000 03385nam a2200397Ii 4500
005 20250919185143.0
008 150428t20142014caua b 000 0 eng
020 _a9781627052658
_cRM145.72
020 _a1627052658
039 9 _a201512281516
_brosli
_c201512070838
_drahah
_c201510120856
_dhayat
_c201509211122
_drosli
_y04-28-2015
_zrahah
040 _aBTCTA
_beng
_erda
_cBTCTA
_dYDXCP
_dOCLCO
_dMUU
_dUKM
_erda
090 _aHM742.C337 3
090 _aHM742
_b.C337 3
100 1 _aCarminati, Barbara,
_eauthor.
245 1 0 _aSecurity and trust in online social networks /
_cBarbara Carminati, Elena Ferrari, and Marco Viviani.
264 1 _a[San Rafael, California] :
_bMorgan & Claypool,
_c[2014].
264 4 _c©2014.
300 _aix, 110 pages :
_billustrations ;
_c24 cm.
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
490 1 _aSynthesis lectures on information security, privacy, and trust ;
_v#8
520 3 _aThe enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over.
650 0 _aOnline social networks
_xSecurity measures.
700 1 _aFerrari, Elena,
_eauthor.
700 1 _aViviani, Marco,
_eauthor.
830 _aSynthesis lectures on information security, privacy, and trust ;
_v#8
907 _a.b16132774
_b2019-11-12
_c2019-11-12
942 _c01
_n0
_kHM742.C337 3
914 _avtls003585146
990 _anab
991 _aFakulti Teknologi dan Sains Maklumat
998 _al
_b2015-02-04
_cm
_da
_feng
_gcau
_y0
_z.b16132774
999 _c684264
_d684264