The design philosophy of the DARPA internet protocols
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
ACM Transactions on Information and System Security (TISSEC)
King: estimating latency between arbitrary internet end hosts
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Secure attribute-based systems
Proceedings of the 13th ACM conference on Computer and communications security
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Detecting format string vulnerabilities with type qualifiers
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Challenges in mining social network data: processes, privacy, and paradoxes
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Panorama: capturing system-wide information flow for malware detection and analysis
Proceedings of the 14th ACM conference on Computer and communications security
Growth of the flickr social network
Proceedings of the first workshop on Online social networks
Poking facebook: characterization of osn applications
Proceedings of the first workshop on Online social networks
Characterizing privacy in online social networks
Proceedings of the first workshop on Online social networks
Lockr: social access control for web 2.0
Proceedings of the first workshop on Online social networks
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
FlyByNight: mitigating the privacy risks of social networking
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Link privacy in social networks
Proceedings of the 17th ACM conference on Information and knowledge management
A measure of online social networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Multi-authority attribute based encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Inferring privacy information from social networks
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Privacy-Preserving Relationship Path Discovery in Social Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Preserving privacy in location-based mobile social applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
PrPl: a decentralized social networking infrastructure
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
A privacy-preserving scheme for online social networks with efficient revocation
INFOCOM'10 Proceedings of the 29th conference on Information communications
Cuckoo: towards decentralized, socio-aware online microblogging services and data measurements
Proceedings of the 2nd ACM International Workshop on Hot Topics in Planet-scale Measurement
Privacy-preserving P2P data sharing with OneSwarm
Proceedings of the ACM SIGCOMM 2010 conference
SPac: a distributed, peer-to-peer, secure and privacy-aware social space
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Detecting and characterizing social spam campaigns
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Large scale rich media information search
PCM'10 Proceedings of the Advances in multimedia information processing, and 11th Pacific Rim conference on Multimedia: Part II
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
Towards a secure rendezvous network for future publish/subscribe architectures
FIS'10 Proceedings of the Third future internet conference on Future internet
Virtual private social networks
Proceedings of the first ACM conference on Data and application security and privacy
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
EASiER: encryption-based access control in social networks with efficient revocation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
LoKI: location-based PKI for social networks
Proceedings of the ACM SIGCOMM 2011 conference
Exploiting vulnerability to secure user privacy on a social networking site
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Prometheus: user-controlled P2P social data management for socially-aware applications
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Silverline: toward data confidentiality in storage-intensive cloud applications
Proceedings of the 2nd ACM Symposium on Cloud Computing
Mailbook: privacy-protecting social networking via email
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
Analyzing facebook privacy settings: user expectations vs. reality
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Privacy challenges in the online social networking era
Proceedings of the 8th Middleware Doctoral Symposium
FORPS: friends-oriented reputation privacy score
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
Boundary regulation in social media
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Towards robust and scalable peer-to-peer social networks
Proceedings of the Fifth Workshop on Social Network Systems
Privacy, availability and economics in the Polaris mobile social network
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Confidant: protecting OSN data without locking it up
Middleware'11 Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware
Preserving privacy in online social networks
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Fast track article: Balancing behavioral privacy and information utility in sensory data flows
Pervasive and Mobile Computing
Privacy supporting cloud computing: confichair, a case study
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Fine-grained access control of personal data
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
TrustSplit: usable confidentiality for social network messaging
Proceedings of the 23rd ACM conference on Hypertext and social media
Cryptographic treatment of private user profiles
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Social networking with frientegrity: privacy and integrity with an untrusted provider
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Exploring decentralization dimensions of social networking services: adversaries and availability
Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research
Cachet: a decentralized architecture for privacy preserving social networking with caching
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Confidant: protecting OSN data without locking it up
Proceedings of the 12th International Middleware Conference
Keeping identity secret in online social networks
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Enabling private conversations on Twitter
Proceedings of the 28th Annual Computer Security Applications Conference
Flexible attribute-based encryption
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
For some eyes only: protecting online information sharing
Proceedings of the third ACM conference on Data and application security and privacy
Private friends on a social networking site operated by an overly curious SNP
NSS'12 Proceedings of the 6th international conference on Network and System Security
Masque: access control for interactive sharing of encrypted data in social networks
NSS'12 Proceedings of the 6th international conference on Network and System Security
Pervasive and Mobile Computing
Mosaic: quantifying privacy leakage in mobile networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
Mobile Networks and Applications
Building confederated web-based services with Priv.io
Proceedings of the first ACM conference on Online social networks
Virtual private social networks and a facebook implementation
ACM Transactions on the Web (TWEB)
Tolerating business failures in hosted applications
Proceedings of the 4th annual Symposium on Cloud Computing
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Supporting Social Networks With Agent-Based Services
International Journal of Virtual Communities and Social Networking
CP2: Cryptographic privacy protection framework for online social networks
Computers and Electrical Engineering
Relationship-based information sharing in cloud-based decentralized social networks
Proceedings of the 4th ACM conference on Data and application security and privacy
Using community structure to control information sharing in online social networks
Computer Communications
Detecting and predicting privacy violations in online social networks
Distributed and Parallel Databases
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation
Journal of Computer Security
Shroud: ensuring private access to large-scale data in the data center
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Privacy-supporting cloud computing by in-browser key translation
Journal of Computer Security - Security and Trust Principles
ipShield: a framework for enforcing context-aware privacy
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.00 |
Online social networks (OSNs) are immensely popular, with some claiming over 200 million users. Users share private content, such as personal information or photographs, using OSN applications. Users must trust the OSN service to protect personal information even as the OSN provider benefits from examining and sharing that information. We present Persona, an OSN where users dictate who may access their information. Persona hides user data with attribute-based encryption (ABE), allowing users to apply fine-grained policies over who may view their data. Persona provides an effective means of creating applications in which users, not the OSN, define policy over access to private data. We demonstrate new cryptographic mechanisms that enhance the general applicability of ABE. We show how Persona provides the functionality of existing online social networks with additional privacy benefits. We describe an implementation of Persona that replicates Facebook applications and show that Persona provides acceptable performance when browsing privacy-enhanced web pages, even on mobile devices.