The model of social crypto-network

Authors

  • Марк Миколайович Орел National Technical University of Ukraine "Kyiv Polytechnic Institute" 37 Peremogy ave., Kyiv, Ukraine, 03056, Ukraine

DOI:

https://doi.org/10.15587/2313-8416.2015.44361

Keywords:

social network, cryptography, confidentiality of information, infoemation security, protection of personal data

Abstract

The article presents the theoretical model of social network with the enhanced mechanism of privacy policy. It covers the problems arising in the process of implementing the mentioned type of network. There are presented the methods of solving problems arising in the process of building the social network with privacy policy. It was built a theoretical model of social networks with enhanced information protection methods based on information and communication blocks

Author Biography

Марк Миколайович Орел, National Technical University of Ukraine "Kyiv Polytechnic Institute" 37 Peremogy ave., Kyiv, Ukraine, 03056

Department of Security of Information and Communication Systems

Physico-Technical Institute

References

Wasserman, S., Faust, K. (1994). Social Network Analysis in the Social and Behavioral Sciences. Social Network Analysis: Methods and Applications. Cambridge University Press, 1–27.

Kietzmann, J. H., Hermkens, K., McCarthy, I. P., Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54 (3), 241–251. doi: 10.1016/j.bushor.2011.01.005

Carrington, P. J., Scott, J. (2005). Models and Methods in Social Network Analysis. Cambridge, Cambridge University Press. doi: 10.1017/cbo9780511811395

Barychev, S. G., Goncherov, V. V., Serov, R. E (2002). AES standart. Rijndael algorithm. The foundations of modern cryptography, 30–35.

Hill, R. A., Dunbar, R. I. M. (2003). Social network size in humans. Human Nature, 14 (1), 53–72. doi: 10.1007/s12110-003-1016-y

ND TZI 1.1-003-99. Terminology in the field of information security in computer systems against unauthorized access.

Published

2015-06-21

Issue

Section

Technical Sciences