FaceTrust: Assessing the Credibility of Online Personas via Social Networks

نویسندگان

  • Michael Sirivianos
  • Xiaowei Yang
  • Kyungbaek Kim
چکیده

Despite the large volume of societal interactions taking place on the Internet, it is still hard to assess the credibility of identity statements made by online users. The digital credentials issued by trustworthy certificate authorities partially address this problem, but a tedious registration and verification process as well as its high cost hinder the wide adoption of this solution. This paper presents FaceTrust a system that leverages online social networks to provide lightweight, flexible and relaxed credentials that enable users to assess the credibility of others and their assertions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Internet, “Am I Really not a Dog?” Assessing the Veracity of Identity Assertions via OSNs

Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the veracity of assertions that online users make about their identity attributes, such as age or profession. We propose FaceTrust, a system that uses online social networks to provide lightweight identity credentials while ...

متن کامل

FaceTrust: Collaborative Unwanted Traffic Mitigation Using Social Networks

Current unwanted traffic mitigation techniques are heavily reliant on centralized infrastructures and place trust on a small number of security authorities. As a result, they offer limited threat coverage and slow response times. To address this problem, we propose FaceTrust: a large scale collaborative system for the rapid propagation of reports concerning the behavior of Internet entities (ho...

متن کامل

FaceTrust: Collaborative Threat Mitigation Using Social Networks

Unwanted traffic mitigation can be broadly classified into two main approaches: a) centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and b) highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage and slow response times....

متن کامل

Proposing a model for entrepreneurship opportunities and challenges in online social networks in Iran

Human life has been affected by new communications in recent years. The development of cyberspace has led to businesses embracing social networks. The appearance of the cyberspace and features offered by information technology (IT) has provided hope, wishes, opportunities, and challenges for business owners. Organizations create opportunities for improving productivity, market share and value, ...

متن کامل

Relationship between the Online Social Networks Addiction and Psychological Disorders

Background: The Online social networks addiction like others type of addiction can lead to ethical dilemmas, as well as it can be affected from psychological disorders. So, the aim of this research is to analyze the effect of depression, anxiety and usage time of online social networks on the level of online social networks addiction and on the life satisfaction. Method: The method of research ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009