Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Identity related threats, vulnerabilities and risk mitigation in online social networks: A tutorial
KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.
2017 (English)In: CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery (ACM), 2017, Vol. Part F131467, p. 2603-2605Conference paper, Published paper (Refereed)
Abstract [en]

This tutorial provides a thorough review of the main research directions in the field of identity management and identity related security threats in Online Social Networks (OSNs). The continuous increase in the numbers and sophistication levels of fake accounts constitutes a big threat to the privacy and to the security of honest OSN users. Uninformed OSN users could be easily fooled into accepting friendship links with fake accounts, giving them by that access to personal information they intend to exclusively share with their real friends. Moreover, these fake accounts subvert the security of the system by spreading malware, connecting with honest users for nefarious goals such as sexual harassment or child abuse, and make the social computing environment mostly untrustworthy. The tutorial introduces the main available research results available in this area, and presents our work on collaborative identity validation techniques to estimate OSN profiles trustworthiness.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2017. Vol. Part F131467, p. 2603-2605
Series
Proceedings of the ACM Conference on Computer and Communications Security, ISSN 1543-7221
Keywords [en]
OSN identity validation, Profile trustworthiness, Sybil accounts, Sybil marking
National Category
Human Aspects of ICT
Identifiers
URN: urn:nbn:se:kth:diva-224296DOI: 10.1145/3133956.3136066Scopus ID: 2-s2.0-85041444589ISBN: 9781450349468 OAI: oai:DiVA.org:kth-224296DiVA, id: diva2:1191009
Conference
24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, United States, 30 October 2017 through 3 November 2017
Note

QC 20180316

Available from: 2018-03-16 Created: 2018-03-16 Last updated: 2018-03-16Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Bahri, Leila
By organisation
Software and Computer systems, SCS
Human Aspects of ICT

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 35 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf