[go: up one dir, main page]

Kumar et al., 2014 - Google Patents

Online social networks: Privacy challenges and proposed security framework for facebook

Kumar et al., 2014

View PDF
Document ID
9423540501653109675
Author
Kumar A
Sharma B
Shrivastava S
Publication year
Publication venue
International Journal of Soft Computing and Engineering (IJSCE)

External Links

Snippet

Social networking sites facilitate and develops a virtual community for people to share their thoughts, interest activities or to increase their horizon of camaraderie. With the advancement in Social networking sites or we can refer it as with online social networks the …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Fire et al. Online social networks: threats and solutions
Azfar et al. An android social app forensics adversary model
Chewae et al. How much privacy we still have on social network
Sadeghian et al. Security threats in online social networks
Mahmood Online social networks: Privacy threats and defenses
Cutillo et al. Security and privacy in online social networks
Verma et al. Privacy and security: Online social networking
Hassan et al. Digital Privacy and Security Using Windows: A Practical Guide
Wong et al. Trust and privacy exploitation in online social networks
Samermit et al. {“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators
Kissell Take control of your online privacy
Majid et al. Social media and security: how to ensure safe social networking
Kumar et al. Online social networks: Privacy challenges and proposed security framework for facebook
Efe et al. How privacy is threatened from social media communication?
Shelke et al. Social networking: its uses and abuses
Nekrasov et al. A user-driven free speech application for anonymous and verified online, public group discourse
Paul et al. Exploring decentralization dimensions of social networking services: adversaries and availability
Malagi et al. A survey on security issues and concerns to social networks
Krubhala et al. Online social network-a threat to privacy and security of human society
Abeer et al. Security issues in social networking sites
Sonowal et al. Communication channels
Hudaib Comprehensive social media security analysis & xkeyscore espionage technology
Arora et al. Threats to Security and privacy of Information due to growing use of social media in India
Kumar et al. A Practical Framework and Approach for Privacy Issues Concerning Social Networking Sites
Hamid et al. Online harassment and digital stalking