The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.08 - August (2010 vol.43)
pp: 37-43
Moo Nam Ko , University of North Carolina at Charlotte
Gorrell P. Cheek , University of North Carolina at Charlotte
Mohamed Shehab , University of North Carolina at Charlotte
Ravi Sandhu , University of Texas at San Antonio
ABSTRACT
New services such as Facebook Platform, Google Friend Connect, and MySpaceID let third-party sites develop social applications without having to build their own social network. These social-networks connect services increase access to and enrich user data in the Social Web, although they also present several security and privacy challenges.
INDEX TERMS
Internet/Web, Social-networks connect services, Social networking, Social Web, Security and privacy, Facebook, Google, MySpace
CITATION
Moo Nam Ko, Gorrell P. Cheek, Mohamed Shehab, Ravi Sandhu, "Social-Networks Connect Services", Computer, vol.43, no. 8, pp. 37-43, August 2010, doi:10.1109/MC.2010.239
REFERENCES
1. G.A. Wang et al., "Automatically Detecting Criminal Identity Deception: An Adaptive Detection Algorithm," IEEE Trans. Systems, Man, and Cybernetics, Part A: Systems and Humans, vol. 36, no. 5, 2006, pp. 988-999.
2. J. Xu et al., "Complex Problem Solving: Identity Matching Based on Social Contextual Information," J. Assoc Information Systems, vol. 8, no. 10, 2007, pp. 525-545.
3. M. Sutterer, O. Droegehorn, and K. David, "Making a Case for Situation-Dependent User Profiles in Context-Aware Environments," Proc. 2007 Workshop Middleware for Next-Generation Converged Networks and Applications (MNCNA 07), ACM Press, 2007, pp. 1-6.
4. A. Tootoonchian et al., "Lockr: Social Access Control for Web 2.0," Proc. 1st Workshop Online Social Networks (WOSP 08), ACM Press, 2008, pp. 43-48.
5. M. Mannan and P.C. van Oorschot, "Privacy-Enhanced Sharing of Personal Content on the Web," Proc. 17th Int'l Conf. World Wide Web (WWW 08), ACM Press, 2008, pp. 487-496.
6. S.-T. Sun, K. Hawkey, and K. Beznosov, "Secure Web 2.0 Content Sharing beyond Walled Gardens," Proc. 2009 Ann. Computer Security Applications Conf. (ACSAC 09), IEEE CS Press, 2009, pp. 409-418.
7. B. Vrancken and Z. Zeltsan, "Using OAuth for Recursive Delegation," v01, Internet Eng. Task Force draft, Feb. 2010; http://tools.ietf.org/htmldraft-vrancken-oauth-redelegation-01 .
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool