Computational Social Networks - Security and Privacy
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F12%3APU101771" target="_blank" >RIV/00216305:26230/12:PU101771 - isvavai.cz</a>
Výsledek na webu
<a href="http://www.springer.com/computer/communication+networks/book/978-1-4471-4050-4" target="_blank" >http://www.springer.com/computer/communication+networks/book/978-1-4471-4050-4</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/978-1-4471-4051-1_13" target="_blank" >10.1007/978-1-4471-4051-1_13</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Computational Social Networks - Security and Privacy
Popis výsledku v původním jazyce
This chapter is dealing with anonymous communication. We want to extend the knowledge of security limits of anonymity systems with information based on real-world traffic data. We perform a set of analyses targeting the behavioural patterns of users andtheir impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested in are inter-arrival times, the number of messages sentby an individual user. The importance of our analyses' results for the design and implementation of anonymity systems is discussed. The second part of the analyses are focused on social networks. Information about user profiling, properties of identiable social networks and their development in time are presented in the context of the security of anonymous systems.
Název v anglickém jazyce
Computational Social Networks - Security and Privacy
Popis výsledku anglicky
This chapter is dealing with anonymous communication. We want to extend the knowledge of security limits of anonymity systems with information based on real-world traffic data. We perform a set of analyses targeting the behavioural patterns of users andtheir impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested in are inter-arrival times, the number of messages sentby an individual user. The importance of our analyses' results for the design and implementation of anonymity systems is discussed. The second part of the analyses are focused on social networks. Information about user profiling, properties of identiable social networks and their development in time are presented in the context of the security of anonymous systems.
Klasifikace
Druh
C - Kapitola v odborné knize
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
Z - Vyzkumny zamer (s odkazem do CEZ)<br>S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2012
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název knihy nebo sborníku
Computational Social Networks - Security and Privacy
ISBN
978-1-4471-4050-4
Počet stran výsledku
30
Strana od-do
311-340
Počet stran knihy
347
Název nakladatele
Springer London
Místo vydání
London
Kód UT WoS kapitoly
—