Abstract
This paper introduces the security problems of social networks and the research topics of core nodes, relationship, structures of social network, and so on. This paper discusses the importance of “security relationship” in social networks, analyzes the relevance between security risks and events, and adopts the qualitative and quantitative mechanism based on grade partition, numerical measure, polymorphic data fusion, and the logical relevance. Based on Bayesian network, this paper proposes a kind of assessment model for the situation of security relationship in social networks so as to provide theoretical bases for the perception and prediction of security situation in social networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
360 Internet Security College, Internet Security Report in China from 2011 to 2012:11-12 (in Chinese)
Kong, Q.: Research of Privacy Protection for Personal Information and Relationship of the Social Network, pp. 8–9. Zhejiang University of Technology (2011) (in Chinese)
Lei, W.: The Study of Community Discovery Method on Large-scale Social Network, pp. 17–18. Soochow University (2009) (in Chinese)
Kernighan, B.W., Lin, S.: An efficient heuristic procedure for partitioning graphs. Bell System Tech. J. 49(2), 291–307 (1970)
Barnes, E.R.: An algorithm for partitioning the nodes of a graph. SIAM J. Alg. Disc. Meth. 3(4), 541–550 (1982)
Flake, G.W., Lawrence, S., Giles, C.L.: Efficient identification of Web communities. In: Proceedings of the sixth ACM International Conference on Knowledge Discovery and Da- ta Mining, SIGKDD 2000, pp. 150–160. ACM, New York (2000)
Flake, G.W., Lawrence, S., Giles, C.L., Coetzee, F.M.: Self-organization and identification of Web communities. IEEE Computer 35(3), 66–70 (2002)
Girvan, M., Newman, M.E.J.: Community structure in social and biological net-works. Proc. Natl. Acad. Sci. 9(12), 7821–7826 (2002)
Palla, G., Derenyi, I., Farkas, I., Vicsek, T.: Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043), 814–818 (2005)
Palla, G., Barabasi, A.-L., Vicsek, T.: Quantifying social group evolution. Nature 446(7316), 664–667 (2007)
Brin, S., Page, L.: The anatomy of a large-scale hypertextual Web-search engine. In: Proc 7th International World Wide Web Conference, pp. 146–164. SIGIR, Brisbane (1998)
Kleinberg, J.: Authoritative sources in a hyperlinked environ-ment. In: Proceedings of the 9th ACM-SIAM Symposium on Discrete Algorithms, pp. 668–677. ACM, New York (1998)
Freeman, L.C.: Centrality in social networks: Conceptual clarification. Social Networks 1(3), 215–239 (1979)
Song, W., Liu, H., Wang, C., Xie, J.: Core nodes detection based on frequent itemsets of graph. Journal of Frontiers of Computer Science and Technology 04(01), 84–86 (2010) (in Chinese)
Tang, C., Liu, W., Wen, F., Qiao, S.: Three probes into the social network and Consortium Information Mining. Journal of Computer Applications 26(9), 2020–2023 (2006) (in Chinese)
Lu, L., Zhang, Y.-C., Yeung, C.H., Zhou, T.: Leaders in social networks, the delicious case. PLoS ONE 6(6), e21202 (2011)
Kempe, D., Kleinberg, J.M., Tardos, E.: Maximizing the spread of influence through a social network. In: The 9th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM, New York (2003)
Watts, D.: A simple model of global cascades in random networks. Proc. Natl. Acad. Sci. 99(9), 5766–5771 (2002)
Ji, J., Han, X., Wang, Z.: Community Influence Maximizing Based on Comprehensive Cascade Diffuse Model. Journal of Jilin University (Science Edition) 47(5), 1032–1035 (2009) (in Chinese)
Wang, X., Li, X., et al.: Theory and Application of Complex Network, pp. 72–98. Tsinghua University Press, Beijing (2006) (in Chinese)
Mahajan, V., Muller, E., Bass, F.: New Product Diffusion Models in Marketing: A Review and Directions for Research. Journal of Marketing 54(l), l–26 (1990)
Even-Dar, E., Shapira, A.: A Note on Maximizing the Spread of Influence in Social Networks. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, vol. 4858, pp. 281–286. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, L., Xiaoyan, W., Ying, S., Jian-long, T. (2013). Research of Security Relationship Based on Social Networks. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_69
Download citation
DOI: https://doi.org/10.1007/978-3-642-35795-4_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35794-7
Online ISBN: 978-3-642-35795-4
eBook Packages: Computer ScienceComputer Science (R0)