Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Establishing Distributed Hidden Friendship Relations

(Transcript of Discussion)

  • Conference paper
Security Protocols XVII (Security Protocols 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7028))

Included in the following conference series:

Abstract

Welcome to the penultimate talk of the workshop. I will be talking today about hidden friendship relations, and I will introduce you to the concept of what hidden friendship relations are, say why we need them, and I will also explain how we can achieve them.

I will do so with the perspective on privacy, and focusing on distributed architectures. What has come up during the past few days is social networking in all of the scenarios that we have seen, and all the applications that can be run on these, and experiments we can do in social networks. Here you can see a screenshot of social network, it’s a profile page for Friendster, and besides the fact that there’s this nice guy, we have his friends over here, and friendship relations are the underlying relations that build a social network, so it can be used as a core to build higher level concepts. It’s simple, but it’s formalised, you can easily crawl it and so forth. There’s also an interesting function property about friendship, that it’s symmetric, so here we have Gwen, and if we browse to Gwen’s profile page and look up her friends we see that Hennesey is again there. So we have the symmetry that is enforced across the network, that’s an important property about friendship relations. Another thing is that they carry the property, to allow privileged actions, so if I have someone, you look over there to the left you can see that you can forward the profile page to one of your own friends but you can’t forward their profile page to other friends. So this privileged action that is based on friendship can also have privileges that are with regard to resources such as hiding some things in the profile. This is what I will call the positive privacy of friendship relations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Preibusch, S. (2013). Establishing Distributed Hidden Friendship Relations. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36213-2_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36212-5

  • Online ISBN: 978-3-642-36213-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics