You are previewing Social Network Engineering for Secure Web Data and Services.
O'Reilly logo
Social Network Engineering for Secure Web Data and Services

Book Description

While the innovation and phenomenon of social network applications has greatly impacted society, the economy, and the technological pool of the internet; these platforms are not only used for content sharing purposes. They are also used to support and develop new services and applications. Social Network Engineering for Secure Web Data and Services provides empirical research on the engineering of social network infrastructures, the development of novel applications, and the impact of social network- based services over the internet. This comprehensive collection highlights issues and solutions developed to prevent security threats and introduce proper countermeasures for attacks on every level. This book is useful for professionals and researchers in the field of social network and web security.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  5. Foreword
  6. Preface
  7. Section 1: Fundamentals
    1. Chapter 1: On Social Network Engineering for Secure Web Data and Services
      1. ABSTRACT
      2. INTRODUCTION
    2. Chapter 2: Identity, Credibility, and Trust in Social Networking Sites
      1. ABSTRACT
      2. INTRODUCTION
      3. MAIN CONCEPTS: SOCIAL NETWORKS AND SOCIAL NETWORKING SITES
      4. MAIN ISSUES IN SOCIAL NETWORKING SITES
      5. EMERGING TRENDS AND NEW THREATS: PRIVACY AS THE “ELEPHANT IN THE ROOM”
      6. CONCLUSION
    3. Chapter 3: Access Control Models for Online Social Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND AND PRELIMINARY NOTIONS
      4. ACCESS CONTROL IN ONLINE SOCIAL NETWORKS
      5. DISTRIBUTED ACCESS CONTROL FOR OSNS
      6. ACCESS CONTROL MODELS FOR EXISTING OSNS
      7. OPEN PROBLEMS AND FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
  8. Section 2: Applications
    1. Chapter 4: Social Interactions and Automated Detection Tools in Cyberbullying
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND ON CYBERBULLYING
      4. AUTOMATED TOOLS TO DETECT CYBERBULLYING
      5. FUTURE RESEARCH DIRECTIONS IN DEVELOPING AUTOMATED TOOLS TO DETECT CYBERBULLYING
      6. CONCLUSION
    2. Chapter 5: Social Networks and Collective Intelligence
      1. ABSTRACT
      2. INTRODUCTION
      3. TRADITIONAL MEDIA
      4. INTERNET AND SEARCH ENGINES
      5. SOCIAL NETWORKS
      6. TRUST, PRIVACY, AND SECURITY IN SOCIAL NETWORKING
      7. SYNOPSIS
      8. POLIDOXA AND TRUST
      9. SOCIAL NETWORKS, SWARMS, AND COLLECTIVE INTELLIGENCE
      10. POLIDOXA@TWITTER
      11. RELATED WORKS
      12. FUTURE WORKS
      13. CONCLUSION
    3. Chapter 6: Distributed Social Platforms for Confidentiality and Resilience
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURITY IN DISTRIBUTED SOCIAL NETWORKING SYSTEMS
      5. DISTRIBUTED SOCIAL NETWORKING SYSTEMS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    4. Chapter 7: Retrieval of Personal Public Data on Social Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. THE CS-UDD PROTOTYPE: AN OVERVIEW
      4. EXPERIMENTAL ANALYSIS ON THE RETRIEVAVILITY OF USER DATA
      5. CONCLUSION
  9. Section 3: Security
    1. Chapter 8: Privacy Issues in Social Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. PRIVACY IN SOCIAL NETWORKS
      4. THREATS, VULNERABILITIES AND COUNTERMEASURES FOR PROTECTING PRIVACY IN SOCIAL NETWORKS
      5. PRIVACY MODELS AND MECHANISMS FOR SOCIAL NETWORKS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    2. Chapter 9: A Graph-Based Approach to Model Privacy and Security Issues of Online Social Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. A REVIEW OF FEATURES AND TECHNOLOGIES OF OSN APPLICATIONS
      5. CONCLUSION
    3. Chapter 10: Security and Privacy of Online Social Network Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURITY AND PRIVACY OF ONLINE SOCIAL NETWORK APPLICATION PLATFORMS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    4. Chapter 11: On the Use of Formal Methods to Enforce Privacy-Aware Social Networking
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE POPORO TOOL
      5. REAL WORLD APPLICATION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    5. Chapter 12: Web Malware that Targets Web Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. WEB APPLICATION ATTACK
      5. WEB APPLICATION VULNERABILITIES EXPLOITED
      6. WEB APPLICATIONS THREAT
      7. SQL INJECTION ATTACKS (SQLIA)
      8. CASE SCENARIO: THE ZEUS BOTNET THREAT
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
  10. Compilation of References
  11. About the Contributors