Detail publikace

Computational Social Networks - Security and Privacy

Originální název

Computational Social Networks - Security and Privacy

Anglický název

Computational Social Networks - Security and Privacy

Jazyk

en

Originální abstrakt

This chapter is dealing with anonymous communication. We want to extend the knowledge of security limits of anonymity systems with information based on real-world traffic data. We perform a set of analyses targeting the behavioural patterns of users and their impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested in are inter-arrival times, the number of messages sent by an individual user. The importance of our analyses' results for the design and implementation of anonymity systems is discussed. The second part of the analyses are focused on social networks. Information about user profiling, properties of identiable social networks and their development in time are presented in the context of the security of anonymous systems.

Anglický abstrakt

This chapter is dealing with anonymous communication. We want to extend the knowledge of security limits of anonymity systems with information based on real-world traffic data. We perform a set of analyses targeting the behavioural patterns of users and their impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested in are inter-arrival times, the number of messages sent by an individual user. The importance of our analyses' results for the design and implementation of anonymity systems is discussed. The second part of the analyses are focused on social networks. Information about user profiling, properties of identiable social networks and their development in time are presented in the context of the security of anonymous systems.

BibTex


@inbook{BUT96946,
  author="Kamil {Malinka} and Petr {Hanáček}",
  title="Computational Social Networks - Security and Privacy",
  annote="This chapter is dealing with anonymous communication. We want to extend the
knowledge of security limits of anonymity systems with information based on
real-world traffic data. We perform a set of analyses targeting the behavioural
patterns of users and their impact on such systems. The first part of the
analyses are focused on the properties of email communication relevant to the
designers of anonymous systems. The two parameters we are interested in are
inter-arrival times, the number of messages sent by an individual user. The
importance of our analyses' results for the design and implementation of
anonymity systems is discussed. The second part of the analyses are focused on
social networks. Information about user profiling, properties of identiable
social networks and their development in time are presented in the context of the
security of anonymous systems.",
  address="Springer London",
  booktitle="Computational Social Networks - Security and Privacy",
  chapter="96946",
  doi="10.1007/978-1-4471-4051-1",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Springer London",
  year="2012",
  month="september",
  pages="311--340",
  publisher="Springer London",
  type="book chapter"
}