Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of IoT applications amongst researchers and technology industries over the last …
deployment of IoT applications amongst researchers and technology industries over the last …
Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of Internet of Things (IoT) applications amongst researchers and technology …
deployment of Internet of Things (IoT) applications amongst researchers and technology …
An automated model to score the privacy of unstructured information—Social media case
One of the common forms of data which is shared by online social media users is free-text
formats including comments, posts, blogs and tweets. While users mostly share this …
formats including comments, posts, blogs and tweets. While users mostly share this …
Research on privacy security risk assessment method of mobile commerce based on information entropy and Markov
T Zhang, K Zhao, M Yang, T Gao… - … and Mobile Computing, 2020 - Wiley Online Library
To obtain precise personalized services in mobile commerce, the users have to disclose
their personal information to the operator, which constitutes a potential threat to their privacy …
their personal information to the operator, which constitutes a potential threat to their privacy …
PriMe: A Novel Privacy Measuring Framework for Online Social Networks
A Hassanpour, B Yang - 2022 IEEE/ACM International …, 2022 - ieeexplore.ieee.org
Online Social Networks are responsible for disclosing a large amount of sensitive
information. Users unintentionally reveal their sensitive information and are unaware of the …
information. Users unintentionally reveal their sensitive information and are unaware of the …
[PDF][PDF] Research on privacy security steady StateEvaluation model of mobile application based on information entropy and Markov theory
M Yang, L Jia, T Gao, T Zhang… - International Journal on …, 2021 - ijns.jalaxy.com.tw
In the process of using mobile applications, if users want to use customized personalized
services, they need to provide personal privacy information to businesses, which constitutes …
services, they need to provide personal privacy information to businesses, which constitutes …
Threats and countermeasures in online social networks: A systematic review of existing research and future directions
S Sahoo, SV Bharathi - AIP Conference Proceedings, 2023 - pubs.aip.org
In an era of advanced technology, while the growth of social media is quite remarkable,
there is the least concern about safety and secrecy matters. Since the Facebook–Cambridge …
there is the least concern about safety and secrecy matters. Since the Facebook–Cambridge …
Think before you share in OSNs: Textual content and connection weight put you at higher privacy risk
The widespread use of OSNs has brought forward the issue of privacy protection over OSNs,
as sensitive information of users needs to remain private. Most users are unaware of …
as sensitive information of users needs to remain private. Most users are unaware of …
A Review on Opinion Mining based integrated with privacy preservation in Social Media
P Tuli, K Walia - Proceedings of the International Conference on …, 2022 - papers.ssrn.com
The popularity of social networking had led to the fast development of web-based life. The
sharing of human thoughts and spreading of awareness using social media involves sharing …
sharing of human thoughts and spreading of awareness using social media involves sharing …
[PDF][PDF] Research on privacy security risk evaluation of mobile commerce users based on information entropy and markov theory
J Wang, T Gao - 2024 - scholar.archive.org
To apply for precise personalized services in mobile commerce, the users have to disclose
their personal information to the operator, which constitutes a potential threat to their privacy …
their personal information to the operator, which constitutes a potential threat to their privacy …