Handbook of theoretical computer science (vol. B)
Flexible protocol specification and execution: applying event calculus planning using commitments
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2
NuSMV 2: An OpenSource Tool for Symbolic Model Checking
CAV '02 Proceedings of the 14th International Conference on Computer Aided Verification
Design and Synthesis of Synchronization Skeletons Using Branching-Time Temporal Logic
Logic of Programs, Workshop
On the leakage of personally identifiable information via online social networks
ACM SIGCOMM Computer Communication Review
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
On the verification of social commitments and time
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Privacy in Social Networks: How Risky is Your Social Graph?
ICDE '12 Proceedings of the 2012 IEEE 28th International Conference on Data Engineering
Specifying and Verifying Cross-Organizational Business Models: An Agent-Oriented Approach
IEEE Transactions on Services Computing
Hi-index | 0.00 |
As online social networks are becoming part of both social and work life, preserving privacy of their users is becoming tremendously difficult. While these social networks are promising privacy through privacy agreements, everyday new privacy leakages are emerging. Ideally, online social networks should be able to manage and maintain their agreements through well-founded methods. However, the dynamic nature of the online social networks is making it difficult to keep private information contained. We have developed PROTOSS, a run time tool for detecting privacy leakages in online social networks. PROTOSS captures relations among users, their privacy agreements with an online social network operator, and domain-based inference rules. It then uses model checking to detect if an online social network will leak private information.