Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …
span many different domains, ranging from online social network data from networks like …
Silentwhispers: Enforcing security and privacy in decentralized credit networks
Credit networks model transitive trust (or credit) between users in a distributed environment
and have recently seen a rapid increase of popularity due to their flexible design and …
and have recently seen a rapid increase of popularity due to their flexible design and …
Boten ELISA: A novel approach for botnet C&C in online social networks
The Command and Control (C&C) channel of modern botnets is migrating from traditional
centralized solutions (such as the ones based on Internet Relay Chat and Hyper Text …
centralized solutions (such as the ones based on Internet Relay Chat and Hyper Text …
Socialspy: Browsing (supposedly) hidden information in online social networks
Abstract Online Social Networks are becoming the most important “places” where people
share information about their lives. With the increasing concern that users have about …
share information about their lives. With the increasing concern that users have about …
Revealing censored information through comments and commenters in online social networks
In this work we study information leakage through discussions in online social networks. In
particular, we focus on articles published by news pages, in which a person's name is …
particular, we focus on articles published by news pages, in which a person's name is …
Relationship-based access control for resharing in decentralized online social networks
R Gay, J Hu, H Mantel, S Mazaheri - … FPS 2017, Nancy, France, October 23 …, 2018 - Springer
Decentralized online social networks (DOSNs) have adopted quite coarse-grained policies
for sharing messages with friends of friends (ie, resharing). They either forbid it completely or …
for sharing messages with friends of friends (ie, resharing). They either forbid it completely or …
Anonymity in an electronic society: A survey
In the wake of surveillance scandals in recent years, as well of the continuous deployment of
more sophisticated censorship mechanisms, concerns over anonymity and privacy on the …
more sophisticated censorship mechanisms, concerns over anonymity and privacy on the …
[PDF][PDF] Private information sharing in online communities
F Beato - 2015 - esat.kuleuven.be
Private Information Sharing in Online Communities Page 1 ARENBERG DOCTORAL
SCHOOL Faculty of Engineering Science Private Information Sharing in Online …
SCHOOL Faculty of Engineering Science Private Information Sharing in Online …
[PDF][PDF] Twistor: anonymous message transfer through Twitter
MS Alavi - 2015 - open.library.ubc.ca
Anonymous communications is a long sought goal of dissidents, privacy advocates, and a
host of other user communities. While a large number of systems have been proposed …
host of other user communities. While a large number of systems have been proposed …
[HTML][HTML] A Generic Framework for Enforcing Security in Distributed Systems
R Gay - 2017 - tuprints.ulb.tu-darmstadt.de
A large extent of today's computer programs is distributed. For instance, services for
backups, file storage, and cooperative work are now typically managed by distributed …
backups, file storage, and cooperative work are now typically managed by distributed …