Kumar et al., 2014 - Google Patents
Online social networks: Privacy challenges and proposed security framework for facebookKumar et al., 2014
View PDF- Document ID
- 9423540501653109675
- Author
- Kumar A
- Sharma B
- Shrivastava S
- Publication year
- Publication venue
- International Journal of Soft Computing and Engineering (IJSCE)
External Links
Snippet
Social networking sites facilitate and develops a virtual community for people to share their thoughts, interest activities or to increase their horizon of camaraderie. With the advancement in Social networking sites or we can refer it as with online social networks the …
- 238000004891 communication 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fire et al. | Online social networks: threats and solutions | |
Azfar et al. | An android social app forensics adversary model | |
Chewae et al. | How much privacy we still have on social network | |
Sadeghian et al. | Security threats in online social networks | |
Mahmood | Online social networks: Privacy threats and defenses | |
Cutillo et al. | Security and privacy in online social networks | |
Verma et al. | Privacy and security: Online social networking | |
Hassan et al. | Digital Privacy and Security Using Windows: A Practical Guide | |
Wong et al. | Trust and privacy exploitation in online social networks | |
Samermit et al. | {“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators | |
Kissell | Take control of your online privacy | |
Majid et al. | Social media and security: how to ensure safe social networking | |
Kumar et al. | Online social networks: Privacy challenges and proposed security framework for facebook | |
Efe et al. | How privacy is threatened from social media communication? | |
Shelke et al. | Social networking: its uses and abuses | |
Nekrasov et al. | A user-driven free speech application for anonymous and verified online, public group discourse | |
Paul et al. | Exploring decentralization dimensions of social networking services: adversaries and availability | |
Malagi et al. | A survey on security issues and concerns to social networks | |
Krubhala et al. | Online social network-a threat to privacy and security of human society | |
Abeer et al. | Security issues in social networking sites | |
Sonowal et al. | Communication channels | |
Hudaib | Comprehensive social media security analysis & xkeyscore espionage technology | |
Arora et al. | Threats to Security and privacy of Information due to growing use of social media in India | |
Kumar et al. | A Practical Framework and Approach for Privacy Issues Concerning Social Networking Sites | |
Hamid et al. | Online harassment and digital stalking |