期刊文献+

社会网络的隐私保护研究综述 被引量:9

Overview of protecting user privacy in social networks
在线阅读 下载PDF
导出
摘要 某些网站将匿名处理后的社会网络数据公开发布,或者提供给科研机构、大学或者其他组织和个人使用,而这些数据往往侵犯了用户的隐私,但有关社会网络中个人信息安全和隐私保护的研究却处于起步阶段。综述了当前在线社会网络的研究成果,主要就社会网络及其隐私漏洞、信息泄露、再识别攻击、聚集攻击、推理攻击等进行了分析,并对今后的发展提出了预测,为社会网络的科研指出了可行的研究方向。 Some social network sites publish anonymized social network data for special purposes. However,such kind of data publishing may cause potential privacy leak. But research on protecting user privacy has just started. This paper surveyed and discussed existing research on privacy protection in social networks and its privacy leak,information revelation,reidentification attack,mass attack,logic attack,etc. The article tried to predict future trends and pointed out study directions for the social networks.
出处 《计算机应用研究》 CSCD 北大核心 2010年第10期3601-3604,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(10976033) 国家科技支撑计划资助项目(2008BAC44B04)
关键词 社会网络 互联网 隐私保护 攻击 social networks Internet privacy protection attack
  • 相关文献

参考文献31

  • 1HANNEMAN R A, RIDDLE M. Introduction to social network methods [ M/OL]. (2005). http://www. faculty, ucr. edu/- hannemart/nettext/.
  • 2LESKOVEC J, HORVITZ E. Planetary-scale views on a large instantmessaging network [ C ]//Proc of the 17th International Conference on World Wide Web. 2008:915-924.
  • 3REITER M K, RUBIN A D. Crowds:anonymity for Web transactions [J]. ACM Trans on Information and System Security, 1998,1 ( 1 ) :55-92.
  • 4GOLDSCHLAG D, REED M, SYVERSON P. Onion routing for anonymous and private Internet connections [ J]. Communications of the ACM,1999 ,42( 2 ) :39-41.
  • 5DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor: the second-generation onion router[ C ]//Proc of the 13th USE NIX Security Symposium. 2004 : 303- 320.
  • 6CAVERLEE J, WEBB S. A large-scale study of Myspace:observations and implications for online social networks [ C ]//Proc of International Conference on Weblogs and Social Media. 2008.
  • 7GROSS R, ACQUISTI A. Information revelation and privacy in online social networks[ C ]//Proc of ACM Workshop on Privacy in the Elec- tronic Society. 2005:71-80.
  • 8HUBERMAN B A,ADAR E,FINE L R. Valuating privacy[ J]. IEEE Security and Privacy,2005,3(5 ) :22-25.
  • 9BACKSTROM L, DWORK C, KLEINBERG J. Wherefore art thou r3579x?:anonymized social networks, hidden patterns, and structural stcganography [ C]//Proc of the 16th International Conference on World Wide Web. 2007:181-190.
  • 10ZHELEVA E, GETOOR L. Preserving the privacy of sensitive relationships in graph data[ C ]//Proc of the 1st ACM-SIGKDD International Workshop on Privacy, Security, and Trust in KDD. New York:ACM Press ,2008 : 153-171.

二级参考文献6

  • 1徐瑞萍,刁生富.论网络空间中的隐私权[J].自然辩证法研究,2004,20(11):79-82. 被引量:7
  • 2Web2.0将从2007年开始改变主流社会.http://news.xinhuenet.com/newmedia/2006-12/18/content-5502501.htm
  • 3威尔士的Web2.0五准则.http://www.yeeyan.com/articles/view/little/444
  • 4M. J. Culnan, Protecting privacy online:is self--regulation working?. Journal of Public Policy and Marketing, 2000 (1), pp. 20 --26
  • 522日ITGoogle公司呼吁为网络隐私权立法.http://www.donews.com/Content/200606/9acb244875ec477dbl276545babc8411.shtm
  • 6郭玉锦,王欢.网络社区中的社会联系[J].中国软科学,2002(11):119-120. 被引量:15

共引文献50

同被引文献98

引证文献9

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部