Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data.
Shouhuai XuXiaohu LiTimothy Paul ParkerXueping WangPublished in: IEEE Trans. Inf. Forensics Secur. (2011)
Keyphrases
- sensitive data
- protection mechanisms
- social networks
- information security
- data confidentiality
- privacy protection
- data storage
- data protection
- privacy preserving
- distributed systems
- confidential data
- malicious users
- online social networks
- privacy preservation
- data sharing
- smart card
- third party
- personal data
- security concerns
- data quality
- data privacy
- access control
- sensitive information
- management system
- data mining
- social media
- private information
- trust model
- social networking
- database management systems