Cited 7 time in
Novel assessment method for accessing private data in social network security services
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Park, Jong Hyuk | - |
| dc.contributor.author | Sung, Yunsick | - |
| dc.contributor.author | Sharma, Pradip Kumar | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.contributor.author | Yi, Gangman | - |
| dc.date.accessioned | 2024-08-08T04:31:20Z | - |
| dc.date.available | 2024-08-08T04:31:20Z | - |
| dc.date.issued | 2017-07 | - |
| dc.identifier.issn | 0920-8542 | - |
| dc.identifier.issn | 1573-0484 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/17961 | - |
| dc.description.abstract | Social network services (SNSs) have become one of the core Internet-based application services in recent years. Through SNSs, diverse kinds of private data are shared with users' friends and SNS plug-in applications. However, these data can be exposed via abnormal private data access. For example, the addition of fake friends to a user's account is one approach to gain access to a private user's data. Private user data can be protected from being accessed by using an automated method to assess information. This paper proposes a method that evaluates private data accesses for social network security. By defining normal private data access patterns in advance, abnormal private data access patterns can be exposed. Normal private data access patterns are generated by analyzing all of the consecutive private data accesses of users based on Bayesian probability. We have proven the effectiveness of our approach by conducting experiments where the private data access signals of Twitter accounts were collected and analyzed. | - |
| dc.format.extent | 19 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | SPRINGER | - |
| dc.title | Novel assessment method for accessing private data in social network security services | - |
| dc.type | Article | - |
| dc.publisher.location | 네델란드 | - |
| dc.identifier.doi | 10.1007/s11227-017-2018-6 | - |
| dc.identifier.scopusid | 2-s2.0-85015632200 | - |
| dc.identifier.wosid | 000405297000029 | - |
| dc.identifier.bibliographicCitation | JOURNAL OF SUPERCOMPUTING, v.73, no.7, pp 3307 - 3325 | - |
| dc.citation.title | JOURNAL OF SUPERCOMPUTING | - |
| dc.citation.volume | 73 | - |
| dc.citation.number | 7 | - |
| dc.citation.startPage | 3307 | - |
| dc.citation.endPage | 3325 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | sci | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.subject.keywordAuthor | Social networking | - |
| dc.subject.keywordAuthor | Security and privacy protection | - |
| dc.subject.keywordAuthor | Unauthorized access | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
