1 |
Muthucumaru Maheswaran, Hong Cheong Tang, and Ahmad Ghunaim, "Towards a Gravity-Based Trust Model for Social Networking Systems," 27th International Conference on Distributed Computing Systems Workshops(ICDCSW'07), pp. 24-31, Jun. 2007.
|
2 |
Francis Fukuyama, Trust : The social virtues and the creation of prosperity, Free Press Paperbacks, 1230 Avenue of the Americas New York, Jun. 1996.
|
3 |
윤택영, 홍도원, "소셜 네트워크 서비스에서 사용자 연락정보 프라이버시 강화를 위한 개인 프로필 관리 시스템 연구," 정보보호학회논문지, 21(5), pp. 141-148, 2011년 10월.
|
4 |
Bimal viswanath, Ansley Post, Krishna P. Gummadi and Alan Mislove, "An Analysis of Social Network-Based Sybil Defenses," Proceedings of the ACM SIGCOMM 2010 Conference, pp. 363-374, Aug. 2010.
|
5 |
Anna Squicciarini, Federica Paci and Smitha Sundareswaran, "PriMa : An Effective Privacy Protection Mechanism for Social Networks," Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 320-323, Apr. 2010.
|
6 |
Wei Wei, Fengyuan Xu, Chiu C. Tan and Qun Li, "SybilDefender: Defend Against Sybil Attacks in Large Social Networks," 2012 Proceedings IEEE INFOCOM, pp. 1951-1959, Mar. 2012.
|
7 |
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons and Abraham Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks," Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 267-278, Sep. 2006.
|
8 |
Sonja Buchegger, Doris Schioberg, Le-Hung Vu and Anwitaman Datta, "PeerSoN: P2P Social Networking: Early Experiences and Insights," Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pp. 46-52, Mar. 2009.
|
9 |
Jeawook Jung, Hakhyun Kim, Jaesung You, Changbin Lee, Seungjoo Kim and Dongho Won, "Construction of a Privacy Preserving Mobile Social Networking Service," Proceedings of IT Convergence and Services 2011, pp. 251-261, Oct. 2011.
|
10 |
성기훈, 공희경, 김태한, "AHP를 이용한 SNS 정보보호 위협요인 분석," 정보보호학회논문지, 20(6), 2010년 12월.
|
11 |
Weimin Luo, Jingbo Liu, Jing Liu and Chengyu Fan, "An Analysis of Security in Social Networks," 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 648-651, Dec. 2009.
|
12 |
윤택영, 홍도원, "소셜 네트워크 서비스 신뢰성 강화 기술 동향," 전자통신동향분석, 26(4), pp. 134-145, 2011년 8월.
|
13 |
Hanjae Jeong, Changbin Lee, Jin Kwak, Dongho Won, Changyoung Kwon and Seungjoo Kim, "Privacy-enhanced social network service (SNS)," The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, Dec. 2011.
|
14 |
Donghee Shin, "The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption," Interacting with Computers, vol. 22, no. 5, pp. 428-438, Sep. 2010.
DOI
ScienceOn
|
15 |
Hanjae Jeong, "Hash-based Key Management Architectures for Social Networks Services," Ph.D. Thesis, Sungkyunkwan University, Apr. 2011.
|
16 |
Maha Faisal and Asmaa Alsumait, "Social Network Privacy and Trust Concerns," Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services, pp. 416-419, Dec. 2011.
|