 publications
0
13
0
1
Order By: Relevance
“…Table 2 is an analysis of the proposed system's vulnerability against different types of attacks as presented in [10]. It shows that the proposed architecture is resilient against many attacks where the existing popular OSNs such as Facebook and LinkedIn are not.…”
Section: Network Infrastructure Provider and Eavesdroppersmentioning
confidence: 97%
See 1 more Smart Citation
“…Table 2 is an analysis of the proposed system's vulnerability against different types of attacks as presented in [10]. It shows that the proposed architecture is resilient against many attacks where the existing popular OSNs such as Facebook and LinkedIn are not.…”
Section: Network Infrastructure Provider and Eavesdroppersmentioning
confidence: 97%
“…The authors in [10] presented an attack spectrum in the context of OSN environments. Table 2 is an analysis of the proposed system's vulnerability against different types of attacks as presented in [10].…”
Section: Network Infrastructure Provider and Eavesdroppersmentioning
confidence: 99%
“…Figure 1 depicts in detail the diversity of SNS users and reflects their relationship to the SNS functionality and possible access to the PII of the SNS users. It also describes the access that SNSSP and Third Party Service Providers (SP) have to PII [11].…”
Section: Privacy Principles In Iso 29100:2011mentioning
confidence: 99%
“…PII controllers and processors are considered to be members of the SNSSP team. The PII Controller or privacy stakeholder is the entity that determines the purposes and means of processing the user's PII other than natural persons who use data for personal purposes [8].…”
Section: Roles and Interactions In Snsmentioning
confidence: 99%