메뉴 건너뛰기




Volumn , Issue , 2012, Pages 647-662

Social networking with frientegrity: Privacy and integrity with an untrusted provider

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MECHANISM; ENCRYPTED DATA; EXISTING SYSTEMS; PROTOTYPE IMPLEMENTATIONS; SERVICE PROVIDER; SOCIAL NETWORKING APPLICATIONS; SOCIAL NETWORKING SERVICES; SOCIAL NETWORKING SYSTEMS;

EID: 84990231617     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (34)

References (60)
  • 3
    • 79959904021 scopus 로고    scopus 로고
    • A security API for distributed social networks
    • Feb
    • M. Backes, M. Maffei, and K. Pecina. A security API for distributed social networks. In Proc. NDSS, Feb. 2011.
    • (2011) Proc. NDSS
    • Backes, M.1    Maffei, M.2    Pecina, K.3
  • 4
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore Art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography
    • May
    • L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore Art Thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In Proc. WWW, May 2007.
    • (2007) Proc. WWW
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.3
  • 6
    • 70450172971 scopus 로고    scopus 로고
    • Peerson: P2P social networking early experiences and insights
    • Mar
    • S. Buchegger, D. Schiöberg, L. hung Vu, and A. Datta. PeerSoN: P2P social networking early experiences and insights. In Proc. SNS, Mar. 2009.
    • (2009) Proc. SNS
    • Buchegger, S.1    Schiöberg, D.2    Hung Vu, L.3    Datta, A.4
  • 8
    • 85076234065 scopus 로고    scopus 로고
    • Privacy-aware collaborative access control in web-based social networks
    • July
    • B. Carminati and E. Ferrari. Privacy-aware collaborative access control in web-based social networks. In Proc. DBSec, July 2008.
    • (2008) Proc. DBSec
    • Carminati, B.1    Ferrari, E.2
  • 11
    • 84868365803 scopus 로고    scopus 로고
    • Efficient data structures for tamper-evident logging
    • Aug
    • S. A. Crosby and D. S. Wallach. Efficient data structures for tamper-evident logging. In Proc. USENIX Security, Aug. 2009.
    • (2009) Proc. USENIX Security
    • Crosby, S.A.1    Wallach, D.S.2
  • 12
    • 81855197021 scopus 로고    scopus 로고
    • Super-efficient aggregating history-independent persistent authenticated dictionaries
    • Sept
    • S. A. Crosby and D. S. Wallach. Super-efficient aggregating history-independent persistent authenticated dictionaries. In Proc. ESORICS, Sept. 2009.
    • (2009) Proc. ESORICS
    • Crosby, S.A.1    Wallach, D.S.2
  • 14
    • 72949088489 scopus 로고    scopus 로고
    • Safebook: A privacy-preserving online social network leveraging on real-life trust
    • Dec
    • L. A. Cutillo, R. Molva, T. Strufe, and T. Darmstadt. Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine, 47(12):94–101, Dec. 2009.
    • (2009) IEEE Communications Magazine , vol.47 , Issue.12 , pp. 94-101
    • Cutillo, L.A.1    Molva, R.2    Strufe, T.3    Darmstadt, T.4
  • 17
    • 84876564875 scopus 로고    scopus 로고
    • Retrieved April 23, 2012
    • Diaspora. Diaspora project. http://diasporaproject.org/. Retrieved April 23, 2012.
    • Diaspora Project
  • 18
    • 52049126397 scopus 로고    scopus 로고
    • Privacy homomorphisms for social networks with private relationships
    • Oct
    • J. Domingo-Ferrer, A. Viejo, F. Sebé, and írsula González-Nicolás. Privacy homomorphisms for social networks with private relationships. Computer Networks, 52:3007–3016, Oct. 2008.
    • (2008) Computer Networks , vol.52 , pp. 3007-3016
    • Domingo-Ferrer, J.1    Viejo, A.2    Sebé, F.3    González-Nicolás, Í.4
  • 19
    • 84865959860 scopus 로고    scopus 로고
    • Nov
    • Facebook, Inc. Anatomy of facebook. http://www.facebook.com/notes/facebook-data-team/ anatomy-of-facebook/10150388519243859, Nov. 2011.
    • (2011) Anatomy of Facebook
  • 20
    • 27844600056 scopus 로고    scopus 로고
    • Retrieved April 23, 2012
    • Facebook, Inc. Fact sheet. http://newsroom.fb.com/content/default.aspx?NewsAreaId=22. Retrieved April 23, 2012.
    • Fact Sheet
  • 22
    • 85076213824 scopus 로고    scopus 로고
    • Feb
    • Flickr. Flickr phantom photos. http://flickr.com/help/forum/33657/, Feb. 2007.
    • (2007) Flickr Phantom Photos
  • 24
    • 84897594546 scopus 로고    scopus 로고
    • Retrieved April 23, 2012
    • Google, Inc. Transparency report. https://www.google.com/transparencyreport/ governmentrequests/userdata/. Retrieved April 23, 2012.
    • Transparency Report
  • 25
    • 70249088359 scopus 로고    scopus 로고
    • Noyb: Privacy in online social networks
    • Aug
    • S. Guha, K. Tang, and P. Francis. NOYB: Privacy in online social networks. In Proc. WOSN, Aug. 2008.
    • (2008) Proc. WOSN
    • Guha, S.1    Tang, K.2    Francis, P.3
  • 26
    • 84943299684 scopus 로고    scopus 로고
    • Privad: Practical privacy in online advertising
    • Mar
    • S. Guha, B. Cheng, and P. Francis. Privad: Practical privacy in online advertising. In Proc. NSDI, Mar. 2011.
    • (2011) Proc. NSDI
    • Guha, S.1    Cheng, B.2    Francis, P.3
  • 27
    • 0025460579 scopus 로고
    • Linearizability: A correctness condition for concurrent objects
    • M. P. Herlihy and J. M. Wing. Linearizability: A correctness condition for concurrent objects. ACM TOPLAS, 12 (3), 1990.
    • (1990) ACM TOPLAS , vol.12 , Issue.3
    • Herlihy, M.P.1    Wing, J.M.2
  • 28
    • 79956030125 scopus 로고    scopus 로고
    • Easier: Encryption-based access control in social networks with efficient revocation
    • Mar
    • S. Jahid, P. Mittal, and N. Borisov. EASiER: Encryption-based access control in social networks with efficient revocation. In Proc. ASIACCS, Mar. 2011.
    • (2011) Proc. ASIACCS
    • Jahid, S.1    Mittal, P.2    Borisov, N.3
  • 29
    • 84871313494 scopus 로고    scopus 로고
    • Decent: A decentralized architecture for enforcing privacy in online social networks
    • Mar
    • S. Jahid, S. Nilizadeh, P. Mittal, N. Borisov, and A. Kapadia. DECENT: A decentralized architecture for enforcing privacy in online social networks. In Proc. SESOC, Mar. 2012.
    • (2012) Proc. SESOC
    • Jahid, S.1    Nilizadeh, S.2    Mittal, P.3    Borisov, N.4    Kapadia, A.5
  • 30
    • 0002130821 scopus 로고    scopus 로고
    • Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web
    • May
    • D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, and R. Panigrahy. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web. In Proc. STOC, May 1997.
    • (1997) Proc. STOC
    • Karger, D.1    Lehman, E.2    Leighton, T.3    Levine, M.4    Lewin, D.5    Panigrahy, R.6
  • 31
    • 0032058184 scopus 로고    scopus 로고
    • The part-time parliament
    • L. Lamport. The part-time parliament. ACM TOCS, 16(2): 133–169, 1998.
    • (1998) ACM TOCS , vol.16 , Issue.2 , pp. 133-169
    • Lamport, L.1
  • 32
    • 57349111694 scopus 로고    scopus 로고
    • Planetary-scale views on a large instant-messaging network
    • Apr
    • J. Leskovec and E. Horvitz. Planetary-scale views on a large instant-messaging network. In Proc. WWW, Apr. 2008.
    • (2008) Proc. WWW
    • Leskovec, J.1    Horvitz, E.2
  • 33
    • 85094320125 scopus 로고    scopus 로고
    • Beyond one-third faulty replicas in Byzantine fault tolerant systems
    • Apr
    • J. Li and D. Mazières. Beyond one-third faulty replicas in Byzantine fault tolerant systems. In Proc. NSDI, Apr. 2007.
    • (2007) Proc. NSDI
    • Li, J.1    Mazières, D.2
  • 36
    • 80053467972 scopus 로고    scopus 로고
    • EXo: Decentralized autonomous scalable social networking
    • Jan
    • A. Loupasakis, N. Ntarmos, and P. Triantafillou. eXO: Decentralized autonomous scalable social networking. In Proc. CIDR, Jan. 2011.
    • (2011) Proc. CIDR
    • Loupasakis, A.1    Ntarmos, N.2    Triantafillou, P.3
  • 37
    • 70449667273 scopus 로고    scopus 로고
    • Flybynight: Mitigating the privacy risks of social networking
    • Oct
    • M. M. Lucas and N. Borisov. flyByNight: mitigating the privacy risks of social networking. In Proc. WPES, Oct. 2008.
    • (2008) Proc. WPES
    • Lucas, M.M.1    Borisov, N.2
  • 39
    • 21844454934 scopus 로고    scopus 로고
    • Building secure file systems out of byzantine storage
    • July
    • D. Mazières and D. Shasha. Building secure file systems out of byzantine storage. In Proc. PODC, July 2002.
    • (2002) Proc. PODC
    • Mazières, D.1    Shasha, D.2
  • 40
    • 85076232687 scopus 로고    scopus 로고
    • Facebook scrambles to fix security hole exposing private pictures
    • Dec
    • J. P. Mello. Facebook scrambles to fix security hole exposing private pictures. PC World, Dec. 2011.
    • (2011) PC World
    • Mello, J.P.1
  • 41
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • R. C. Merkle. A digital signature based on a conventional encryption function. CRYPTO, pages 369–378, 1987.
    • (1987) CRYPTO , pp. 369-378
    • Merkle, R.C.1
  • 42
  • 45
    • 80055029821 scopus 로고    scopus 로고
    • Birds of a fethr: Open, decentralized micropublishing
    • Apr
    • D. R. Sandler and D. S. Wallach. Birds of a FETHR: Open, decentralized micropublishing. In Proc. IPTPS, Apr. 2009.
    • (2009) Proc. IPTPS
    • Sandler, D.R.1    Wallach, D.S.2
  • 47
    • 85076202626 scopus 로고    scopus 로고
    • Watch out who you reply to on google buzz, you might be exposing their email address
    • Feb
    • E. Schonfeld. Watch out who you reply to on google buzz, you might be exposing their email address. TechCrunch, Feb. 2010.
    • (2010) TechCrunch
    • Schonfeld, E.1
  • 54
    • 77953298166 scopus 로고    scopus 로고
    • A privacy-preserving scheme for online social networks with efficient revocation
    • Mar
    • J. Sun, X. Zhu, and Y. Fang. A privacy-preserving scheme for online social networks with efficient revocation. In Proc. INFOCOM, Mar. 2010.
    • (2010) Proc. INFOCOM
    • Sun, J.1    Zhu, X.2    Fang, Y.3
  • 58
    • 33947317857 scopus 로고    scopus 로고
    • Retrieved April 23, 2012
    • D. Wheeler. SLOCCount. http://www.dwheeler.com/sloccount/. Retrieved April 23, 2012.
    • SLOCCount
    • Wheeler, D.1
  • 59
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. IEEE/ACM TON, 8(1): 16–30, 1998.
    • (1998) IEEE/ACM TON , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.