2012
DOI: 10.1007/978-3-642-34059-8_7
|View full text |Cite
|
Sign up to set email alerts
|

Social Networks for Importing and Exporting Security

Abstract: Abstract. Online social networks are rapidly changing our lives. Their growing pervasiveness and the trust that we develop in online identities provide us with a new platform for security applications. Additionally, the integration of various sensors and mobile devices on social networks has shortened the separation between one's physical and virtual (i.e. web) presences. We envisage that social networks will serve as the portal between the physical world and the digital world. However, challenges arise when u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Gayathri et al [49] and Chen and Roscoe [50] discuss the security implications in the construction of a social cloud. They respectively pay special attention to, and provide counter measures for, how a social cloud can be used to circumvent copyright as well as perform other illicit actions.…”
Section: Related Workmentioning
confidence: 99%
“…Gayathri et al [49] and Chen and Roscoe [50] discuss the security implications in the construction of a social cloud. They respectively pay special attention to, and provide counter measures for, how a social cloud can be used to circumvent copyright as well as perform other illicit actions.…”
Section: Related Workmentioning
confidence: 99%
“…There is no guarantee of the real-world identity of any user [4], [5]. There have been some "hacks" involving the cloning of entire personal profiles in order to convince others of a fake identity 2 .…”
Section: Introductionmentioning
confidence: 99%