메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Preserving Link Privacy in Social Network Based Systems

Author keywords

[No Author keywords available]

Indexed keywords

% REDUCTIONS; GROWING BODIES; LINK PRIVACIES; NETWORK BASED SYSTEMS; NETWORK-BASED; REAL-WORLD; SECURE SYSTEM; SENSITIVE INFORMATIONS; SOCIAL GRAPHS; TRUST RELATIONSHIP;

EID: 85180405994     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (59)

References (39)
  • 2
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
    • L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, 2007.
    • (2007) WWW
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.3
  • 5
    • 84887074866 scopus 로고    scopus 로고
    • Drac: an architecture for anonymous low-volume communications
    • G. Danezis, C. Diaz, C. Troncoso, and B. Laurie. Drac: an architecture for anonymous low-volume communications. In PETS, 2010.
    • (2010) PETS
    • Danezis, G.1    Diaz, C.2    Troncoso, C.3    Laurie, B.4
  • 6
    • 85180633166 scopus 로고    scopus 로고
    • Sybilinfer: Detecting Sybil nodes using social networks
    • G. Danezis and P. Mittal. Sybilinfer: Detecting Sybil nodes using social networks. In NDSS, 2009.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 8
    • 4544304744 scopus 로고    scopus 로고
    • The Sybil Attack
    • J. Douceur. The Sybil Attack. In IPTPS, 2002.
    • (2002) IPTPS
    • Douceur, J.1
  • 9
    • 67650655439 scopus 로고    scopus 로고
    • Differential privacy: a survey of results
    • C. Dwork. Differential privacy: a survey of results. In TAMC, 2008.
    • (2008) TAMC
    • Dwork, C.1
  • 10
    • 77956890234 scopus 로고
    • Monte carlo sampling methods using markov chains and their applications
    • W. K. Hastings. Monte carlo sampling methods using markov chains and their applications. Biometrika, 57(1), 1970.
    • (1970) Biometrika , vol.57 , Issue.1
    • Hastings, W. K.1
  • 11
    • 84859194833 scopus 로고    scopus 로고
    • Resisting structural re-identification in anonymized social networks
    • M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow., 1(1), 2008.
    • (2008) Proc. VLDB Endow , vol.1 , Issue.1
    • Hay, M.1    Miklau, G.2    Jensen, D.3    Towsley, D.4    Weis, P.5
  • 14
    • 84863903676 scopus 로고    scopus 로고
    • Whanaungatanga: A Sybil-proof distributed hash table
    • C. Lesniewski-Laas and M. F. Kaashoek. Whanaungatanga: A Sybil-proof distributed hash table. In NSDI, 2010.
    • (2010) NSDI
    • Lesniewski-Laas, C.1    Kaashoek, M. F.2
  • 15
    • 57149126815 scopus 로고    scopus 로고
    • Towards identity anonymization on graphs
    • K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, 2008.
    • (2008) SIGMOD
    • Liu, K.1    Terzi, E.2
  • 16
    • 85045322914 scopus 로고    scopus 로고
    • Fast identity anonymization on graphs
    • X. Lu, Y. Song, and S. Bressan. Fast identity anonymization on graphs. In DEXA, 2012.
    • (2012) DEXA
    • Lu, X.1    Song, Y.2    Bressan, S.3
  • 19
    • 80054703857 scopus 로고    scopus 로고
    • Ostra: leveraging trust to thwart unwanted communication
    • A. Mislove, A. Post, P. Druschel, and K. P. Gummadi. Ostra: leveraging trust to thwart unwanted communication. In NSDI, 2008.
    • (2008) NSDI
    • Mislove, A.1    Post, A.2    Druschel, P.3    Gummadi, K. P.4
  • 21
    • 85180747396 scopus 로고    scopus 로고
    • X-vine: Secure and pseudonymous routing using social networks
    • P. Mittal, M. Caesar, and N. Borisov. X-vine: Secure and pseudonymous routing using social networks. In NDSS, 2012.
    • (2012) NDSS
    • Mittal, P.1    Caesar, M.2    Borisov, N.3
  • 22
    • 85026514688 scopus 로고    scopus 로고
    • Pisces: Anonymous communication using social networks
    • P. Mittal, M. Wright, and N. Borisov. Pisces: Anonymous communication using social networks. In NDSS, 2013.
    • (2013) NDSS
    • Mittal, P.1    Wright, M.2    Borisov, N.3
  • 23
    • 79960871268 scopus 로고    scopus 로고
    • Keep your friends close: Incorporating trust into social network-based sybil defenses
    • A. Mohaisen, N. Hopper, and Y. Kim. Keep your friends close: Incorporating trust into social network-based sybil defenses. In INFOCOM, 2011.
    • (2011) INFOCOM
    • Mohaisen, A.1    Hopper, N.2    Kim, Y.3
  • 24
    • 78650907130 scopus 로고    scopus 로고
    • Measuring the mixing time of social graphs
    • A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. In IMC, 2010.
    • (2010) IMC
    • Mohaisen, A.1    Yun, A.2    Kim, Y.3
  • 25
    • 84877951088 scopus 로고    scopus 로고
    • Anonymity in the wild: mixes on unstructured networks
    • S. Nagaraja. Anonymity in the wild: mixes on unstructured networks. In PETS, 2007.
    • (2007) PETS
    • Nagaraja, S.1
  • 28
    • 70350635777 scopus 로고    scopus 로고
    • Relationship privacy: output perturbation for queries with joins
    • V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, 2009.
    • (2009) PODS
    • Rastogi, V.1    Hay, M.2    Miklau, G.3    Suciu, D.4
  • 29
    • 82955196835 scopus 로고    scopus 로고
    • Sharing graphs using differentially private graph models
    • A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao. Sharing graphs using differentially private graph models. In IMC, 2011.
    • (2011) IMC
    • Sala, A.1    Zhao, X.2    Wilson, C.3    Zheng, H.4    Zhao, B. Y.5
  • 31
    • 79960849345 scopus 로고    scopus 로고
    • Optimal sybil-resilient node admission control
    • N. Tran, J. Li, L. Subramanian, and S. Chow. Optimal sybil-resilient node admission control. In INFOCOM, 2011.
    • (2011) INFOCOM
    • Tran, N.1    Li, J.2    Subramanian, L.3    Chow, S.4
  • 34
    • 57149134039 scopus 로고    scopus 로고
    • Randomizing social networks: a spectrum preserving approach
    • X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In SDM, 2008.
    • (2008) SDM
    • Ying, X.1    Wu, X.2
  • 35
    • 70449694823 scopus 로고    scopus 로고
    • Sybillimit: A near-optimal social network defense against Sybil attacks
    • H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against Sybil attacks. In IEEE S&P, 2008.
    • (2008) IEEE S&P
    • Yu, H.1    Gibbons, P. B.2    Kaminsky, M.3    Xiao, F.4
  • 36
    • 35548992569 scopus 로고    scopus 로고
    • SybilGuard: Defending against Sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman. SybilGuard: Defending against Sybil attacks via social networks. In SIGCOMM, 2006.
    • (2006) SIGCOMM
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.3    Flaxman, A.4
  • 37
    • 67650219221 scopus 로고    scopus 로고
    • Preserving the privacy of sensitive relationships in graph data
    • E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. In PinKDD, 2008.
    • (2008) PinKDD
    • Zheleva, E.1    Getoor, L.2
  • 38
    • 52649120205 scopus 로고    scopus 로고
    • Preserving privacy in social networks against neighborhood attacks
    • B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, 2008.
    • (2008) ICDE
    • Zhou, B.1    Pei, J.2
  • 39
    • 79959532187 scopus 로고    scopus 로고
    • The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks
    • B. Zhou and J. Pei. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst., 28(1), 2011.
    • (2011) Knowl. Inf. Syst , vol.28 , Issue.1
    • Zhou, B.1    Pei, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.