000 06398nam a2200685 i 4500
001 6813068
003 IEEE
005 20200413152913.0
006 m eo d
007 cr cn |||m|||a
008 140113s2014 cau foab 000 0 eng d
020 _a9781627052665
_qebook
020 _z9781627052658
_qpaperback
024 7 _a10.2200/S00549ED1V01Y201311SPT008
_2doi
035 _a(CaBNVSL)swl00403035
035 _a(OCoLC)868157010
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aHM742
_b.C277 2014
082 0 4 _a006.754
_223
090 _a
_bMoCl
_e201311SPT008
100 1 _aCarminati, Barbara.,
_eauthor.
245 1 0 _aSecurity and trust in online social networks /
_cBarbara Carminati, Elena Ferrari, and Marco Viviani.
264 1 _aSan Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
_bMorgan & Claypool,
_c2014.
300 _a1 PDF (ix, 110 pages)
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aSynthesis lectures on information security, privacy, & trust,
_x1945-9750 ;
_v# 8
538 _aMode of access: World Wide Web.
538 _aSystem requirements: Adobe Acrobat Reader.
500 _aPart of: Synthesis digital library of engineering and computer science.
500 _aSeries from website.
504 _aIncludes bibliographical references (pages 81-108).
505 0 _a1. Online social networks and security issues -- 1.1 Introduction -- 1.2 Social networks -- 1.2.1 The meaning of community -- 1.2.2 From offline to online communities -- 1.3 Online social networks -- 1.3.1 Evolution of online social networks -- 1.3.2 Analysis and properties -- 1.3.3 Multiple social ties and social capital -- 1.4 Security issues in online social networks -- 1.4.1 Trust management in online social networks -- 1.4.2 Controlled information sharing in online social networks -- 1.4.3 Identity management in online social networks --
505 8 _a2. Trust management in online social networks -- 2.1 Introduction -- 2.2 Trust in computer science -- 2.2.1 Trust and policies -- 2.2.2 Trust and reputation systems -- 2.3 Trust in online social networks -- 2.3.1 Trust properties -- 2.3.2 Trust components -- 2.3.3 Social trust and social capital -- 2.3.4 Trust evaluation models -- 2.4 Conclusions --
505 8 _a3. Controlled information sharing in online social networks -- 3.1 Introduction -- 3.2 Access control in data management systems -- 3.2.1 A brief historical perspective -- 3.2.2 Access control models -- 3.3 Access control in online social networks -- 3.3.1 Relationship-based access control -- 3.3.2 Privacy settings in commercial online social networks -- 3.3.3 Existing access control approaches -- 3.4 Conclusions --
505 8 _a4. Identity management in online social networks -- 4.1 Introduction -- 4.2 Identity management -- 4.2.1 Digital identity -- 4.2.2 Identity management models: from identity 1.0 to identity 2.0 -- 4.3 Identity management in online social networks -- 4.3.1 Identity as self-presentation -- 4.3.2 Identity disclosure -- 4.3.3 Identity theft -- 4.4 Conclusions --
505 8 _a5. Conclusions and further research directions -- 5.1 Open security issues in online social networks -- 5.1.1 Trust management -- 5.1.2 Controlled information sharing -- 5.1.3 Identity management -- Bibliography -- Authors' biography.
506 1 _aAbstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0 _aCompendex
510 0 _aINSPEC
510 0 _aGoogle scholar
510 0 _aGoogle book search
520 3 _aThe enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over the years. We also discuss some of the most promising research directions in these fields.
530 _aAlso available in print.
588 _aTitle from PDF title page (viewed on January 13, 2014).
650 0 _aOnline social networks
_xSecurity measures.
653 _aonline social networks
653 _asecurity
653 _atrust
653 _acontrolled information sharing
653 _aonline identity management
700 1 _aFerrari, Elena,
_d1968-,
_eauthor.
700 1 _aViviani, Marco.,
_eauthor.
776 0 8 _iPrint version:
_z9781627052658
830 0 _aSynthesis digital library of engineering and computer science.
830 0 _aSynthesis lectures on information security, privacy, and trust ;
_v# 8.
_x1945-9750
856 4 2 _3Abstract with links to resource
_uhttp://ieeexplore.ieee.org/servlet/opac?bknumber=6813068
856 4 0 _3Abstract with links to full text
_uhttp://dx.doi.org/10.2200/S00549ED1V01Y201311SPT008
999 _c562052
_d562052