Sciweavers

6696 search results - page 142 / 1340
» Securing social networks
Sort
View
CSREASAM
2006
13 years 11 months ago
SPS-VN: Research on the Security Policy System for Virtual Network
- In the area of network information security, it is necessary to study the security in the end-to-end communication. This paper proposes a theory of virtual network by end-to-end....
Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefe...
PERCOM
2006
ACM
14 years 10 months ago
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover
Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems aris...
Ulrike Meyer, Susanne Wetzel
GI
2009
Springer
14 years 3 months ago
Deriving Taxonomies from Automatic Analysis of Group Membership Structure in Large Social Networks
: We develop a method to create taxonomies in large social networks solely based on users group membership information. We illustrate our technique using an example of the Flickr p...
Marc Egger, Kai Fischbach, Peter A. Gloor, Andre L...
IJCAI
2007
13 years 11 months ago
Computational Aspects of Analyzing Social Network Dynamics
Motivated by applications such as the spread of epidemics and the propagation of influence in social networks, we propose a formal model for analyzing the dynamics of such networ...
Christopher L. Barrett, Harry B. Hunt III, Madhav ...
CMOT
2006
147views more  CMOT 2006»
13 years 10 months ago
Identifying sets of key players in a social network
A procedure is described for finding sets of key players in a social network. A key assumption is that the optimal selection of key players depends on what they are needed for. Acc...
Stephen P. Borgatti