Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the n
Computational Social Networks: Security and Privacy
โ Scribed by Mostafa Salama, Mrutyunjaya Panda, Yomna Elbarawy, Aboul Ella Hassanien, Ajith Abraham (auth.), Ajith Abraham (eds.)
- Publisher
- Springer-Verlag London
- Year
- 2012
- Tongue
- English
- Leaves
- 351
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
โฆ Table of Contents
Front Matter....Pages i-xiii
Front Matter....Pages 1-1
Computational Social Networks: Security and Privacy....Pages 3-21
Security, Privacy, and Trust in Social Networks....Pages 23-53
Blogging Around the Globe: Motivations, Privacy Concerns, and Social Networking....Pages 55-86
Privacy in Online Social Networks....Pages 87-113
Privacy Settings in Online Social Networks as a Conflict of Interests: Regulating User Behavior on Facebook ....Pages 115-132
A Reliability-Based Metric for Inferring Trust from Recommendations in Knowledge Sharing Networks....Pages 133-154
Front Matter....Pages 155-155
Measurement Methods of User Behavior in Online Social Networks....Pages 157-175
Exploring Influence and Interests Among Users Within Social Networks....Pages 177-206
User Cooperation, Virality and Gaming in a Social Mobile Network: The Gedda-Headz Concept....Pages 207-227
An Effective User-Driven Framework for Selection of Social Network Services....Pages 229-245
Front Matter....Pages 247-247
Providing Group Anonymity in Social Networks....Pages 249-268
Anonymisation of Social Networks and Rough Set Approach....Pages 269-309
Behavioural Patterns and Social Networks in Anonymity Systems....Pages 311-340
Back Matter....Pages 341-347
โฆ Subjects
Computer Communication Networks; Database Management; User Interfaces and Human Computer Interaction; Computers and Society
๐ SIMILAR VOLUMES
<p><i>Security and Privacy in Social Networks</i> brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of
<p><i>Security and Privacy in Social Networks</i> brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of
<p><p>This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their per
<p>This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and app