Social tagging systems provide an open platform for users to share and annotate their resources such as photos and URLs. Due to their open nature, however, these systems present a security problem. Malicious users may try to distort the systems behavior by inserting false user profiles. This paper addresses the problem of security and robustness of social tagging systems. We outline a framework to model the navigation of a tagging system. Using our framework we classify attack models and identify different kinds of potential attacks to a social tagging system. We implement two of our attack models and study the impact of attacks on existing algorithms used by tagging systems.
Abstract—Tagging systems are known to be particularly vul-nerable to tag spam. This paper introduces...
Two-factor authentication is widely used by high-value services to prevent adversaries from compromi...
14 pages ; Session 4: PrivacyInternational audienceAmong the issues the information system security ...
Social tagging systems provide an open platform for users to share and annotate their resources such...
Tagging systems allow users to interactively annotate a pool of shared resources using descriptive t...
Tagging systems allow users to interactively annotate a pool of shared resources using descriptive s...
Social network sites have become de factor in establishing and maintaining good relationships across...
AbstractRecommendation systems and content-filtering approaches based on annotations and ratings ess...
Tagging systems are known vulnerable to tag spam. While there have been efforts aiming at addressing...
Many Web 2.0-based social networking sites permit their users to post comments containing a variety ...
Recommendation systems and content filtering approaches based on annotations and ratings, essentiall...
Recent years have witnessed an explosion of multimedia contents available online. However, noisy and...
Abstract: Social networking is the fast usage in the current world by the on-line users. Now a days ...
Social networking is the fast usage in the current world by the on-line users. Now a days there are ...
Spam in social tagging systems introduced by some malicious participants has become a serious proble...
Abstract—Tagging systems are known to be particularly vul-nerable to tag spam. This paper introduces...
Two-factor authentication is widely used by high-value services to prevent adversaries from compromi...
14 pages ; Session 4: PrivacyInternational audienceAmong the issues the information system security ...
Social tagging systems provide an open platform for users to share and annotate their resources such...
Tagging systems allow users to interactively annotate a pool of shared resources using descriptive t...
Tagging systems allow users to interactively annotate a pool of shared resources using descriptive s...
Social network sites have become de factor in establishing and maintaining good relationships across...
AbstractRecommendation systems and content-filtering approaches based on annotations and ratings ess...
Tagging systems are known vulnerable to tag spam. While there have been efforts aiming at addressing...
Many Web 2.0-based social networking sites permit their users to post comments containing a variety ...
Recommendation systems and content filtering approaches based on annotations and ratings, essentiall...
Recent years have witnessed an explosion of multimedia contents available online. However, noisy and...
Abstract: Social networking is the fast usage in the current world by the on-line users. Now a days ...
Social networking is the fast usage in the current world by the on-line users. Now a days there are ...
Spam in social tagging systems introduced by some malicious participants has become a serious proble...
Abstract—Tagging systems are known to be particularly vul-nerable to tag spam. This paper introduces...
Two-factor authentication is widely used by high-value services to prevent adversaries from compromi...
14 pages ; Session 4: PrivacyInternational audienceAmong the issues the information system security ...