Preserving Secrecy in Mobile Social Networks
نویسندگان
چکیده
منابع مشابه
Privacy-preserving Attribute Matchmaking in Proximity-based Mobile Social Networks
The major impediments that mostly arise in matchmaking in mobile social networks are ensuring the privacy of users’ attributes, finding the intersection of attributes of the matched-pair without revealing any other information, and ensuring that the matchedpair get to know the intersection mutually. Also, in virtually all the existing protocols, the initiator of the matchmaking does not set a t...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملSecrecy-Preserving Reasoning using Secrecy Envelopes
Inmany applications of networked information systems, the need to share information often has to be balanced against the need to protect secret information from unintended disclosure, e.g., due to copyright, privacy, security, or commercial considerations. We study the problem of secrecy-preserving reasoning, that is, answering queries using secret information, whenever it is possible to do so,...
متن کاملPreserving Secrecy Under Refinement
We propose a general framework of secrecy and preservation of secrecy for labeled transition systems. Our definition of secrecy is parameterized by the distinguishing power of the observer, the properties to be kept secret, and the executions of interest, and captures a multitude of definitions in the literature. We define a notion of secrecy preserving refinement between systems by strengtheni...
متن کاملSecrecy in Mobile Code
Mobile code is code that can be executed at a remote location, where beforehand it might not be known whether this location is trustworthy and a requirement may be that the to be executed code is encrypted and remains encrypted during execution. This paper presents a model of mobile code and defines perfect secrecy. The model and definition allows to derive conditions and theoretical boundaries...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Cyber-Physical Systems
سال: 2021
ISSN: 2378-962X,2378-9638
DOI: 10.1145/3396071