Dynamic User Reliability Evaluation Scheme for Social Network Service |
Lee, Changhoon
(Information Security Group, Sungkyunkwan University)
Jung, Youngman (Information Security Group, Sungkyunkwan University) Jung, Jaewook (Information Security Group, Sungkyunkwan University) Won, Dongho (Information Security Group, Sungkyunkwan University) |
1 | Muthucumaru Maheswaran, Hong Cheong Tang, and Ahmad Ghunaim, "Towards a Gravity-Based Trust Model for Social Networking Systems," 27th International Conference on Distributed Computing Systems Workshops(ICDCSW'07), pp. 24-31, Jun. 2007. |
2 | Francis Fukuyama, Trust : The social virtues and the creation of prosperity, Free Press Paperbacks, 1230 Avenue of the Americas New York, Jun. 1996. |
3 | 윤택영, 홍도원, "소셜 네트워크 서비스에서 사용자 연락정보 프라이버시 강화를 위한 개인 프로필 관리 시스템 연구," 정보보호학회논문지, 21(5), pp. 141-148, 2011년 10월. |
4 | Bimal viswanath, Ansley Post, Krishna P. Gummadi and Alan Mislove, "An Analysis of Social Network-Based Sybil Defenses," Proceedings of the ACM SIGCOMM 2010 Conference, pp. 363-374, Aug. 2010. |
5 | Anna Squicciarini, Federica Paci and Smitha Sundareswaran, "PriMa : An Effective Privacy Protection Mechanism for Social Networks," Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 320-323, Apr. 2010. |
6 | Wei Wei, Fengyuan Xu, Chiu C. Tan and Qun Li, "SybilDefender: Defend Against Sybil Attacks in Large Social Networks," 2012 Proceedings IEEE INFOCOM, pp. 1951-1959, Mar. 2012. |
7 | Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons and Abraham Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks," Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 267-278, Sep. 2006. |
8 | Sonja Buchegger, Doris Schioberg, Le-Hung Vu and Anwitaman Datta, "PeerSoN: P2P Social Networking: Early Experiences and Insights," Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pp. 46-52, Mar. 2009. |
9 | Jeawook Jung, Hakhyun Kim, Jaesung You, Changbin Lee, Seungjoo Kim and Dongho Won, "Construction of a Privacy Preserving Mobile Social Networking Service," Proceedings of IT Convergence and Services 2011, pp. 251-261, Oct. 2011. |
10 | 성기훈, 공희경, 김태한, "AHP를 이용한 SNS 정보보호 위협요인 분석," 정보보호학회논문지, 20(6), 2010년 12월. |
11 | Weimin Luo, Jingbo Liu, Jing Liu and Chengyu Fan, "An Analysis of Security in Social Networks," 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 648-651, Dec. 2009. |
12 | 윤택영, 홍도원, "소셜 네트워크 서비스 신뢰성 강화 기술 동향," 전자통신동향분석, 26(4), pp. 134-145, 2011년 8월. |
13 | Hanjae Jeong, Changbin Lee, Jin Kwak, Dongho Won, Changyoung Kwon and Seungjoo Kim, "Privacy-enhanced social network service (SNS)," The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, Dec. 2011. |
14 | Donghee Shin, "The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption," Interacting with Computers, vol. 22, no. 5, pp. 428-438, Sep. 2010. DOI ScienceOn |
15 | Hanjae Jeong, "Hash-based Key Management Architectures for Social Networks Services," Ph.D. Thesis, Sungkyunkwan University, Apr. 2011. |
16 | Maha Faisal and Asmaa Alsumait, "Social Network Privacy and Trust Concerns," Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services, pp. 416-419, Dec. 2011. |