Abstract
Welcome to the penultimate talk of the workshop. I will be talking today about hidden friendship relations, and I will introduce you to the concept of what hidden friendship relations are, say why we need them, and I will also explain how we can achieve them.
I will do so with the perspective on privacy, and focusing on distributed architectures. What has come up during the past few days is social networking in all of the scenarios that we have seen, and all the applications that can be run on these, and experiments we can do in social networks. Here you can see a screenshot of social network, it’s a profile page for Friendster, and besides the fact that there’s this nice guy, we have his friends over here, and friendship relations are the underlying relations that build a social network, so it can be used as a core to build higher level concepts. It’s simple, but it’s formalised, you can easily crawl it and so forth. There’s also an interesting function property about friendship, that it’s symmetric, so here we have Gwen, and if we browse to Gwen’s profile page and look up her friends we see that Hennesey is again there. So we have the symmetry that is enforced across the network, that’s an important property about friendship relations. Another thing is that they carry the property, to allow privileged actions, so if I have someone, you look over there to the left you can see that you can forward the profile page to one of your own friends but you can’t forward their profile page to other friends. So this privileged action that is based on friendship can also have privileges that are with regard to resources such as hiding some things in the profile. This is what I will call the positive privacy of friendship relations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Preibusch, S. (2013). Establishing Distributed Hidden Friendship Relations. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-36213-2_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36212-5
Online ISBN: 978-3-642-36213-2
eBook Packages: Computer ScienceComputer Science (R0)