Privacy Risk Analysis of Online Social Networks: Synthesis Lectures on Information Security, Privacy, and Trust
Autor Sourya Joyee De, Abdessamad Imineen Limba Engleză Paperback – 24 oct 2017
This book presents to its readers how privacy risk analysis concepts such as privacy harms and risk sources can be used to develop mechanisms for privacy scoring of user profiles and for supporting users in privacy settings management in the context of OSNs. Privacy scoring helps detect and minimize the risks due to the dissemination and use of personal data. The book also discusses many open problems in this area to encourage further research.
Din seria Synthesis Lectures on Information Security, Privacy, and Trust
- 20% Preț: 333.72 lei
- 20% Preț: 325.44 lei
- 20% Preț: 406.11 lei
- 20% Preț: 224.00 lei
- 20% Preț: 275.46 lei
- 20% Preț: 176.97 lei
- 20% Preț: 269.20 lei
- 20% Preț: 176.82 lei
- 20% Preț: 226.64 lei
- 20% Preț: 199.72 lei
- 20% Preț: 237.92 lei
- 20% Preț: 199.72 lei
- 20% Preț: 224.97 lei
- 20% Preț: 223.67 lei
- 20% Preț: 199.72 lei
- 20% Preț: 199.72 lei
- 20% Preț: 176.97 lei
- 20% Preț: 227.12 lei
- 20% Preț: 199.72 lei
- 20% Preț: 357.06 lei
- 20% Preț: 225.67 lei
- 20% Preț: 224.50 lei
- 20% Preț: 412.74 lei
- 20% Preț: 164.13 lei
- 20% Preț: 225.48 lei
- 20% Preț: 248.02 lei
Preț: 223.67 lei
Preț vechi: 279.58 lei
-20% Nou
Puncte Express: 336
Preț estimativ în valută:
42.80€ • 44.16$ • 36.23£
42.80€ • 44.16$ • 36.23£
Carte tipărită la comandă
Livrare economică 05-19 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031012273
ISBN-10: 3031012275
Pagini: 95
Ilustrații: XIII, 95 p.
Dimensiuni: 191 x 235 mm
Greutate: 0.2 kg
Editura: Springer International Publishing
Colecția Springer
Seria Synthesis Lectures on Information Security, Privacy, and Trust
Locul publicării:Cham, Switzerland
ISBN-10: 3031012275
Pagini: 95
Ilustrații: XIII, 95 p.
Dimensiuni: 191 x 235 mm
Greutate: 0.2 kg
Editura: Springer International Publishing
Colecția Springer
Seria Synthesis Lectures on Information Security, Privacy, and Trust
Locul publicării:Cham, Switzerland
Cuprins
Acknowledgments.- Introduction.- Terminology and Definitions.- Dimensions of Privacy Scoring in OSNs.- Attribute Visibility in OSN.- Harm Trees for OSNs.- Privacy Risk Analysis in OSNs.- Social Benefits.- Choosing the Right Privacy Settings.- Conclusion.- Bibliography.- Authors' Biographies.
Notă biografică
Sourya Joyee De is an Assistant Professor in IT & Systems at Indian Institute of Management Raipur, India. She is a Fellow of Indian Institute of Management Calcutta (Ph.D.). Prior to joining IIM Raipur, Sourya held research positions at INRIA Grenoble Rhone-Alpes and LORIA-CNRS-INRIA Nancy Grand-Est, France for close to four years. Her research has been funded by the French ANR project BIOPRIV, CISCO San Jose, CA, USA, Samsung GRO Grant, INRIA Project Lab CAPPRIS, and the Grand-Est Region, France. Sourya was also a Visiting Scientist at Indian Statistical Institute Kolkata, India. Her research interests include privacy risk analysis, user consent in the context of privacy, privacy policies, security in cloud computing, and rational cryptography. Her research has been published at various reputed journals and conferences. She has also published a book titled Privacy Risk Analysis with Morgan & Claypool Publishers, San Rafel, CA, USA.Abdessamad Imine received M.Sc. and Ph.D. degrees inComputer Science from University of Sciences and Technology of Oran (USTO), Algeria, and University Henri Poincaré of Nancy, France, respectively. He is currently an Associate Professor HdR at Lorraine University and senior researcher at LORIA center of Nancy. His research interests include privacy in social networks, security for collaborative systems, optimistic protocols, and formal methods. Abdessamad Imine has developed a formal methodology for specifying and verifying the consistency of synchronized objects by operational transformation. This methodology has been successfully used in the design of a configuration management system in the LibreSource project. He has also devised protocols for controlling and enforcing privacy in social networks and protocols for synchronizing and securing shared data such as text, XML, and RDF documents. He is author and co-author of more than 82 papers in international conferences, journals, and books.