期刊文献+

社交网络的隐私保护 被引量:4

Privacy Protection of Social Network
原文传递
导出
摘要 随着Facebook的上市,社交网络再次成为全球的焦点,网络中无时无刻不在产生用户数据,通过对海量的非结构化数据进行价值挖掘,社交网络引领其他互联网领域的应用率先进入大数据时代。本文描述了现阶段社交网络的特点及其对当今社会的影响,并对其存在的安全问题进行了分析,最后给出了相应的对策。 With the going public of the Facebook, social network becomes the focus of global again. It generates user data all the time, and leads other internet applications into the era of big data d through data mining. This paper describes the characteristics of current social network and its impact on today's society, analyzes the security problems, and presents corresponding countermeasures at last.
作者 刘毅
出处 《网络安全技术与应用》 2013年第6期4-7,共4页 Network Security Technology & Application
关键词 社交网络 大数据 隐私保护 social network big data privacy protection
  • 相关文献

参考文献7

二级参考文献34

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:368
  • 2Boyed D, Ellison N. Social network sites:Definition, history, and scholarship [J]. Journal of Computer- Mediated Communication, 2008, 13(1): 201-230.
  • 3Nagy J, Pecho P. Social network security [C]// Proceedings of the 3rd IEEE International Conference on Emerging Security Information, Systems and Technologies. Athens, Greece.. IEEE Computer Society, 2009: 321-325.
  • 4Douglis F. It's all about the (social) network[J]. IEEE Internet Computing, 2010, 14(1): 4-6.
  • 5Limsaiprom P, Tantatsanawong P. Social network anomaly and attack patterns analysis[C]//Proceedings of the 6th IEEE International Conference on Networked Computing. Heidelberg, Germany: IEEE Press, 2010: 11-13.
  • 6Hogben G. Security issues in the future of social networking[R/OL]. W3C Workshop on the Future of Social Networking, 2009 [2011-04-20]. http://www. w3. org/2008/09/msnws/papers/Future_of_ SN_ Giles_Hogben_ENISA. pdf.
  • 7Poppe R. Scalable face labeling in online social networks [C]// IEEE International Conference on Automatic Face & Gesture Recognition and Workshops. California, USA: IEEE Press, 2011: 566-571.
  • 8Jagatic T, Johnson N, Jakobsson M, et al. Social phishing[J]. Communications of the ACM, 2007, 50(3) : 94-100.
  • 9Douceur J R. The sybil attack[J]. Lecture Notes in Computer Science, 2002, 2 429: 251-260.
  • 10Ge M, Lam K, Wang X Q, et al. VisualSec.. A secure message delivery scheme for online social networks based on profile images [C]// Proceedings of GLOBECOM'09 : Global Telecommunications Conference. HI, USA: IEEE Press, 2009: 1-6.

共引文献278

同被引文献14

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部