Movatterモバイル変換


[0]ホーム

URL:


Anderson, 2012 - Google Patents

Privacy engineering for social networks

Anderson, 2012

ViewPDF
Document ID
15694743713175902292
Author
Anderson J
Publication year

External Links

Snippet

In this dissertation, I enumerate several privacy problems in online social networks (OSNs) and describe a system called Footlights that addresses them. Footlights is a platform for distributed social applications that allows users to control the sharing of private information …
Continue reading atwww.cl.cam.ac.uk (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources

Similar Documents

PublicationPublication DateTitle
US12294621B2 (en)Zero-knowledge environment based networking engine
US12058266B2 (en)Zero-knowledge environment based social networking engine
Danezis et al.Privacy and data protection by design-from policy to engineering
JøsangTrust and reputation systems
DeNardisThe global war for internet governance
Lax et al.A Blockchain-based approach for matching desired and real privacy settings of social network users
CN113597628B (en) Broadcast intent signaling using decentralized networks
US11218315B2 (en)System and method establishing a trust model for shared content on the internet
Miorandi et al.Sticky policies: A survey
Cutillo et al.Security and privacy in online social networks
Aïmeur et al.Upp: User privacy policy for social networking sites
Le MétayerWhom to trust? Using technology to enforce privacy
Anderson et al.Must social networking conflict with privacy?
Salama et al.Computational social networks: security and privacy
AndersonPrivacy engineering for social networks
Nekrasov et al.A user-driven free speech application for anonymous and verified online, public group discourse
Pham et al.ProxyGPT: Enabling Anonymous Queries in AI Chatbots with (Un) Trustworthy Browser Proxies
Rech et al.A decentralized service-platform towards cross-domain entitlement handling
Bertocci et al.OAuth2 and OpenID Connect: The Professional Guide-Beta
OukemeniTowards assessing information privacy in microblogging online social networks. The IPAM framework
de OliveiraSecure Documents in Collaborative Environments
SundareswaranGABE: A cloud brokerage system for service selection, accountability and enforcement
Louridas et al.Report on Architecture for Privacy-Preserving Applications on Ledgers
MartinsExploring Permissioned Blockchains for Decentralizing Access Control
LégaréEnhancing user privacy in web services

[8]
ページ先頭

©2009-2025 Movatter.jp