Security and Privacy in Mobile Social Networks

Security and Privacy in Mobile Social Networks
Author: Xiaohui Liang,Rongxing Lu,Xiaodong Lin,Xuemin Shen
Publsiher: Springer Science & Business Media
Total Pages: 106
Release: 2013-10-12
Genre: Computers
ISBN: 9781461488576

Download Security and Privacy in Mobile Social Networks Book in PDF, Epub and Kindle

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Security and Privacy Preserving in Social Networks

Security and Privacy Preserving in Social Networks
Author: Richard Chbeir,Bechara Al Bouna
Publsiher: Springer Science & Business Media
Total Pages: 373
Release: 2013-10-17
Genre: Computers
ISBN: 9783709108949

Download Security and Privacy Preserving in Social Networks Book in PDF, Epub and Kindle

This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field. A wide range of interdisciplinary contributions from various research groups ensures for a balanced and complete perspective.

Security and Privacy in Social Networks

Security and Privacy in Social Networks
Author: Yaniv Altshuler,Yuval Elovici,Armin B. Cremers,Nadav Aharony,Alex Pentland
Publsiher: Springer Science & Business Media
Total Pages: 254
Release: 2012-08-14
Genre: Computers
ISBN: 9781461441397

Download Security and Privacy in Social Networks Book in PDF, Epub and Kindle

Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.

Handbook of Research on Cloud Computing and Big Data Applications in IoT

Handbook of Research on Cloud Computing and Big Data Applications in IoT
Author: Gupta, B. B.,Agrawal, Dharma P.
Publsiher: IGI Global
Total Pages: 609
Release: 2019-04-12
Genre: Computers
ISBN: 9781522584087

Download Handbook of Research on Cloud Computing and Big Data Applications in IoT Book in PDF, Epub and Kindle

Today, cloud computing, big data, and the internet of things (IoT) are becoming indubitable parts of modern information and communication systems. They cover not only information and communication technology but also all types of systems in society including within the realms of business, finance, industry, manufacturing, and management. Therefore, it is critical to remain up-to-date on the latest advancements and applications, as well as current issues and challenges. The Handbook of Research on Cloud Computing and Big Data Applications in IoT is a pivotal reference source that provides relevant theoretical frameworks and the latest empirical research findings on principles, challenges, and applications of cloud computing, big data, and IoT. While highlighting topics such as fog computing, language interaction, and scheduling algorithms, this publication is ideally designed for software developers, computer engineers, scientists, professionals, academicians, researchers, and students.

Computational Social Networks

Computational Social Networks
Author: Ajith Abraham
Publsiher: Springer Science & Business Media
Total Pages: 352
Release: 2012-08-14
Genre: Computers
ISBN: 9781447140511

Download Computational Social Networks Book in PDF, Epub and Kindle

This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

Vehicular Social Networks

Vehicular Social Networks
Author: Anna Maria Vegni,Valeria Loscrì,Athanasios V. Vasilakos
Publsiher: CRC Press
Total Pages: 192
Release: 2017-03-31
Genre: Technology & Engineering
ISBN: 9781498749206

Download Vehicular Social Networks Book in PDF, Epub and Kindle

The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.

Research Anthology on Securing Mobile Technologies and Applications

Research Anthology on Securing Mobile Technologies and Applications
Author: Management Association, Information Resources
Publsiher: IGI Global
Total Pages: 837
Release: 2021-02-05
Genre: Technology & Engineering
ISBN: 9781799886013

Download Research Anthology on Securing Mobile Technologies and Applications Book in PDF, Epub and Kindle

Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.

Security and Privacy in Communication Networks

Security and Privacy in Communication Networks
Author: Xiaodong Lin,Ali Ghorbani,Kui Ren,Sencun Zhu,Aiqing Zhang
Publsiher: Springer
Total Pages: 339
Release: 2018-04-24
Genre: Computers
ISBN: 9783319788166

Download Security and Privacy in Communication Networks Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more.The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.