2011
DOI: 10.1002/sec.379
|View full text |Cite
|
Sign up to set email alerts
|

Identity management‐based social trust model for mediating information sharing and privacy enhancement

Abstract: As interest in social network studies has grown bigger along with the development of the Web, social network trust management and applications have come into the spotlight. The increasing interest in social network services that are open systems has motivated the need for a reliable trust model that enables practical information sharing and information protection. In this paper, we propose an identity management-based social trust model for solving a sparsity problem and an information leakage. The proposed tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 44 publications
0
9
0
Order By: Relevance
“…In this works, they inferred indirect trust with intermediate nodes. [5][6][7] are focused on analyzing graphs expressed as relational networks in data management and mining.…”
Section: Related Workmentioning
confidence: 99%
“…In this works, they inferred indirect trust with intermediate nodes. [5][6][7] are focused on analyzing graphs expressed as relational networks in data management and mining.…”
Section: Related Workmentioning
confidence: 99%
“…Combinations from the notions of Kim et al and Vidyalakshmi et al [16,15], the level of a user trusted behaviour for the overall score is illustrated as in Table 3. For example, assume a user Carol obtains the overall score 0.7.…”
Section: Quantifying Recommendationmentioning
confidence: 99%
“…Further, several works deal with privacy in online electronic services, for example, , and in anonymous geolocation and geosocial systems such as and . However, these schemes are usually not convenient for anonymous/pseudonymous many‐to‐one communication systems that collect data from client devices.…”
Section: Related Workmentioning
confidence: 99%