000 | 03152nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-7091-0894-9 | ||
003 | DE-He213 | ||
005 | 20200421111200.0 | ||
007 | cr nn 008mamaa | ||
008 | 131016s2013 au | s |||| 0|eng d | ||
020 |
_a9783709108949 _9978-3-7091-0894-9 |
||
024 | 7 |
_a10.1007/978-3-7091-0894-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity and Privacy Preserving in Social Networks _h[electronic resource] / _cedited by Richard Chbeir, Bechara Al Bouna. |
264 | 1 |
_aVienna : _bSpringer Vienna : _bImprint: Springer, _c2013. |
|
300 |
_aXVI, 367 p. 107 illus., 66 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Social Networks, _x2190-5428 |
|
505 | 0 | _aPrivacy in Online Social Networks -- Online Social Networks: Privacy Threats and Defenses -- Online Social Networks and Terrorism: Threats and Defenses -- User-Managed Access Control in Web Based Social Networks -- UPP+: A Flexible User Privacy Policy for Social Networking Services -- Social Semantic Network-Based Access Control -- Supporting Data Privacy in P2P Systems -- Privacy Preserving Reputation Management in Social Networks -- Security and Privacy Issues in Mobile Social Networks -- Avatar Facial Biometric Authentication Using Wavelet Local Binary Patterns -- A Flexible Image-Based Access Control Model for Social Networks -- Problems and Questions. | |
520 | _aThis volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field. A wide range of interdisciplinary contributions from various research groups ensures for a balanced and complete perspective. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aStatistical physics. | |
650 | 0 | _aDynamical systems. | |
650 | 0 | _aMass media. | |
650 | 0 | _aLaw. | |
650 | 0 | _aSociology. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aStatistical Physics, Dynamical Systems and Complexity. |
650 | 2 | 4 | _aSociology, general. |
650 | 2 | 4 | _aMedia Law. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
700 | 1 |
_aChbeir, Richard. _eeditor. |
|
700 | 1 |
_aAl Bouna, Bechara. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783709108932 |
830 | 0 |
_aLecture Notes in Social Networks, _x2190-5428 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-7091-0894-9 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c53778 _d53778 |