Sciweavers

2492 search results - page 103 / 499
» False-Name-Proofness in Social Networks
Sort
View
CSCW
2004
ACM
14 years 1 months ago
Emergent networks, locus of control, and the pursuit of social capital
In this paper we examine the relationship between emergent social network characteristics in a computer-supported collaborative learning course and locus of control. An emergent c...
Michael Stefanone, Jeffrey T. Hancock, Geri Gay, A...
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
14 years 15 days ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
CEAS
2006
Springer
13 years 11 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
13 years 5 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 5 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu