๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Computational Social Networks: Security and Privacy

โœ Scribed by Mostafa Salama, Mrutyunjaya Panda, Yomna Elbarawy, Aboul Ella Hassanien, Ajith Abraham (auth.), Ajith Abraham (eds.)


Publisher
Springer-Verlag London
Year
2012
Tongue
English
Leaves
351
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

โœฆ Table of Contents


Front Matter....Pages i-xiii
Front Matter....Pages 1-1
Computational Social Networks: Security and Privacy....Pages 3-21
Security, Privacy, and Trust in Social Networks....Pages 23-53
Blogging Around the Globe: Motivations, Privacy Concerns, and Social Networking....Pages 55-86
Privacy in Online Social Networks....Pages 87-113
Privacy Settings in Online Social Networks as a Conflict of Interests: Regulating User Behavior on Facebook ....Pages 115-132
A Reliability-Based Metric for Inferring Trust from Recommendations in Knowledge Sharing Networks....Pages 133-154
Front Matter....Pages 155-155
Measurement Methods of User Behavior in Online Social Networks....Pages 157-175
Exploring Influence and Interests Among Users Within Social Networks....Pages 177-206
User Cooperation, Virality and Gaming in a Social Mobile Network: The Gedda-Headz Concept....Pages 207-227
An Effective User-Driven Framework for Selection of Social Network Services....Pages 229-245
Front Matter....Pages 247-247
Providing Group Anonymity in Social Networks....Pages 249-268
Anonymisation of Social Networks and Rough Set Approach....Pages 269-309
Behavioural Patterns and Social Networks in Anonymity Systems....Pages 311-340
Back Matter....Pages 341-347

โœฆ Subjects


Computer Communication Networks; Database Management; User Interfaces and Human Computer Interaction; Computers and Society


๐Ÿ“œ SIMILAR VOLUMES


Security, Privacy and Reliability in Com
โœ Kewei Sha; Aaron Striegel; Min Song ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› River Publishers ๐ŸŒ English

Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the n

Security and privacy in social networks
โœ Yuval Elovici, Yaniv Altshuler (auth.), Yaniv Altshuler, Yuval Elovici, Armin B. ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag New York ๐ŸŒ English

<p><i>Security and Privacy in Social Networks</i> brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of

Security and Privacy in Social Networks
โœ Yuval Elovici, Yaniv Altshuler (auth.), Yaniv Altshuler, Yuval Elovici, Armin B. ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag New York ๐ŸŒ English

<p><i>Security and Privacy in Social Networks</i> brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of

Security and privacy in mobile social ne
โœ Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag New York ๐ŸŒ English

<p><p>This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their per

Security and privacy preserving in socia
โœ Elie Raad, Richard Chbeir (auth.), Richard Chbeir, Bechara Al Bouna (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag Wien ๐ŸŒ English

<p>This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and app