000 -LEADER |
fixed length control field |
06398nam a2200685 i 4500 |
001 - CONTROL NUMBER |
control field |
6813068 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IEEE |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200413152913.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m eo d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |||m|||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140113s2014 cau foab 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781627052665 |
Qualifying information |
ebook |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781627052658 |
Qualifying information |
paperback |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.2200/S00549ED1V01Y201311SPT008 |
Source of number or code |
doi |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(CaBNVSL)swl00403035 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)868157010 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
CaBNVSL |
Modifying agency |
CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HM742 |
Item number |
.C277 2014 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
006.754 |
Edition number |
23 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
|
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
MoCl |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Carminati, Barbara., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Security and trust in online social networks / |
Statement of responsibility, etc. |
Barbara Carminati, Elena Ferrari, and Marco Viviani. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : |
Name of producer, publisher, distributor, manufacturer |
Morgan & Claypool, |
Date of production, publication, distribution, manufacture, or copyright notice |
2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 PDF (ix, 110 pages) |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
electronic |
Source |
isbdmedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Synthesis lectures on information security, privacy, & trust, |
International Standard Serial Number |
1945-9750 ; |
Volume/sequential designation |
# 8 |
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Adobe Acrobat Reader. |
500 ## - GENERAL NOTE |
General note |
Part of: Synthesis digital library of engineering and computer science. |
500 ## - GENERAL NOTE |
General note |
Series from website. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 81-108). |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Online social networks and security issues -- 1.1 Introduction -- 1.2 Social networks -- 1.2.1 The meaning of community -- 1.2.2 From offline to online communities -- 1.3 Online social networks -- 1.3.1 Evolution of online social networks -- 1.3.2 Analysis and properties -- 1.3.3 Multiple social ties and social capital -- 1.4 Security issues in online social networks -- 1.4.1 Trust management in online social networks -- 1.4.2 Controlled information sharing in online social networks -- 1.4.3 Identity management in online social networks -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
2. Trust management in online social networks -- 2.1 Introduction -- 2.2 Trust in computer science -- 2.2.1 Trust and policies -- 2.2.2 Trust and reputation systems -- 2.3 Trust in online social networks -- 2.3.1 Trust properties -- 2.3.2 Trust components -- 2.3.3 Social trust and social capital -- 2.3.4 Trust evaluation models -- 2.4 Conclusions -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
3. Controlled information sharing in online social networks -- 3.1 Introduction -- 3.2 Access control in data management systems -- 3.2.1 A brief historical perspective -- 3.2.2 Access control models -- 3.3 Access control in online social networks -- 3.3.1 Relationship-based access control -- 3.3.2 Privacy settings in commercial online social networks -- 3.3.3 Existing access control approaches -- 3.4 Conclusions -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
4. Identity management in online social networks -- 4.1 Introduction -- 4.2 Identity management -- 4.2.1 Digital identity -- 4.2.2 Identity management models: from identity 1.0 to identity 2.0 -- 4.3 Identity management in online social networks -- 4.3.1 Identity as self-presentation -- 4.3.2 Identity disclosure -- 4.3.3 Identity theft -- 4.4 Conclusions -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
5. Conclusions and further research directions -- 5.1 Open security issues in online social networks -- 5.1.1 Trust management -- 5.1.2 Controlled information sharing -- 5.1.3 Identity management -- Bibliography -- Authors' biography. |
506 1# - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Abstract freely available; full-text restricted to subscribers or individual document purchasers. |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Compendex |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
INSPEC |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google scholar |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google book search |
520 3# - SUMMARY, ETC. |
Summary, etc. |
The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over the years. We also discuss some of the most promising research directions in these fields. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Also available in print. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Title from PDF title page (viewed on January 13, 2014). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Online social networks |
General subdivision |
Security measures. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
online social networks |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
security |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
trust |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
controlled information sharing |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
online identity management |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Ferrari, Elena, |
Dates associated with a name |
1968-, |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Viviani, Marco., |
Relator term |
author. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
International Standard Book Number |
9781627052658 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis digital library of engineering and computer science. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis lectures on information security, privacy, and trust ; |
Volume/sequential designation |
# 8. |
International Standard Serial Number |
1945-9750 |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Abstract with links to resource |
Uniform Resource Identifier |
http://ieeexplore.ieee.org/servlet/opac?bknumber=6813068 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Abstract with links to full text |
Uniform Resource Identifier |
http://dx.doi.org/10.2200/S00549ED1V01Y201311SPT008 |