IEEE Intelligent Systems
Trust evaluation through relationship analysis
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Private Relationships in Social Networks
ICDEW '07 Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering Workshop
Rule-Based access control for social networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Towards the next generation of computational trust and reputation models
MDAI'06 Proceedings of the Third international conference on Modeling Decisions for Artificial Intelligence
Privacy-Preserving Relationship Path Discovery in Social Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Using social networks to distort users' profiles generated by web search engines
Computer Networks: The International Journal of Computer and Telecommunications Networking
SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Exploiting social networks to provide privacy in personalized web search
Journal of Systems and Software
Hi-index | 0.00 |
The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks deal with the protection of resources and data, i.e.with deciding whether access to resources and data held by a user (owner) should be granted to a requesting user (requestor). However, the relationships between users are also sensitive and need protection: knowing who is trusted by a user and to what extent leaks a lot of confidential information about that user. The use of symmetric key cryptography to implement private relationships in social networks has recently been proposed. We show in this paper how to use public-key cryptography to reduce the overhead caused by private relationships.