IEEE Intelligent Systems
An algorithmic approach to social networks
An algorithmic approach to social networks
Computer
Rule-Based access control for social networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Towards the next generation of computational trust and reputation models
MDAI'06 Proceedings of the Third international conference on Modeling Decisions for Artificial Intelligence
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
On reliability indices of communication networks
Computers & Mathematics with Applications
Weighted network decapitation: the economics of iterated attack and defense
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
Key allocation schemes for private social networks
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
The Functionality-Security-Privacy Game
MDAI '09 Proceedings of the 6th International Conference on Modeling Decisions for Artificial Intelligence
Using social networks to distort users' profiles generated by web search engines
Computer Networks: The International Journal of Computer and Telecommunications Networking
A privacy-preserving scheme for online social networks with efficient revocation
INFOCOM'10 Proceedings of the 29th conference on Information communications
TRIMS, a privacy-aware trust and reputation model for identity management systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Coprivacy: towards a theory of sustainable privacy
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Rational privacy disclosure in social networks
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the first ACM conference on Data and application security and privacy
Information fusion in data privacy: A survey
Information Fusion
Social networking with frientegrity: privacy and integrity with an untrusted provider
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Keeping identity secret in online social networks
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Using community structure to control information sharing in online social networks
Computer Communications
Hi-index | 0.00 |
Enabling private relationships in social networks is an important issue recently raised in the literature. We describe in this paper a new protocol which offers private relationships allowing resource access through indirect relationships without requiring a mediating trusted third party (although an optimistic trusted third party is used which only acts in case of conflict). Thanks to homomorphic encryption, our scheme prevents the resource owner from learning the relationships and trust levels between the users who collaborate in the resource access. In this way, the number of users who might refuse collaboration due to privacy concerns is minimized. This results in increased resource availability, as the chances that certain nodes become isolated at a given period of time are reduced. Empirical evidence is provided about the proposed protocol being scalable and deployable in practical social networks.