Review: Pervasive computing at scale: Transforming the state of the art
Pervasive and Mobile Computing
Game theoretic attack analysis in online social network (OSN) services
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Detecting and predicting privacy violations in online social networks
Distributed and Parallel Databases
Hi-index | 0.00 |
Online social networks routinely publish data of interest to third parties, but in so doing often reveal relationships, such as a friendship or contractual association, that an attacker can exploit. This systematic look at existing privacy-preservation techniques highlights the vulnerabilities of users even in networks that completely anonymize identities. Through a taxonomy that categorizes techniques according to the degree of user identity exposure, the authors examine the ways that existing approaches compromise relation privacy and offer more secure alternatives.