Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey

S Ji, P Mittal, R Beyah - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …

Silentwhispers: Enforcing security and privacy in decentralized credit networks

G Malavolta, P Moreno-Sanchez, A Kate… - Cryptology ePrint …, 2016 - eprint.iacr.org
Credit networks model transitive trust (or credit) between users in a distributed environment
and have recently seen a rapid increase of popularity due to their flexible design and …

Boten ELISA: A novel approach for botnet C&C in online social networks

A Compagno, M Conti, D Lain… - … IEEE Conference on …, 2015 - ieeexplore.ieee.org
The Command and Control (C&C) channel of modern botnets is migrating from traditional
centralized solutions (such as the ones based on Internet Relay Chat and Hyper Text …

Socialspy: Browsing (supposedly) hidden information in online social networks

A Burattin, G Cascavilla, M Conti - Risks and Security of Internet and …, 2015 - Springer
Abstract Online Social Networks are becoming the most important “places” where people
share information about their lives. With the increasing concern that users have about …

Revealing censored information through comments and commenters in online social networks

G Cascavilla, M Conti, DG Schwartz… - Proceedings of the 2015 …, 2015 - dl.acm.org
In this work we study information leakage through discussions in online social networks. In
particular, we focus on articles published by news pages, in which a person's name is …

Relationship-based access control for resharing in decentralized online social networks

R Gay, J Hu, H Mantel, S Mazaheri - … FPS 2017, Nancy, France, October 23 …, 2018 - Springer
Decentralized online social networks (DOSNs) have adopted quite coarse-grained policies
for sharing messages with friends of friends (ie, resharing). They either forbid it completely or …

Anonymity in an electronic society: A survey

M Conti, F De Gaspari, LV Mancini - Cyber Deception: Building the …, 2016 - Springer
In the wake of surveillance scandals in recent years, as well of the continuous deployment of
more sophisticated censorship mechanisms, concerns over anonymity and privacy on the …

[PDF][PDF] Private information sharing in online communities

F Beato - 2015 - esat.kuleuven.be
Private Information Sharing in Online Communities Page 1 ARENBERG DOCTORAL
SCHOOL Faculty of Engineering Science Private Information Sharing in Online …

[PDF][PDF] Twistor: anonymous message transfer through Twitter

MS Alavi - 2015 - open.library.ubc.ca
Anonymous communications is a long sought goal of dissidents, privacy advocates, and a
host of other user communities. While a large number of systems have been proposed …

[HTML][HTML] A Generic Framework for Enforcing Security in Distributed Systems

R Gay - 2017 - tuprints.ulb.tu-darmstadt.de
A large extent of today's computer programs is distributed. For instance, services for
backups, file storage, and cooperative work are now typically managed by distributed …