Trust-based collaborative privacy management in online social networks
Online social networks have now become the most popular platforms for people to share
information with others. Along with this, there is a serious threat to individuals' privacy. One …
information with others. Along with this, there is a serious threat to individuals' privacy. One …
DePTVM: Decentralized pseudonym and trust value management for integrated networks
Evaluating and sharing user equipment (UE) trust across multiple network domains can
greatly support security and trust management of future integrated heterogeneous networks …
greatly support security and trust management of future integrated heterogeneous networks …
A new access control scheme for Facebook-style social networks
The popularity of online social networks (OSNs) makes the protection of users' private
information an important but scientifically challenging problem. In the literature, relationship …
information an important but scientifically challenging problem. In the literature, relationship …
Verifying voting schemes
The possibility to use computers for counting ballots allows us to design new voting
schemes that are arguably fairer than existing schemes designed for hand-counting. We …
schemes that are arguably fairer than existing schemes designed for hand-counting. We …
Cryptographic protocols for enforcing relationship-based access control policies
Relationship-based access control schemes have been studied to protect users' privacy in
online social networks. In this paper, we propose cryptographic protocols for decentralized …
online social networks. In this paper, we propose cryptographic protocols for decentralized …
On the specification and verification of voting schemes
The ability to count ballots by computers allows us to design new voting schemes that are
arguably fairer than existing schemes designed for hand-counting. We argue that formal …
arguably fairer than existing schemes designed for hand-counting. We argue that formal …
A Method to Improve the Security of Information Diffusion in Complex Networks—Node Trust-Value Management Mechanism
G Wang, S Lu, Y Feng, R Ma - IEEE Access, 2019 - ieeexplore.ieee.org
The transmission of malicious information is often accompanied with normal information
flows in complex networks. For the intrusion of unknown malicious information, if there is no …
flows in complex networks. For the intrusion of unknown malicious information, if there is no …
[PDF][PDF] Estimation of Trust Value for Secure Information Sharing on Social Network
P Krishnamoorthy, KI Ahmed, MK Kumar, VP Kishodh - researchgate.net
To give a community oriented way to deal with effective information partaking in OSN. To
make limit dependent on which the client makes the last choice on information posting. A …
make limit dependent on which the client makes the last choice on information posting. A …
[图书][B] A Collaborative Access Control Model for Shared Items in Online Social Networks
H Al Shareef - 2014 - search.proquest.com
The recent emergence of online social networks (OSNs) has changed the communication
behaviors of thousand of millions of users. OSNs have become significant platforms for …
behaviors of thousand of millions of users. OSNs have become significant platforms for …
[PDF][PDF] MULTIPARTY ACCESS CONTROL FOR PHOTO SHARING USING TRUST BASED MANAGEMENT
MRAM ROSE, MM AARTHI - academia.edu
Online social networks have now become the most popular platforms for people to share
information with others. Along with this, there is a serious threat to individuals' privacy. In the …
information with others. Along with this, there is a serious threat to individuals' privacy. In the …