Trust-based collaborative privacy management in online social networks

L Xu, C Jiang, N He, Z Han… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Online social networks have now become the most popular platforms for people to share
information with others. Along with this, there is a serious threat to individuals' privacy. One …

DePTVM: Decentralized pseudonym and trust value management for integrated networks

G Liu, Z Yan, D Wang, H Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Evaluating and sharing user equipment (UE) trust across multiple network domains can
greatly support security and trust management of future integrated heterogeneous networks …

A new access control scheme for Facebook-style social networks

J Pang, Y Zhang - Computers & Security, 2015 - Elsevier
The popularity of online social networks (OSNs) makes the protection of users' private
information an important but scientifically challenging problem. In the literature, relationship …

Verifying voting schemes

B Beckert, R Goré, C Schürmann, T Bormer… - Journal of Information …, 2014 - Elsevier
The possibility to use computers for counting ballots allows us to design new voting
schemes that are arguably fairer than existing schemes designed for hand-counting. We …

Cryptographic protocols for enforcing relationship-based access control policies

J Pang, Y Zhang - 2015 IEEE 39th Annual Computer Software …, 2015 - ieeexplore.ieee.org
Relationship-based access control schemes have been studied to protect users' privacy in
online social networks. In this paper, we propose cryptographic protocols for decentralized …

On the specification and verification of voting schemes

B Beckert, R Goré, C Schürmann - … Conference on E-Voting and Identity, 2013 - Springer
The ability to count ballots by computers allows us to design new voting schemes that are
arguably fairer than existing schemes designed for hand-counting. We argue that formal …

A Method to Improve the Security of Information Diffusion in Complex Networks—Node Trust-Value Management Mechanism

G Wang, S Lu, Y Feng, R Ma - IEEE Access, 2019 - ieeexplore.ieee.org
The transmission of malicious information is often accompanied with normal information
flows in complex networks. For the intrusion of unknown malicious information, if there is no …

[PDF][PDF] Estimation of Trust Value for Secure Information Sharing on Social Network

P Krishnamoorthy, KI Ahmed, MK Kumar, VP Kishodh - researchgate.net
To give a community oriented way to deal with effective information partaking in OSN. To
make limit dependent on which the client makes the last choice on information posting. A …

[图书][B] A Collaborative Access Control Model for Shared Items in Online Social Networks

H Al Shareef - 2014 - search.proquest.com
The recent emergence of online social networks (OSNs) has changed the communication
behaviors of thousand of millions of users. OSNs have become significant platforms for …

[PDF][PDF] MULTIPARTY ACCESS CONTROL FOR PHOTO SHARING USING TRUST BASED MANAGEMENT

MRAM ROSE, MM AARTHI - academia.edu
Online social networks have now become the most popular platforms for people to share
information with others. Along with this, there is a serious threat to individuals' privacy. In the …