Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
Detecting and characterizing social spam campaigns
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
unfriendly: multi-party privacy risks in social networks
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
A risk management process for consumers: the next step in information security
Proceedings of the 2010 workshop on New security paradigms
Virtual private social networks
Proceedings of the first ACM conference on Data and application security and privacy
EASiER: encryption-based access control in social networks with efficient revocation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
All liaisons are dangerous when all your friends are known to us
Proceedings of the 22nd ACM conference on Hypertext and hypermedia
Scramble! your social network data
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Trend analysis and recommendation of users' privacy settings on social networking services
SocInfo'11 Proceedings of the Third international conference on Social informatics
SudoWeb: minimizing information disclosure to third parties in single sign-on platforms
ISC'11 Proceedings of the 14th international conference on Information security
Preserving privacy in online social networks
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
PoX: Protecting users from malicious Facebook applications
Computer Communications
Privacy-preserving social plugins
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Timed revocation of user data: long expiration times from existing infrastructure
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Preventing automatic user profiling in Web 2.0 applications
Knowledge-Based Systems
Follow you follow me: using location tracking to mitigate multi-device privacy threats
Proceedings of the Workshop on Multi-device App Middleware
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Using profiling techniques to protect the user's privacy in twitter
MDAI'12 Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence
For some eyes only: protecting online information sharing
Proceedings of the third ACM conference on Data and application security and privacy
Private friends on a social networking site operated by an overly curious SNP
NSS'12 Proceedings of the 6th international conference on Network and System Security
Appinspect: large-scale evaluation of social networking apps
Proceedings of the first ACM conference on Online social networks
Virtual private social networks and a facebook implementation
ACM Transactions on the Web (TWEB)
Crypto-Book: an architecture for privacy preserving online identities
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
CP2: Cryptographic privacy protection framework for online social networks
Computers and Electrical Engineering
Relationship-based information sharing in cloud-based decentralized social networks
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. We propose FaceCloak, an architecture that protects user privacy on a social networking site by shielding a user's personal information from the site and from other users that were not explicitly authorized by the user. At the same time, FaceCloak seamlessly maintains usability of the site's services. FaceCloak achieves these goals by providing fake information to the social networking site and by storing sensitive information in encrypted form on a separate server. We implemented our solution as a Firefox browser extension for the Facebook platform. Our experiments show that our solution successfully conceals a user's personal information, while allowing the user and her friends to explore Facebook pages and services as usual.