Skip to main content
Erschienen in: Social Network Analysis and Mining 1/2013

01.03.2013 | Review Article

Enabling cross-site interactions in social networks

verfasst von: Mohamed Shehab, Moonam Ko, Hakim Touati

Erschienen in: Social Network Analysis and Mining | Ausgabe 1/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Online social networks is one of the major technological phenomena on the Web 2.0. Hundreds of millions of people are posting articles, photos, and videos on their profiles and interacting with other people, but the sharing and interaction are limited within a same social network site. Although users can share some contents in a social network site with people outside of the social network site using a secret address of content, appropriate access control mechanisms are still not supported. To overcome this limitation, we propose a cross-site interaction framework x-mngr, allowing users to interact with users in other social network sites, with a cross-site access control policy, which enables users to specify policies that allow/deny access to their shared contents across social network sites. We also propose a partial mapping approach based on a supervised learning mechanism to map user’s identities across social network sites. We implemented our proposed framework through a photo album sharing application that shares user’s photos between Facebook and MySpace based on the cross-site access control policy that is defined by the content owner. Furthermore, we provide mechanisms to enable users to fuse user-mapping decisions that are provided by their friends or others in the social network. We implemented our framework and through extensive experimentation we prove the accuracy and precision of our proposed mechanisms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
IRB Protocol No: 09-03-16, Title: Cross-site Interaction between Social Networks.
 
Literatur
Zurück zum Zitat Barbosa L, Freire J (2007) Combining classifiers to identify online databases. In: WWW ’07: Proceedings of the 16th international conference on World Wide Web. ACM, New York, pp 431–440 Barbosa L, Freire J (2007) Combining classifiers to identify online databases. In: WWW ’07: Proceedings of the 16th international conference on World Wide Web. ACM, New York, pp 431–440
Zurück zum Zitat Barreno M, Bartlett PL, Chi FJ, Joseph AD, Nelson B, Rubinstein BI, Saini U, Tygar JD (2008) Open problems in the security of learning. In: AISec ’08: Proceedings of the 1st ACM workshop on Workshop on AISec. ACM, New York, pp 19–26 Barreno M, Bartlett PL, Chi FJ, Joseph AD, Nelson B, Rubinstein BI, Saini U, Tygar JD (2008) Open problems in the security of learning. In: AISec ’08: Proceedings of the 1st ACM workshop on Workshop on AISec. ACM, New York, pp 19–26
Zurück zum Zitat Borgatti SP, Everett MG (2006) A graph-theoretic perspective on centrality. Soc Netw 28(4):466–484CrossRef Borgatti SP, Everett MG (2006) A graph-theoretic perspective on centrality. Soc Netw 28(4):466–484CrossRef
Zurück zum Zitat Boyd D (2008) Taken out of context: American teen sociality in networked publics. Phd dissertation, University of California-Berkeley, School of Information Boyd D (2008) Taken out of context: American teen sociality in networked publics. Phd dissertation, University of California-Berkeley, School of Information
Zurück zum Zitat Branckaute F (2010) Twitter’s meteoric rise compared to facebook [infographic]. The Blog Herald Branckaute F (2010) Twitter’s meteoric rise compared to facebook [infographic]. The Blog Herald
Zurück zum Zitat Brandes U, Erlebach T (2005) Network analysis: methodological foundations, 1st edn. Springer, Berlin, Heidelberg Brandes U, Erlebach T (2005) Network analysis: methodological foundations, 1st edn. Springer, Berlin, Heidelberg
Zurück zum Zitat Bratko A, Filipič B, Cormack GV, Lynam TR, Zupan B (2006) Spam filtering using statistical data compression models. J Mach Learn Res 7:2673–2698MathSciNetMATH Bratko A, Filipič B, Cormack GV, Lynam TR, Zupan B (2006) Spam filtering using statistical data compression models. J Mach Learn Res 7:2673–2698MathSciNetMATH
Zurück zum Zitat Carminati B, Ferrari E, Perego A (2006) Rule-based access control for social networks. In: On the move to meaningful internet systems 2006: OTM 2006 Workshops, vol 4278, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, pp 1734–1744 Carminati B, Ferrari E, Perego A (2006) Rule-based access control for social networks. In: On the move to meaningful internet systems 2006: OTM 2006 Workshops, vol 4278, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, pp 1734–1744
Zurück zum Zitat Fang L, LeFevre K (2010) Privacy wizards for social networking sites. In: Proceedings of the 19th international conference on World wide web, WWW ’10. ACM, New York, pp 351–360 Fang L, LeFevre K (2010) Privacy wizards for social networking sites. In: Proceedings of the 19th international conference on World wide web, WWW ’10. ACM, New York, pp 351–360
Zurück zum Zitat Fazeen M, Dantu R, Guturu P (2011) Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc Netw Anal Min 1:241–254CrossRef Fazeen M, Dantu R, Guturu P (2011) Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc Netw Anal Min 1:241–254CrossRef
Zurück zum Zitat Fumera G, Pillai I, Roli F (2006) Spam filtering based on the analysis of text information embedded into images. J Mach Learn Res 7: 2699–2720 Fumera G, Pillai I, Roli F (2006) Spam filtering based on the analysis of text information embedded into images. J Mach Learn Res 7: 2699–2720
Zurück zum Zitat Gilbert F, Simonetto P, Zaidi F, Jourdan F, Bourqui R (2011) Communities and hierarchical structures in dynamic social networks: analysis and visualization. Soc Netw Anal Min 1:83–95CrossRef Gilbert F, Simonetto P, Zaidi F, Jourdan F, Bourqui R (2011) Communities and hierarchical structures in dynamic social networks: analysis and visualization. Soc Netw Anal Min 1:83–95CrossRef
Zurück zum Zitat Gollu KK, Saroiu S, Wolman A (2007) A social networking-based access control scheme for personal content. In: Proceedings of 21st ACM symposium on operating systems principles (SOSP ’07). Work in progress Gollu KK, Saroiu S, Wolman A (2007) A social networking-based access control scheme for personal content. In: Proceedings of 21st ACM symposium on operating systems principles (SOSP ’07). Work in progress
Zurück zum Zitat Gong L, Qian X (1994) The complexity and composability of secure interoperation. In: SP ’94: Proceedings of IEEE symposium on security and privacy. IEEE Computer Society, pp 190–200 Gong L, Qian X (1994) The complexity and composability of secure interoperation. In: SP ’94: Proceedings of IEEE symposium on security and privacy. IEEE Computer Society, pp 190–200
Zurück zum Zitat Gong L, Qian X (1996) Computational issues in secure interoperation. IEEE Transact Softw Eng 22(1):43–52CrossRef Gong L, Qian X (1996) Computational issues in secure interoperation. IEEE Transact Softw Eng 22(1):43–52CrossRef
Zurück zum Zitat Kittler J, Hatef M, Duin RP, Matas J (1998) On combining classifiers. IEEE Transact Pattern Anal Mach Intelligence 20(3):226–239CrossRef Kittler J, Hatef M, Duin RP, Matas J (1998) On combining classifiers. IEEE Transact Pattern Anal Mach Intelligence 20(3):226–239CrossRef
Zurück zum Zitat Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions, and reversals. Technical Report 8, Soviet Physics Doklady Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions, and reversals. Technical Report 8, Soviet Physics Doklady
Zurück zum Zitat Liu B (2007) Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications), 1st edn. Springer Liu B (2007) Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications), 1st edn. Springer
Zurück zum Zitat Maes S, Tuyls K, Vanschoenwinkel B, Manderick B (1993) Credit card fraud detection using bayesian and neural networks. In: Maciunas RJ (ed) Interactive image-guided neurosurgery. American Association Neurological Surgeons, pp 261–270 Maes S, Tuyls K, Vanschoenwinkel B, Manderick B (1993) Credit card fraud detection using bayesian and neural networks. In: Maciunas RJ (ed) Interactive image-guided neurosurgery. American Association Neurological Surgeons, pp 261–270
Zurück zum Zitat Newman MEJ (2001) Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Phys Rev E 64(1):016132 Newman MEJ (2001) Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Phys Rev E 64(1):016132
Zurück zum Zitat Ni Q, Lobo J, Calo S, Rohatgi P, Bertino E (2009) Automating role-based provisioning by learning from examples. In: The Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT 2009) Ni Q, Lobo J, Calo S, Rohatgi P, Bertino E (2009) Automating role-based provisioning by learning from examples. In: The Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT 2009)
Zurück zum Zitat Perols J, Chari K, Agrawal M (2009) Information market-based decision fusion. Manage Sci 55(5):827–842CrossRef Perols J, Chari K, Agrawal M (2009) Information market-based decision fusion. Manage Sci 55(5):827–842CrossRef
Zurück zum Zitat Saravanan M, Prasad G, Karishma S, Suganthi D (2011) Analyzing and labeling telecom communities using structural properties. Soc Netw Anal Min 1:271–286CrossRef Saravanan M, Prasad G, Karishma S, Suganthi D (2011) Analyzing and labeling telecom communities using structural properties. Soc Netw Anal Min 1:271–286CrossRef
Zurück zum Zitat Scott J (2011) Social network analysis: developments, advances, and prospects. Soc Netw Anal Min 1:21–26CrossRef Scott J (2011) Social network analysis: developments, advances, and prospects. Soc Netw Anal Min 1:21–26CrossRef
Zurück zum Zitat Shehab M, Bertino E, Ghafoor A (2005) Secure collaboration in mediator-free environments. In: Proceedings of the 12th ACM conference on computer and communications security, CCS ’05. ACM Press, New York, pp 58–67 Shehab M, Bertino E, Ghafoor A (2005) Secure collaboration in mediator-free environments. In: Proceedings of the 12th ACM conference on computer and communications security, CCS ’05. ACM Press, New York, pp 58–67
Zurück zum Zitat Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC (2010) Learning based access control in online social networks. In: Proceedings of the 19th international conference on World wide web, WWW ’10. ACM, New York Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC (2010) Learning based access control in online social networks. In: Proceedings of the 19th international conference on World wide web, WWW ’10. ACM, New York
Zurück zum Zitat Short JF, Hughes LA (2006) Studying youth gangs. AltaMira Press, New York Short JF, Hughes LA (2006) Studying youth gangs. AltaMira Press, New York
Zurück zum Zitat Sinclair C, Pierce L, Matzner S (1999) An application of machine learning to network intrusion detection. Computer Secur Appl Conf Ann 0:371 Sinclair C, Pierce L, Matzner S (1999) An application of machine learning to network intrusion detection. Computer Secur Appl Conf Ann 0:371
Zurück zum Zitat Wang G, Chen H, Atabakhsh H (2004) Automatically detecting deceptive criminal identities. Commun ACM 47(3):70–76CrossRef Wang G, Chen H, Atabakhsh H (2004) Automatically detecting deceptive criminal identities. Commun ACM 47(3):70–76CrossRef
Zurück zum Zitat Wang GA, Chen H, Xu JJ, Atabakhsh H (2006) Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Trans Syst Man Cybern Part A 36(5):988–999CrossRef Wang GA, Chen H, Xu JJ, Atabakhsh H (2006) Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Trans Syst Man Cybern Part A 36(5):988–999CrossRef
Zurück zum Zitat Wasserman S, Faust K (1994) Social network analysis: methods and applications, illustrated edn. Cambridge University Press, Cambridge Wasserman S, Faust K (1994) Social network analysis: methods and applications, illustrated edn. Cambridge University Press, Cambridge
Zurück zum Zitat Witten IH, Frank E (2005) Data Mining: practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann, San Francisco. ISBN: 0120884070 Witten IH, Frank E (2005) Data Mining: practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann, San Francisco. ISBN: 0120884070
Zurück zum Zitat Xu J, Wang G.A, Li J, Chau M (2007) Complex problem solving: identity matching based on social contextual information. J Assoc Inform Syst 8(10):525–545 (Article 2) Xu J, Wang G.A, Li J, Chau M (2007) Complex problem solving: identity matching based on social contextual information. J Assoc Inform Syst 8(10):525–545 (Article 2)
Metadaten
Titel
Enabling cross-site interactions in social networks
verfasst von
Mohamed Shehab
Moonam Ko
Hakim Touati
Publikationsdatum
01.03.2013
Verlag
Springer Vienna
Erschienen in
Social Network Analysis and Mining / Ausgabe 1/2013
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-012-0051-2

Weitere Artikel der Ausgabe 1/2013

Social Network Analysis and Mining 1/2013 Zur Ausgabe

Premium Partner