Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review

AAN Patwary, A Fu, RK Naha, SK Battula… - arXiv preprint arXiv …, 2020 - arxiv.org
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of IoT applications amongst researchers and technology industries over the last …

Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control

AAN Patwary, RK Naha, S Garg, SK Battula… - Electronics, 2021 - mdpi.com
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of Internet of Things (IoT) applications amongst researchers and technology …

An automated model to score the privacy of unstructured information—Social media case

E Aghasian, S Garg, J Montgomery - Computers & Security, 2020 - Elsevier
One of the common forms of data which is shared by online social media users is free-text
formats including comments, posts, blogs and tweets. While users mostly share this …

Research on privacy security risk assessment method of mobile commerce based on information entropy and Markov

T Zhang, K Zhao, M Yang, T Gao… - … and Mobile Computing, 2020 - Wiley Online Library
To obtain precise personalized services in mobile commerce, the users have to disclose
their personal information to the operator, which constitutes a potential threat to their privacy …

PriMe: A Novel Privacy Measuring Framework for Online Social Networks

A Hassanpour, B Yang - 2022 IEEE/ACM International …, 2022 - ieeexplore.ieee.org
Online Social Networks are responsible for disclosing a large amount of sensitive
information. Users unintentionally reveal their sensitive information and are unaware of the …

[PDF][PDF] Research on privacy security steady StateEvaluation model of mobile application based on information entropy and Markov theory

M Yang, L Jia, T Gao, T Zhang… - International Journal on …, 2021 - ijns.jalaxy.com.tw
In the process of using mobile applications, if users want to use customized personalized
services, they need to provide personal privacy information to businesses, which constitutes …

Threats and countermeasures in online social networks: A systematic review of existing research and future directions

S Sahoo, SV Bharathi - AIP Conference Proceedings, 2023 - pubs.aip.org
In an era of advanced technology, while the growth of social media is quite remarkable,
there is the least concern about safety and secrecy matters. Since the Facebook–Cambridge …

Think before you share in OSNs: Textual content and connection weight put you at higher privacy risk

Ö Çoban, A İnan, SA Özel - International Journal of Information …, 2022 - dergipark.org.tr
The widespread use of OSNs has brought forward the issue of privacy protection over OSNs,
as sensitive information of users needs to remain private. Most users are unaware of …

A Review on Opinion Mining based integrated with privacy preservation in Social Media

P Tuli, K Walia - Proceedings of the International Conference on …, 2022 - papers.ssrn.com
The popularity of social networking had led to the fast development of web-based life. The
sharing of human thoughts and spreading of awareness using social media involves sharing …

[PDF][PDF] Research on privacy security risk evaluation of mobile commerce users based on information entropy and markov theory

J Wang, T Gao - 2024 - scholar.archive.org
To apply for precise personalized services in mobile commerce, the users have to disclose
their personal information to the operator, which constitutes a potential threat to their privacy …