Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
نویسندگان
چکیده
This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every member has the ability to identify each other within their private social network by name, gender, age, location, and the specific usage patterns adopted by the group. Utopia protects members by understanding how the social network is created and the specific aspects of the group that make it unique and identifiable. The main focus of Utopia is the protection of the group, and their privacy within a social network from predators and spammers that characteristically do not fit within the well defined usage boundaries of the social network as a whole. The solution set provides defensive, as well as offensive tools to identify these threats. Once identified, client desktop tools are used to prevent these predators from further interaction within the group. In addition, offensive tools are used to determine the origin of the predator to allow actions to be taken by automated tools and law enforcement to alleviate the threat.
منابع مشابه
Being trusted: How team generational age diversity promotes and undermines trust in cross‐boundary relationships
We examine how demographic context influences the trust that boundary spanners experience in their dyadic relationships with clients. Because of the salience of age as a demographic characteristic as well as the increasing prevalence of age diversity and intergenerational conflict in the workplace, we focus on team age diversity as a demographic social context that affects trust between boundar...
متن کاملTrusted Destination Sequenced Distance Vector Routing Protocol for Mobile Ad-hoc Network
A Mobile Ad hoc Network (MANET) is a self-organized system comprised of mobile wireless nodes with peer relationships. MANETs can operate without fixed infrastructure and can survive rapid changes in the network topology. Due to multi-hop routing and absence of any trusted third party in open environment, MANETs are vulnerable to attacks by malicious nodes or unwanted packet forwarding through ...
متن کاملBootstrapping Security in Personal Area Networks
Providing key pre-distribution in personal area networks (PANs) remains a challenging problem, in particular because of the unique characteristics of, and constraints on, such networks. Several key pre-distribution schemes have been proposed for use in PANs, but these schemes only support key management within a PAN. In a ubiquitous environment, however, users with multiple personal wireless de...
متن کاملCausal Layered Analysis of Good Governance in Islamic Utopia
Since ancient times, humankind has aspired to create an ideal society and live in an environment free of problems and difficulties, a utopia with high levels of excellence, bringing him happiness and satisfaction. Great western philosophers and eminent oriental sages have articulated their ideas and revealed their dreams about the characteristics of people and traits of governors of such ideal ...
متن کاملA Trusted Handoff Decision Scheme for the Next Generation Wireless Networks
Fourth Generation Wireless Networks (FGWN) consists of heterogeneous networks managed by different operators (or service providers). The provision of continuous services for mobile nodes is a main issue for the FGWN, Thus, it is necessary to provide seamless handover while moving in such environment. Moreover, the establishment of trust relationships between FGWN’s entities poses a major challe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009