Security Strategies for Online Social Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 5
Abstract
In this decade online social networks (OSNs) have marvelous enlargement per hundred of millions of users on the internet. The internet users are more good-looking about OSNs for information sharing and social interactions. Here a number of security and privacy issues are raised. The online social networks (OSNs) currently do not provide any mechanism to enforce privacy concerns over data associated with multiple users. We proposed a comprehensive approach to increase the privacy of shared data associated with multiple users. To increase the privacy the policy is going to use multiparty access control model and policies.
Authors and Affiliations
M. Ebinezer , B. Suresh
Literature Survey on Preference Database
Preference data base (Pref DB) used to provide appropriate recommendations to the users on their relevant search and preferences. The design is made such that user interested data is obtained from the database. PrefDB us...
Maximizing Communication Quality with Bandwidth Guarantees in Wireless Mesh Networks
Wireless Mesh Network (WMN) helps remote areas to gain access to Internet. There might be number of paths to gain access to Internet. Finding a path with maximum bandwidth is the problem to be addressed. Many solutions t...
OSI Reference Model: An Overview
A reference model is a conceptual blueprint of how communication should take place. It addresses all the process required for effective communication and divides these processes into logical grouping called layers. When...
Secure and Faster NN Queries on Outsourced Metric Data Assets
Cloud computing enables outsourcing of data in pay per use fashion. This will help data owners to have services of storage without the need for investment. However, they have security concerns as the cloud service provid...
Anomaly Extraction in Networks
The application detects anomaly in network using techniques like histogram, cloning voting, filtering. To extract anomalous flows, one could build a model describing normal flow characteristics and use the model to ident...