About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2008
AIPACA 2008SOSOC 2008
Other Years
Ethics and Malpractice Statement

    SOSOC

    1st International ICST Workshop on Security in Opportunistic and Social Networks

    Opportunistic Networks are considered as an evolution of the Mobile Ad-hoc Networking paradigm, in which the assumption of an existing end-to-end connectivity is relaxed. The evolving topologies are expected to resemble the actual social networks of the communicating users and information on their …

    Opportunistic Networks are considered as an evolution of the Mobile Ad-hoc Networking paradigm, in which the assumption of an existing end-to-end connectivity is relaxed. The evolving topologies are expected to resemble the actual social networks of the communicating users and information on their characteristics can be a powerful aid for any network operation. Online services that assist social networks (facebook, linkedin, xing, etc.) in consequence are able to provide additional information on contacts and their relations. The lack of end-to-end connectivity and the use of personal information for the networking operations raise entirely new privacy concerns and require new reflections on security problems.

    The aim of this workshop is to encompass research advances in all areas of security, trust and privacy in Opportunistic and Social Networks.

    more »
    Editor(s): Albert Levi (Sabancı University, Turkey), Peng Liu (Penn State University, USA) and Refik Molva (Eurecom, France)
    Publisher
    ACM
    ISBN
    978-1-60558-241-2
    Conference dates
    22nd Sep 2008
    Location
    Istanbul, Turkey
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 ACM

    Ordered by title or year
    Showing 1–3 of 3 results
    Page size: 102550
    • 1
    • A Key Management Solution for Overlay-Live-Streaming

      Research Article in 1st International ICST Workshop on Security in Opportunistic and Social Networks

      Mathias Fischer, Guenter Schaefer, Robert Schmidt, Thorsten Strufe
    • On the need for user-defined fine-grained access control policies for social networking applications

      Research Article in 1st International ICST Workshop on Security in Opportunistic and Social Networks

      Andrew Simpson
    • Reputation and Audits for Self-Organizing Storage

      Research Article in 1st International ICST Workshop on Security in Opportunistic and Social Networks

      Nouha Oualha, Yves Roudier
    • 1
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL