Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Antisocial Networks: Turning a Social Network into a Botnet
ISC '08 Proceedings of the 11th international conference on Information Security
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
PeerSoN: P2P social networking: early experiences and insights
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
On the evolution of user interaction in Facebook
Proceedings of the 2nd ACM workshop on Online social networks
Prying Data out of a Social Network
ASONAM '09 Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining
Enforcing access control in Web-based social networks
ACM Transactions on Information and System Security (TISSEC)
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Privacy and security for online social networks: challenges and opportunities
IEEE Network: The Magazine of Global Internetworking
@spam: the underground on 140 characters or less
Proceedings of the 17th ACM conference on Computer and communications security
Social Networking Sites Security: Quo Vadis
SOCIALCOM '10 Proceedings of the 2010 IEEE Second International Conference on Social Computing
Proceedings of the 4th Workshop on Social Network Systems
Safebook: A privacy-preserving online social network leveraging on real-life trust
IEEE Communications Magazine
Hi-index | 0.00 |
While presently enjoying a tremendous popularity among Internet users, Online Social Network (OSN) platforms have also recently increasingly come under fire for a number of security (and privacy) issues stemming from their usage. In an attempt to somehow formalize the study of such issues, we propose in this paper a conceptual model of the workings of a "typical" OSN platform as experienced by its users, putting a distinct emphasis on the resources published through such platforms for the pivotal role they have come to occupy, notably in regard to misuses. We then briefly discuss potential applications of that model, not only as a support to assess security properties inherent to the configuration of current OSN platforms, but also as a tool to further investigate practical attack scenarios against those (and their users).