2021
DOI: 10.1016/j.osnem.2021.100138
|View full text |Cite
|
Sign up to set email alerts
|

A Trust based Privacy Providing Model for Online Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…At the object level, the objects from the shared picture can be detected, such as faces (publisher, co-publisher, unknown), face expressions, body gestures, and other objects (e.g., vehicle registration numbers, personal ornaments, etc.). The overall view object data, such as location, event details, and so on, can be detected at the overall view level [6][7][8][9][10][11][12][13][14][15].…”
Section: A) Visual Detectable Leakagementioning
confidence: 99%
See 1 more Smart Citation
“…At the object level, the objects from the shared picture can be detected, such as faces (publisher, co-publisher, unknown), face expressions, body gestures, and other objects (e.g., vehicle registration numbers, personal ornaments, etc.). The overall view object data, such as location, event details, and so on, can be detected at the overall view level [6][7][8][9][10][11][12][13][14][15].…”
Section: A) Visual Detectable Leakagementioning
confidence: 99%
“…User credibility is established by factors such as the total number of friends, account age, marital status, gender, etc. that contribute to the user's OSN reputation and level of trustworthiness [8].…”
Section: B) Trust Parametersmentioning
confidence: 99%
“…This section presents a brief overview of our context independent trust-based model [9]. We represent a social network as an undirected graph, where nodes are the OSN users, and edges represent relations between them such as friendship relations.…”
Section: Context Independent Trust-based Modelmentioning
confidence: 99%
“…We provide an infrastructure that uses DRM (Digital Rights Management) methods, to protect the data subject's right over her data, via the data instance publisher, denoted in this paper as the data owner. A digital rights management (DRM) system [9] operates on a computing device when a user requests that a protected piece of digital content be rendered by the computer device in a particular manner. Detecting a digital content journey and its owners or its subjects is challenging in social networks, where the data flow is not controlled.…”
Section: Introductionmentioning
confidence: 99%
“…These authors conclude that changing the appearance of privacy policies makes online services appear more trustworthy to the user. For its part, Voloch et al (2021), propose a model where user privacy policy is conditioned by three significant aspects, trust, role-based access control and information flow. Due to the relationship shown in different studies between privacy and trust, the second hypothesis to be analyzed is the following:…”
Section: Hypotheses and Research Modelmentioning
confidence: 99%