A privacy-preserving model to control social interaction behaviors in social network sites
Tài liệu tham khảo
Gu, 2016, Developing user loyalty for social networking sites: a relational perspective, J Electron Comm Res, 17, 1
Gundecha, 2012, Mining social media: a brief introduction, Tutor Operat Res, 1, 1
Zafarani, 2010, Sentiment propagation in social networks: a case study in livejournal, 413
Beye, 2012, Privacy in online social networks, 87
Kumar, 2014, Online social networks: privacy challenges and proposed security framework for facebook, Int J Soft Comput Eng, 4
Chaabane, 2014, A closer look at third-party osn applications: are they leaking your personal information?, 235
Pallis, 2011, Online social networks: status and trends, 213
Egelman, 2013, My profile is my password, verify me!: the privacy/convenience tradeoff of Facebook connect, 2369
Aldhafferi N, Watson C, Sajeev A. Personal information privacy settings of online social networks and their suitability for mobile internet devices, arXiv preprint arXiv:1305.2770.
Richthammer, 2014, Taxonomy of social network data types, EURASIP J Inform Secur, 2014, 11, 10.1186/s13635-014-0011-7
Kayes I, Iamnitchi A. A survey on privacy and security in online social networks, arXiv:1504.03342.
Steel, 2010, Facebook in privacy breach, Wall Street J, 18, 21
King, 2011, Privacy: is there an app for that?, 12
Singh, 2011, A user-centric evaluation of the readability of privacy policies in popular web sites, Inform Syst Front, 13, 501, 10.1007/s10796-010-9228-2
Viswanath, 2012, Keeping information safe from social networking apps, 49
Chaabane, 2014, A closer look at third-party osn applications: are they leaking your personal information?, 235
Wu, 2010, K-symmetry model for identity anonymization in social networks, 111
Liu, 2014, Survey on privacy preserving techniques for publishing social network data, J Softw, 25, 576
A. Chakraborty, B. Annappa, A perturbation based approach for privacy preserving publication of social network graphs.
Blosser, 2008, Privacy preserving collaborative social network, 543
Campan, 2010, P-sensitive k-anonymity with generalization constraints, Trans Data Priv, 3, 65
Guha, 2008, NOYB: privacy in online social networks, 49
Fong, 2009, A privacy preservation model for facebook-style social network systems, Comp Secur - ESORICS, 5789, 303
Zhu, 2010, A collaborative framework for privacy protection in online social networks, 1
Shakimov, 2011, Vis-a-Vis: privacy-preserving online social networking via virtual individual servers, 1
Masoumzadeh, 2012, Preserving structural properties in edge-perturbing anonymization techniques for social networks, IEEE Trans Dependable Secure Comput, 9, 877, 10.1109/TDSC.2012.65
Fire, 2012, Social privacy protector - protecting users' privacy in social networks
Heatherly, 2013, Preventing private information inference attacks on social networks, IEEE Trans Knowl Data Eng, 25, 1849, 10.1109/TKDE.2012.120
Cheng, 2013, Preserving user privacy from third-party applications in online social networks, 723
Sun, 2013, Privacy preserving social network publication against mutual friend attacks
Singh, 2014, Privacy preserving techniques in social networks data publishing-a review, Int J Comput Appl, 87, 0975
Raghunathan, 2013
Qi, 2012, An overview of privacy preserving data mining, Procedia Environ Sci, 12, 1341, 10.1016/j.proenv.2012.01.432
Indhumathi R, Priya SM. Data preserving by anonymization techniques for collaborative data publishing, Mechanics20(21) 20–21.
Sweeney, 2002, k-anonymity: a model for protecting privacy, international journal of uncertainty, Fuzzi Knowl-Based Syst, 10, 557, 10.1142/S0218488502001648
Machanavajjhala, 2007, L-diversity: privacy beyond k-anonymity, ACM Trans Knowl Discov Data (TKDD), 1, 3, 10.1145/1217299.1217302
Li, 2007, t-closeness: privacy beyond kanonymity and l-diversity, 106
Campan, 2015, Preserving communities in anonymized social networks, Trans Data Priv, 55
Tassa, 2013, Anonymization of centralized and distributed social networks by sequential clustering, IEEE Trans Knowl Data Eng, 25, 311, 10.1109/TKDE.2011.232
Skarkala, 2012, Privacy preservation by k-anonymization of weighted social networks, 423
Yuan, 2013, Protecting sensitive labels in social network data anonymization, IEEE Trans Knowl Data Eng, 25, 633, 10.1109/TKDE.2011.259
Chakraborty, 2015, Analysis and performance enhancement to achieve recursive (c, l) diversity anonymization in social networks, Trans Data Priv, 8, 173
Song, 2015, Decision tree methods: applications for classification and prediction, Shanghai Arch Psychiatry, 27, 130
Rahman, 2012, FRAppE: detecting malicious Facebook applications, 313
Kavianpour, 2017, Classification of third-party applications on facebook to mitigate users information leakage, 144
Leskovec, 2014
Shi, 2010, Anonymizing data with quasi-sensitive attribute values, 1389
Ananthula, 2015, Measuring privacy in online social networks, Int J Secur Privacy Trust Manage, 4, 1, 10.5121/ijsptm.2015.4201