期刊文献+

一种可控传播与演化的小型在线社交网络模型

A controllable spread and evolution of small online social network model
下载PDF
导出
摘要 分析了在线社交网络中信息传播引发的安全问题,提出一种基于SSH架构的小型在线社交网络模型,探讨了模型的架构及搭建,借助校验器、拦截器、角色访问控制等多项安全策略,保障信息流转的准确性,拦截各种形式的非法访问及各种形式的恶意信息传播.实例验证了模型的有效性,为在线社交网络信息的良性流转和可控提供了有效参考. With the analysis of security issues caused by information dissemination in online social networks,a small online social network model based on SSH is proposed. The model architecture and building is researched at first. In order to ensure the accuracy of information flow,the model building is combined with security policies,such as the calibrator,the interceptor,and role-based access control. These security policies contribute to the interception of various forms of illegal access, as well as various forms of malicious information dissemination. The validity of the model is verified by examples. It provides an effective reference for the benign circulation and control of online social network information.
出处 《南阳师范学院学报》 CAS 2016年第6期27-30,共4页 Journal of Nanyang Normal University
基金 河南省科技计划项目(142300410044) 河南省教育厅科学技术研究重点项目(14A520057 15B520022) 南阳师范学院科研项目(QN2013049) 南阳师范学院实践教学精品课程项目
关键词 可控 信息传播 SSH模型 校验器 拦截器 controllable information transmission SSH model calibrator interceptor
  • 相关文献

参考文献10

二级参考文献114

  • 1李阳,王晓岩,王昆,沙瀛.基于社交网络的安全关系研究[J].计算机研究与发展,2012,49(S2):124-130. 被引量:10
  • 2曾铭,俞俊生,刘绍华.一种用于社交网站的云安全敏感信息过滤模型[J].华中科技大学学报(自然科学版),2012,40(S1):211-214. 被引量:4
  • 3余雷,薛惠锋,李刚.传染病传播模型研究[J].计算机仿真,2007,24(4):57-60. 被引量:13
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5Boyed D, Ellison N. Social network sites:Definition, history, and scholarship [J]. Journal of Computer- Mediated Communication, 2008, 13(1): 201-230.
  • 6Nagy J, Pecho P. Social network security [C]// Proceedings of the 3rd IEEE International Conference on Emerging Security Information, Systems and Technologies. Athens, Greece.. IEEE Computer Society, 2009: 321-325.
  • 7Douglis F. It's all about the (social) network[J]. IEEE Internet Computing, 2010, 14(1): 4-6.
  • 8Limsaiprom P, Tantatsanawong P. Social network anomaly and attack patterns analysis[C]//Proceedings of the 6th IEEE International Conference on Networked Computing. Heidelberg, Germany: IEEE Press, 2010: 11-13.
  • 9Hogben G. Security issues in the future of social networking[R/OL]. W3C Workshop on the Future of Social Networking, 2009 [2011-04-20]. http://www. w3. org/2008/09/msnws/papers/Future_of_ SN_ Giles_Hogben_ENISA. pdf.
  • 10Poppe R. Scalable face labeling in online social networks [C]// IEEE International Conference on Automatic Face & Gesture Recognition and Workshops. California, USA: IEEE Press, 2011: 566-571.

共引文献154

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部