Skip to main content

Research of Security Relationship Based on Social Networks

  • Conference paper
Trustworthy Computing and Services (ISCTCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 320))

Included in the following conference series:

  • 3190 Accesses

Abstract

This paper introduces the security problems of social networks and the research topics of core nodes, relationship, structures of social network, and so on. This paper discusses the importance of “security relationship” in social networks, analyzes the relevance between security risks and events, and adopts the qualitative and quantitative mechanism based on grade partition, numerical measure, polymorphic data fusion, and the logical relevance. Based on Bayesian network, this paper proposes a kind of assessment model for the situation of security relationship in social networks so as to provide theoretical bases for the perception and prediction of security situation in social networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 360 Internet Security College, Internet Security Report in China from 2011 to 2012:11-12 (in Chinese)

    Google Scholar 

  2. Kong, Q.: Research of Privacy Protection for Personal Information and Relationship of the Social Network, pp. 8–9. Zhejiang University of Technology (2011) (in Chinese)

    Google Scholar 

  3. Lei, W.: The Study of Community Discovery Method on Large-scale Social Network, pp. 17–18. Soochow University (2009) (in Chinese)

    Google Scholar 

  4. Kernighan, B.W., Lin, S.: An efficient heuristic procedure for partitioning graphs. Bell System Tech. J. 49(2), 291–307 (1970)

    MATH  Google Scholar 

  5. Barnes, E.R.: An algorithm for partitioning the nodes of a graph. SIAM J. Alg. Disc. Meth. 3(4), 541–550 (1982)

    Article  MATH  Google Scholar 

  6. Flake, G.W., Lawrence, S., Giles, C.L.: Efficient identification of Web communities. In: Proceedings of the sixth ACM International Conference on Knowledge Discovery and Da- ta Mining, SIGKDD 2000, pp. 150–160. ACM, New York (2000)

    Chapter  Google Scholar 

  7. Flake, G.W., Lawrence, S., Giles, C.L., Coetzee, F.M.: Self-organization and identification of Web communities. IEEE Computer 35(3), 66–70 (2002)

    Article  Google Scholar 

  8. Girvan, M., Newman, M.E.J.: Community structure in social and biological net-works. Proc. Natl. Acad. Sci. 9(12), 7821–7826 (2002)

    Article  MathSciNet  Google Scholar 

  9. Palla, G., Derenyi, I., Farkas, I., Vicsek, T.: Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043), 814–818 (2005)

    Article  Google Scholar 

  10. Palla, G., Barabasi, A.-L., Vicsek, T.: Quantifying social group evolution. Nature 446(7316), 664–667 (2007)

    Article  Google Scholar 

  11. Brin, S., Page, L.: The anatomy of a large-scale hypertextual Web-search engine. In: Proc 7th International World Wide Web Conference, pp. 146–164. SIGIR, Brisbane (1998)

    Google Scholar 

  12. Kleinberg, J.: Authoritative sources in a hyperlinked environ-ment. In: Proceedings of the 9th ACM-SIAM Symposium on Discrete Algorithms, pp. 668–677. ACM, New York (1998)

    Google Scholar 

  13. Freeman, L.C.: Centrality in social networks: Conceptual clarification. Social Networks 1(3), 215–239 (1979)

    Article  Google Scholar 

  14. Song, W., Liu, H., Wang, C., Xie, J.: Core nodes detection based on frequent itemsets of graph. Journal of Frontiers of Computer Science and Technology 04(01), 84–86 (2010) (in Chinese)

    Google Scholar 

  15. Tang, C., Liu, W., Wen, F., Qiao, S.: Three probes into the social network and Consortium Information Mining. Journal of Computer Applications 26(9), 2020–2023 (2006) (in Chinese)

    Google Scholar 

  16. Lu, L., Zhang, Y.-C., Yeung, C.H., Zhou, T.: Leaders in social networks, the delicious case. PLoS ONE 6(6), e21202 (2011)

    Google Scholar 

  17. Kempe, D., Kleinberg, J.M., Tardos, E.: Maximizing the spread of influence through a social network. In: The 9th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM, New York (2003)

    Chapter  Google Scholar 

  18. Watts, D.: A simple model of global cascades in random networks. Proc. Natl. Acad. Sci. 99(9), 5766–5771 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  19. Ji, J., Han, X., Wang, Z.: Community Influence Maximizing Based on Comprehensive Cascade Diffuse Model. Journal of Jilin University (Science Edition) 47(5), 1032–1035 (2009) (in Chinese)

    Google Scholar 

  20. Wang, X., Li, X., et al.: Theory and Application of Complex Network, pp. 72–98. Tsinghua University Press, Beijing (2006) (in Chinese)

    Google Scholar 

  21. Mahajan, V., Muller, E., Bass, F.: New Product Diffusion Models in Marketing: A Review and Directions for Research. Journal of Marketing 54(l), l–26 (1990)

    Google Scholar 

  22. Even-Dar, E., Shapira, A.: A Note on Maximizing the Spread of Influence in Social Networks. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, vol. 4858, pp. 281–286. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, L., Xiaoyan, W., Ying, S., Jian-long, T. (2013). Research of Security Relationship Based on Social Networks. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_69

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35795-4_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35794-7

  • Online ISBN: 978-3-642-35795-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics