LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Price, Dominic; McAuley, Derek; Mortier, Richard; Greenhalgh, Chris; Brown, Michael; Angelopoulos, Spyros (2015)
Publisher: Springer International Publishing
Languages: English
Types: Part of book or chapter of book
Subjects: identity, infrastructure, privacy, social networking, architecture
We argue that the current approaches to online social networking give rise to numerous challenges regarding the management of the multiple facets of people’s digital identities within and around social networking sites (SNS). We propose an architecture for enabling people to better manage their SNS identities that is informed by the way the core Internet protocols developed to support interoperation of proprietary network protocols, and based on the idea of Separation of Concerns [1]. This does not require modification of existing services but is predicated on providing a connecting layer over them, both as a mechanism to address problems of privacy and identity, and to create opportunities to open up online social networking to a much richer set of possible interactions and applications.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 1. W.L. Hürsch, & C.V. Lopes. Separation of concerns. Technical report, 1995. North Eastern University.
    • 2. A. Portes. Social capital: Its origins and applications in modern sociology. Annual Review of Sociology, 24(1):1-24, 1998.
    • 3. L. Edwards and D. McAuley. What's in a name? Real name policies and social networks. In Proceedings of 1st International Workshop on Internet Science and Web Science Synergies (INETWEBSCI), Paris, France, May 1 2013.
    • 4. M. van der Velden and K. El Emam. ”not all my friends need to know”: a qualitative study of teenage patients, privacy, and social media. Journal of the American Medical Informatics Association, 2012.
    • 5. C. N. O'Brien. The top ten NLRB cases on Facebook firings and employer social media policies. Oregon Law Review, 92(2), Winter 2014. http://ssrn.com/abstract=2277900.
    • 6. A. M. Attia, N. Aziz, B. Friedman, and M. F.Elhusseiny. Commentary: The impact of social networking tools on political change in Egypt's ”revolution 2.0”. Electronic Commerce Research and Applications, 10(4):369-374, 2011.
    • 7. M. Madejski, M. L. Johnson, and S. M. Bellovin. The failure of online social network privacy settings. Technical Report CUCS-010-11, Columbia University Computer Science, Columbia University, New York, USA, 2011.
    • 8. F. K. Ozenc and S. D. Farnham. Life ”modes” in social media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, pages 561-570, Vancouver, BC, Canada, 2011.
    • 9. E. Zheleva and L. Getoor. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In Proceedings of the 18th international conference on World Wide Web, WWW '09, pages 531-540, Madrid, Spain, 2009.
    • 10. S. Le Blond, C. Zhang, A. Legout, K. Ross, and W. Dabbous. I know where you are and what you are sharing: exploiting p2p communications to invade users' privacy. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pages 45-60, Berlin, Germany, 2011.
    • 11. J. a. P. Pesce, D. L. Casas, G. Rauber, and V. Almeida. Privacy attacks in social media using photo tagging networks: a case study with Facebook. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, PSOSM '12, pages 4:1-4:8, Lyon, France, 2012.
    • 12. H. Hu, G.-J. Ahn, and J. Jorgensen. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11, pages 103-112, Orlando, Florida, 2011. ACM.
    • 13. C. E. Gates. Access control requirements for web 2.0 security and privacy. In Proc. of Workshop on Web 2.0 Security & Privacy (W2SP 2007, 2007. [15] F. Halasz and T. P. Moran. Analogy considered
    • 14. F. Halasz and T. P. Moran. Analogy considered harmful. In Proceedings of the 1982 Conference on Human Factors in Computing Systems, CHI '82, pages 383-386, Gaithersburg, Maryland, USA, 1982.
    • 15. S. Crocker. Protocol Notes. RFC 36, IETF, March 1970.
    • 16. V. G. Cerf and R. E. Kahn. A protocol for packet network interconnection. IEEE Transactions on Communications, 22(5):637-648, May 1974
    • 17. J. Postel. 2.3.3.2 Comments on Internet Protocol and TCP. IEN 2, ISI, August 15 1977.
    • 18. J. Postel. NCP/TCP transition plan. RFC 801, IETF, November 1981
    • 19. L. Pouzin. A proposal for interconnecting packet switching networks. In Proceedings of EUROCOMP, pages 1023-1036, Bronel University, May 1974.
    • 20. V. Cerf. The catenet model for internetworking. IEN 48, DARPA/IPTO, July 1978.
    • 21. D. Clark. The design philosophy of the DARPA Internet protocols. In Proceedings of ACM SIGCOMM 1988, pages 106-114, Stanford, California, USA, 1988.
    • 22. D. Waitzman. Standard for the transmission of IP datagrams on avian carriers. RFC 1149, IETF, April 1990.
    • 23. P. Resnick and Ed. Internet Message Format. RFC 2822, IETF, April 2001.
    • 24. N. Freed and N. Borenstein. Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies. RFC 2045, IETF, November 1996.
  • No related research data.
  • No similar publications.

Share - Bookmark

Funded by projects

Cite this article