Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Security and trust in online social networks / (Record no. 562052)

000 -LEADER
fixed length control field 06398nam a2200685 i 4500
001 - CONTROL NUMBER
control field 6813068
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152913.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140113s2014 cau foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627052665
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781627052658
Qualifying information paperback
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00549ED1V01Y201311SPT008
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00403035
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)868157010
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HM742
Item number .C277 2014
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.754
Edition number 23
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR)
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) MoCl
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Carminati, Barbara.,
Relator term author.
245 10 - TITLE STATEMENT
Title Security and trust in online social networks /
Statement of responsibility, etc. Barbara Carminati, Elena Ferrari, and Marco Viviani.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
Name of producer, publisher, distributor, manufacturer Morgan & Claypool,
Date of production, publication, distribution, manufacture, or copyright notice 2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (ix, 110 pages)
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on information security, privacy, & trust,
International Standard Serial Number 1945-9750 ;
Volume/sequential designation # 8
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
500 ## - GENERAL NOTE
General note Series from website.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 81-108).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Online social networks and security issues -- 1.1 Introduction -- 1.2 Social networks -- 1.2.1 The meaning of community -- 1.2.2 From offline to online communities -- 1.3 Online social networks -- 1.3.1 Evolution of online social networks -- 1.3.2 Analysis and properties -- 1.3.3 Multiple social ties and social capital -- 1.4 Security issues in online social networks -- 1.4.1 Trust management in online social networks -- 1.4.2 Controlled information sharing in online social networks -- 1.4.3 Identity management in online social networks --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Trust management in online social networks -- 2.1 Introduction -- 2.2 Trust in computer science -- 2.2.1 Trust and policies -- 2.2.2 Trust and reputation systems -- 2.3 Trust in online social networks -- 2.3.1 Trust properties -- 2.3.2 Trust components -- 2.3.3 Social trust and social capital -- 2.3.4 Trust evaluation models -- 2.4 Conclusions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Controlled information sharing in online social networks -- 3.1 Introduction -- 3.2 Access control in data management systems -- 3.2.1 A brief historical perspective -- 3.2.2 Access control models -- 3.3 Access control in online social networks -- 3.3.1 Relationship-based access control -- 3.3.2 Privacy settings in commercial online social networks -- 3.3.3 Existing access control approaches -- 3.4 Conclusions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Identity management in online social networks -- 4.1 Introduction -- 4.2 Identity management -- 4.2.1 Digital identity -- 4.2.2 Identity management models: from identity 1.0 to identity 2.0 -- 4.3 Identity management in online social networks -- 4.3.1 Identity as self-presentation -- 4.3.2 Identity disclosure -- 4.3.3 Identity theft -- 4.4 Conclusions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Conclusions and further research directions -- 5.1 Open security issues in online social networks -- 5.1.1 Trust management -- 5.1.2 Controlled information sharing -- 5.1.3 Identity management -- Bibliography -- Authors' biography.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over the years. We also discuss some of the most promising research directions in these fields.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on January 13, 2014).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Online social networks
General subdivision Security measures.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term online social networks
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term trust
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term controlled information sharing
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term online identity management
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ferrari, Elena,
Dates associated with a name 1968-,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Viviani, Marco.,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781627052658
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on information security, privacy, and trust ;
Volume/sequential designation # 8.
International Standard Serial Number 1945-9750
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier http://ieeexplore.ieee.org/servlet/opac?bknumber=6813068
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to full text
Uniform Resource Identifier http://dx.doi.org/10.2200/S00549ED1V01Y201311SPT008
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE552 2020-04-13 2020-04-13 E books

Powered by Koha