PISA: A proximity-based social networking (PBSN) protection model
The widespread adoption of Proximity-based Social Networking (PBSN) applications has been accompanied with several privacy concerns involving location information. As a result, many studies were directed towards innovative privacy-preserving solutions to provide a secure platform for mobile users. D...
Uložené v:
| Vydané v: | Security journal Ročník 36; číslo 1; s. 165 - 200 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
London
Palgrave Macmillan UK
01.03.2023
Palgrave Macmillan |
| Predmet: | |
| ISSN: | 0955-1662, 1743-4645 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The widespread adoption of Proximity-based Social Networking (PBSN) applications has been accompanied with several privacy concerns involving location information. As a result, many studies were directed towards innovative privacy-preserving solutions to provide a secure platform for mobile users. Despite the success of these solutions, there is a research gap in terms of the evaluation and analysis of their protection features. An in-depth evaluation of the privacy and security provisions in PBSN systems is necessary to assess the protection properties. In this paper, a comprehensive protection assessment model, the PISA model, is proposed to evaluate the privacy and security features of PBSN frameworks. The main objectives of this study refer to defining the protection goals of PBSN systems by reviewing the privacy and security requirements, analyzing the associated location privacy threats, and formulating the PISA model based on the quantification of the related protection goals using the privacy metrics. The study adopts an exploratory research methodology and explores four distinct research questions. The PISA model enables an extensive evaluation of privacy-preserving PBSN frameworks concerning their privacy and security features which can be further useful for researchers during the development of privacy-preserving algorithms to prevent flaws in advance and improve where necessary. Future works of the current research can focus on the analysis of privacy policies and adversary models based on their assumptions, resources, and capabilities. |
|---|---|
| AbstractList | The widespread adoption of Proximity-based Social Networking (PBSN) applications has been accompanied with several privacy concerns involving location information. As a result, many studies were directed towards innovative privacy-preserving solutions to provide a secure platform for mobile users. Despite the success of these solutions, there is a research gap in terms of the evaluation and analysis of their protection features. An in-depth evaluation of the privacy and security provisions in PBSN systems is necessary to assess the protection properties. In this paper, a comprehensive protection assessment model, the PISA model, is proposed to evaluate the privacy and security features of PBSN frameworks. The main objectives of this study refer to defining the protection goals of PBSN systems by reviewing the privacy and security requirements, analyzing the associated location privacy threats, and formulating the PISA model based on the quantification of the related protection goals using the privacy metrics. The study adopts an exploratory research methodology and explores four distinct research questions. The PISA model enables an extensive evaluation of privacy-preserving PBSN frameworks concerning their privacy and security features which can be further useful for researchers during the development of privacy-preserving algorithms to prevent flaws in advance and improve where necessary. Future works of the current research can focus on the analysis of privacy policies and adversary models based on their assumptions, resources, and capabilities. |
| Author | Ramtohul, Asslinah Mocktoolah Khedo, Kavi Kumar |
| Author_xml | – sequence: 1 givenname: Asslinah Mocktoolah surname: Ramtohul fullname: Ramtohul, Asslinah Mocktoolah email: ashlinahmee@gmail.com organization: Faculty of Information, Communication and Digital Technologies, University of Mauritius – sequence: 2 givenname: Kavi Kumar surname: Khedo fullname: Khedo, Kavi Kumar organization: Faculty of Information, Communication and Digital Technologies, University of Mauritius |
| BookMark | eNp9kE1LAzEQhoNUsK3-AU8LXvQQnSSbTeKtFj8KRQvVc0iyadm63a3JFu2_d-sKgodeZi7vM_PyDFCvqiuP0DmBawJc3MSUUJlioBQDMJZifoT6RKQMp1nKe6gPinNMsoyeoEGMKwCQSqg-Gs0m89FtMko2of4q1kWzw9ZEnyexdoUpk8o3n3V4L6plcjm7mz9f7YONd01RV8m6zn15io4Xpoz-7HcP0dvD_ev4CU9fHifj0RQ7RlSDlcucBUtFrgCsV44sjOVGCimshHbmKXGKWJ5LYaTMM08Is5TmgnsjmWVDdNHdbQt8bH1s9Krehqp9qamETAAFwtqU7FIu1DEGv9CuaMy-bRNMUWoCei9Md8J0K0z_CNO8Rek_dBOKtQm7wxDroNiGq6UPf60OUN85c34K |
| CitedBy_id | crossref_primary_10_1016_j_jisa_2024_103918 |
| Cites_doi | 10.1109/TSMCA.2006.871655 10.1007/s11277-019-06500-0 10.1016/j.future.2016.08.023 10.1155/2015/815613 10.1002/sec.1438 10.1016/j.cose.2018.12.002 10.1145/3168389 10.1002/sec.330 10.1109/TDSC.2016.2604383 10.1145/1567253.1567257 10.14778/2733004.2733060 10.1109/TDSC.2019.2892150 10.1007/s11432-015-0981-4 10.1093/bib/bby076 10.2308/isys-50696 10.1109/TDSC.2020.2980271 10.1016/j.chb.2018.01.028 10.1007/s11036-012-0362-6 10.1038/s41467-019-09519-w 10.1016/j.procs.2013.05.112 10.1007/978-3-030-33582-3_77 10.1109/SPW.2015.15 10.1145/1734583.1734585 10.1109/ROLCG.2015.7367416 10.1007/978-3-319-13102-3_67 10.1109/INFOCOM.2014.6847945 10.1145/3383219.3383247 10.1109/INFOCOM.2014.6848003 10.1145/1866919.1866936 10.1007/978-3-642-14478-3_42 10.1109/SAHCN.2019.8824933 10.1109/SP.2011.18 10.1145/2971648.2971685 10.1109/INFCOM.2011.5934991 10.1109/INFCOM.2011.5935065 10.1145/2568225.2568240 10.1145/3195258.3195261 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Nature Limited 2022 The Author(s), under exclusive licence to Springer Nature Limited 2022. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Nature Limited 2022 – notice: The Author(s), under exclusive licence to Springer Nature Limited 2022. |
| DBID | AAYXX CITATION 0-V 3V. 7XB 88F 88G 88I 8AF 8AL 8AM 8FE 8FG 8FI 8FJ 8FK 8G5 ABUWG AEUYN AFKRA ALSLI ARAPS AZQEC BENPR BGLVJ BGRYB CCPQU DWQXO FYUFA GHDGH GNUQQ GUQSH HCIFZ JQ2 K7- K7. M0N M0O M1Q M2M M2O M2P MBDVC P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PRQQA PSYQQ Q9U |
| DOI | 10.1057/s41284-022-00334-5 |
| DatabaseName | CrossRef ProQuest Social Sciences Premium Collection ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) Military Database (Alumni Edition) Psychology Database (Alumni) Science Database (Alumni Edition) STEM Database Computing Database (Alumni Edition) Criminal Justice Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) Research Library (Alumni) ProQuest Central (Alumni) ProQuest One Sustainability ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central ProQuest Technology Collection Criminology Collection ProQuest One ProQuest Central Korea ProQuest Health & Medical Collection Health Research Premium Collection (Alumni) ProQuest Central Student ProQuest Research Library SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Criminal Justice (Alumni) Computing Database Criminal Justice Database Military Database (ProQuest) Psychology Database Research Library Science Database Research Library (Corporate) ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest One Social Sciences ProQuest One Psychology ProQuest Central Basic |
| DatabaseTitle | CrossRef ProQuest One Psychology Research Library Prep Computer Science Database ProQuest Central Student ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest AP Science SciTech Premium Collection ProQuest Military Collection ProQuest Central China ProQuest One Applied & Life Sciences ProQuest One Sustainability Health Research Premium Collection ProQuest Central (New) Advanced Technologies & Aerospace Collection Social Science Premium Collection ProQuest Science Journals (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) Criminology Collection Criminal Justice Periodicals (Alumni Edition) ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) Technology Collection ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College Research Library (Alumni Edition) ProQuest Central ProQuest Criminal Justice ProQuest Central Korea ProQuest Research Library ProQuest Computing ProQuest One Social Sciences ProQuest Central Basic ProQuest Science Journals ProQuest Computing (Alumni Edition) ProQuest Psychology Journals (Alumni) ProQuest Military Collection (Alumni Edition) ProQuest SciTech Collection ProQuest Criminal Justice (Alumni) ProQuest Psychology Journals ProQuest Central (Alumni) |
| DatabaseTitleList | ProQuest One Psychology |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Social Welfare & Social Work Business |
| EISSN | 1743-4645 |
| EndPage | 200 |
| ExternalDocumentID | 10_1057_s41284_022_00334_5 |
| GroupedDBID | --K 0-V 0R~ 123 1B1 3V. 4.4 406 88I 8AF 8FE 8FG 8FI 8FJ 8G5 8R4 8R5 AACDK AAFIF AAIAL AANZL AARHV AASML AATNV ABAKF ABDZT ABIVO ABJNI ABUWG ACAOD ACGFS ACGOD ACHQT ACLPH ACPIV ACZOJ ADBBV ADINQ ADXJC AECXW AEFQL AEJRE AEMSY AESKC AEUYN AEVLU AEXYK AFBBN AFKRA AGAYW AGQEE AGRTI AHBYD AHSBF AIGIU AILAN AJRNO ALIPV ALMA_UNASSIGNED_HOLDINGS ALSLI AMKLP AMYLF ARALO ARAPS ASPBG AVWKF AXYYD AZQEC BENPR BGLVJ BGRYB BKKNO BPHCQ BVXVI CAG CCPQU COF CS3 CSNOR DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD FEFRA FERAY FIGPU FPDNL FSGXE FYUFA GNUQQ GUQSH HCIFZ IHE IWAJR J-C JZLTJ K6V K7- M0N M0O M1Q M2M M2O M2P M41 N8N NQ- O9- P2P PLIJB PQQKQ PROAC PSYQQ PVNMB Q2X RIG ROL RPC RPZ RSV SJYHP SNX SOHCF SOJ SRMVM SSHVO TN5 TSG UKHRP WH7 AAYXX ABBRH ABDBE ABFSG ABJZF ABRTQ ACSTC AEZWR AFDZB AFFHD AFHIU AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PRQQA 7XB 8AL 8FK JQ2 K7. MBDVC P62 PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c319t-9c6cb0b27d900be9c1fab5a8787b80787d41c91b5d87a88d6e113b22d75ea83b3 |
| IEDL.DBID | M2P |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000773857100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0955-1662 |
| IngestDate | Thu Nov 20 04:32:20 EST 2025 Tue Nov 18 21:59:57 EST 2025 Sat Nov 29 05:42:34 EST 2025 Fri Feb 21 02:43:13 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Privacy assessment Proximity-based social networking Location-based systems Evaluation metrics Security analysis |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-9c6cb0b27d900be9c1fab5a8787b80787d41c91b5d87a88d6e113b22d75ea83b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2806702013 |
| PQPubID | 31219 |
| PageCount | 36 |
| ParticipantIDs | proquest_journals_2806702013 crossref_citationtrail_10_1057_s41284_022_00334_5 crossref_primary_10_1057_s41284_022_00334_5 springer_journals_10_1057_s41284_022_00334_5 |
| PublicationCentury | 2000 |
| PublicationDate | 20230300 2023-03-00 20230301 |
| PublicationDateYYYYMMDD | 2023-03-01 |
| PublicationDate_xml | – month: 3 year: 2023 text: 20230300 |
| PublicationDecade | 2020 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London |
| PublicationTitle | Security journal |
| PublicationTitleAbbrev | Secur J |
| PublicationYear | 2023 |
| Publisher | Palgrave Macmillan UK Palgrave Macmillan |
| Publisher_xml | – name: Palgrave Macmillan UK – name: Palgrave Macmillan |
| References | Ma, Li, Ma, Jiang, Gao, Xi, Lu (CR20) 2017; 60 Song, Sim, Park, Song (CR32) 2015; 11 Ravi, Subramaniyaswamy, Devarajan, Ravichandran, Arunkumar, Indragandhi, Vijayakumar (CR26) 2019; 108 Li, Zhu, Du, Liang, Shen (CR15) 2016; 15 CR19 Jiang, Li, Zhao, Zeng, Xiao, Iyengar (CR11) 2021; 54 Raschke, Krishen, Kachroo (CR25) 2014; 28 CR16 CR38 CR37 CR35 CR34 Zhu, Ayday, Vitenberg (CR45) 2019; 18 Xue, Liu, Ross, Qian (CR41) 2016; 9 Lee, Guo, Yin (CR14) 2013; 17 CR30 Sun, Liao, Li, Yu, Chang (CR33) 2016; 74 Do, Martini, Choo (CR10) 2019; 81 Al-Badawy, Abbas, Belal (CR1) 2018; 13 CR2 CR4 CR3 Liu (CR18) 2009; 1 CR6 CR5 Thuiller, Guéguen, Renaud, Karger, Zimmermann (CR36) 2019; 10 CR29 CR28 CR9 Kong, Liu, Huang (CR13) 2014; 7 Lilien, Bhargava (CR17) 2006; 36 Solove (CR31) 2005; 154 CR24 CR46 CR23 CR44 CR42 Wagner, Eckhoff (CR39) 2018; 51 Werner (CR40) 2016; 9 Buchanan, Kwecka, Ekonomou (CR8) 2013; 18 Zhao, Wagner (CR43) 2020; 19 Kim, Chen, Lin, Wang, Yang, Yang (CR12) 2019; 20 Mamonov, Benbunan-Fich (CR21) 2018; 83 L Ravi (334_CR26) 2019; 108 334_CR30 X Zhu (334_CR45) 2019; 18 M Werner (334_CR40) 2016; 9 W Thuiller (334_CR36) 2019; 10 334_CR34 334_CR35 334_CR37 AM Al-Badawy (334_CR1) 2018; 13 334_CR16 334_CR38 H Jiang (334_CR11) 2021; 54 334_CR28 334_CR6 334_CR29 334_CR9 D Song (334_CR32) 2015; 11 334_CR3 334_CR2 334_CR5 H Li (334_CR15) 2016; 15 334_CR4 T Kim (334_CR12) 2019; 20 DJ Solove (334_CR31) 2005; 154 WJ Buchanan (334_CR8) 2013; 18 G Sun (334_CR33) 2016; 74 L Kong (334_CR13) 2014; 7 C Lee (334_CR14) 2013; 17 Q Do (334_CR10) 2019; 81 I Wagner (334_CR39) 2018; 51 L Lilien (334_CR17) 2006; 36 334_CR42 334_CR44 334_CR23 334_CR24 Y Zhao (334_CR43) 2020; 19 334_CR46 L Liu (334_CR18) 2009; 1 X Ma (334_CR20) 2017; 60 334_CR19 S Mamonov (334_CR21) 2018; 83 RL Raschke (334_CR25) 2014; 28 M Xue (334_CR41) 2016; 9 |
| References_xml | – volume: 36 start-page: 503 issue: 3 year: 2006 end-page: 506 ident: CR17 article-title: A Scheme for Privacy-Preserving Data Dissemination publication-title: IEEE Transactions on Systems, Man, and Cybernetics-Part A doi: 10.1109/TSMCA.2006.871655 – volume: 108 start-page: 1869 issue: 3 year: 2019 end-page: 1907 ident: CR26 article-title: SECRECSY: A Secure Framework for Enhanced Privacy-Preserving Location Recommendations in Cloud Environment publication-title: Wireless Personal Communications doi: 10.1007/s11277-019-06500-0 – ident: CR4 – ident: CR2 – ident: CR16 – ident: CR37 – ident: CR30 – volume: 74 start-page: 375 year: 2016 end-page: 384 ident: CR33 article-title: L2P2: A location-label based approach for privacy preserving in LBS publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2016.08.023 – volume: 11 start-page: 8 year: 2015 ident: CR32 article-title: A privacy-preserving continuous location monitoring system for location-based services publication-title: International Journal of Distributed Sensor Networks doi: 10.1155/2015/815613 – volume: 9 start-page: 1496 issue: 11 year: 2016 end-page: 1508 ident: CR41 article-title: Thwarting Location Privacy Protection in Location-Based Social Discovery Services publication-title: Security and Communication Networks doi: 10.1002/sec.1438 – ident: CR35 – ident: CR6 – ident: CR29 – volume: 81 start-page: 156 year: 2019 end-page: 181 ident: CR10 article-title: The Role of the Adversary Model in Applied Security Research publication-title: Computers & Security doi: 10.1016/j.cose.2018.12.002 – volume: 54 start-page: 1 issue: 1 year: 2021 end-page: 36 ident: CR11 article-title: Location Privacy-Preserving Mechanisms in Location-Based Services: A Comprehensive Survey publication-title: ACM Computing Surveys (CSUR) – volume: 51 start-page: 1 issue: 3 year: 2018 end-page: 38 ident: CR39 article-title: Technical Privacy Metrics: A Systematic Survey publication-title: ACM Computing Surveys (CSUR) doi: 10.1145/3168389 – volume: 9 start-page: 130 issue: 2 year: 2016 end-page: 138 ident: CR40 article-title: Privacy-Protected Communication for Location-Based Services publication-title: Security and Communication Networks doi: 10.1002/sec.330 – ident: CR42 – ident: CR23 – ident: CR46 – ident: CR19 – ident: CR44 – volume: 15 start-page: 646 issue: 4 year: 2016 end-page: 660 ident: CR15 article-title: Privacy Leakage of Location Sharing In Mobile Social Networks: Attacks and Defense publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2016.2604383 – volume: 13 start-page: 11540 issue: 14 year: 2018 end-page: 11547 ident: CR1 article-title: A TTP-Free Location Privacy Framework for Mobile Social Networks with Key Agreement Protocol publication-title: International Journal of Applied Engineering Research – volume: 1 start-page: 15 issue: 2 year: 2009 end-page: 22 ident: CR18 article-title: Privacy and Location Anonymization in Location-Based Services publication-title: SIGSPATIAL Special doi: 10.1145/1567253.1567257 – volume: 7 start-page: 1681 issue: 13 year: 2014 end-page: 1684 ident: CR13 article-title: Spot: Locating Social Media Users Based on Social Network Context publication-title: Proceedings of the VLDB Endowment doi: 10.14778/2733004.2733060 – volume: 18 start-page: 384 issue: 1 year: 2019 end-page: 399 ident: CR45 article-title: A Privacy-Preserving Framework for Outsourcing Location-Based Services to The Cloud publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2019.2892150 – ident: CR3 – volume: 60 start-page: 1 issue: 9 year: 2017 end-page: 16 ident: CR20 article-title: APPLET: A Privacy-Preserving Framework for Location-Aware Recommender System publication-title: Science China Information Sciences doi: 10.1007/s11432-015-0981-4 – ident: CR38 – volume: 20 start-page: 2316 issue: 6 year: 2019 end-page: 2326 ident: CR12 article-title: Impact of Similarity Metrics on Single-Cell RNA-Seq Data Clustering publication-title: Briefings in Bioinformatics doi: 10.1093/bib/bby076 – volume: 28 start-page: 227 issue: 1 year: 2014 end-page: 242 ident: CR25 article-title: Understanding the Components of Information Privacy Threats for Location-Based Services publication-title: Journal of Information Systems doi: 10.2308/isys-50696 – volume: 19 start-page: 259 issue: 1 year: 2020 end-page: 274 ident: CR43 article-title: Using Metrics Suites to Improve the Measurement of Privacy in Graphs publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2020.2980271 – ident: CR9 – volume: 83 start-page: 32 issue: 3 year: 2018 end-page: 44 ident: CR21 article-title: The Impact of Information Security Threat Awareness on Privacy-Protective Behaviors publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2018.01.028 – ident: CR34 – ident: CR5 – volume: 18 start-page: 728 issue: 5 year: 2013 end-page: 737 ident: CR8 article-title: A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services publication-title: Mobile Networks and Applications doi: 10.1007/s11036-012-0362-6 – volume: 10 start-page: 1 issue: 1 year: 2019 end-page: 9 ident: CR36 article-title: Uncertainty in Ensembles of Global Biodiversity Scenarios publication-title: Nature Communications doi: 10.1038/s41467-019-09519-w – volume: 17 start-page: 879 year: 2013 end-page: 887 ident: CR14 article-title: A Framework of Evaluation Location Privacy in Mobile Network publication-title: Procedia Computer Science doi: 10.1016/j.procs.2013.05.112 – ident: CR28 – ident: CR24 – volume: 154 start-page: 447 issue: 3 year: 2005 end-page: 564 ident: CR31 article-title: A Taxonomy of Privacy publication-title: The University of Pennsylvania Law Review – ident: 334_CR2 doi: 10.1007/978-3-030-33582-3_77 – ident: 334_CR38 doi: 10.1109/SPW.2015.15 – volume: 9 start-page: 1496 issue: 11 year: 2016 ident: 334_CR41 publication-title: Security and Communication Networks doi: 10.1002/sec.1438 – ident: 334_CR37 – volume: 7 start-page: 1681 issue: 13 year: 2014 ident: 334_CR13 publication-title: Proceedings of the VLDB Endowment doi: 10.14778/2733004.2733060 – ident: 334_CR24 doi: 10.1145/1734583.1734585 – volume: 28 start-page: 227 issue: 1 year: 2014 ident: 334_CR25 publication-title: Journal of Information Systems doi: 10.2308/isys-50696 – volume: 154 start-page: 447 issue: 3 year: 2005 ident: 334_CR31 publication-title: The University of Pennsylvania Law Review – ident: 334_CR4 doi: 10.1109/ROLCG.2015.7367416 – volume: 18 start-page: 728 issue: 5 year: 2013 ident: 334_CR8 publication-title: Mobile Networks and Applications doi: 10.1007/s11036-012-0362-6 – volume: 18 start-page: 384 issue: 1 year: 2019 ident: 334_CR45 publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2019.2892150 – ident: 334_CR6 doi: 10.1007/978-3-319-13102-3_67 – volume: 10 start-page: 1 issue: 1 year: 2019 ident: 334_CR36 publication-title: Nature Communications doi: 10.1038/s41467-019-09519-w – ident: 334_CR28 doi: 10.1109/INFOCOM.2014.6847945 – volume: 81 start-page: 156 year: 2019 ident: 334_CR10 publication-title: Computers & Security doi: 10.1016/j.cose.2018.12.002 – ident: 334_CR34 doi: 10.1145/3383219.3383247 – volume: 9 start-page: 130 issue: 2 year: 2016 ident: 334_CR40 publication-title: Security and Communication Networks doi: 10.1002/sec.330 – ident: 334_CR19 doi: 10.1109/INFOCOM.2014.6848003 – volume: 1 start-page: 15 issue: 2 year: 2009 ident: 334_CR18 publication-title: SIGSPATIAL Special doi: 10.1145/1567253.1567257 – ident: 334_CR30 doi: 10.1145/1866919.1866936 – ident: 334_CR5 doi: 10.1007/978-3-642-14478-3_42 – ident: 334_CR9 doi: 10.1109/SAHCN.2019.8824933 – volume: 36 start-page: 503 issue: 3 year: 2006 ident: 334_CR17 publication-title: IEEE Transactions on Systems, Man, and Cybernetics-Part A doi: 10.1109/TSMCA.2006.871655 – volume: 83 start-page: 32 issue: 3 year: 2018 ident: 334_CR21 publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2018.01.028 – ident: 334_CR29 doi: 10.1109/SP.2011.18 – ident: 334_CR44 – volume: 60 start-page: 1 issue: 9 year: 2017 ident: 334_CR20 publication-title: Science China Information Sciences doi: 10.1007/s11432-015-0981-4 – volume: 74 start-page: 375 year: 2016 ident: 334_CR33 publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2016.08.023 – ident: 334_CR42 doi: 10.1145/2971648.2971685 – volume: 20 start-page: 2316 issue: 6 year: 2019 ident: 334_CR12 publication-title: Briefings in Bioinformatics doi: 10.1093/bib/bby076 – ident: 334_CR23 – volume: 19 start-page: 259 issue: 1 year: 2020 ident: 334_CR43 publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2020.2980271 – ident: 334_CR46 doi: 10.1109/INFCOM.2011.5934991 – ident: 334_CR16 doi: 10.1109/INFCOM.2011.5935065 – ident: 334_CR35 doi: 10.1145/2568225.2568240 – volume: 54 start-page: 1 issue: 1 year: 2021 ident: 334_CR11 publication-title: ACM Computing Surveys (CSUR) – ident: 334_CR3 doi: 10.1145/3195258.3195261 – volume: 17 start-page: 879 year: 2013 ident: 334_CR14 publication-title: Procedia Computer Science doi: 10.1016/j.procs.2013.05.112 – volume: 13 start-page: 11540 issue: 14 year: 2018 ident: 334_CR1 publication-title: International Journal of Applied Engineering Research – volume: 11 start-page: 8 year: 2015 ident: 334_CR32 publication-title: International Journal of Distributed Sensor Networks doi: 10.1155/2015/815613 – volume: 51 start-page: 1 issue: 3 year: 2018 ident: 334_CR39 publication-title: ACM Computing Surveys (CSUR) doi: 10.1145/3168389 – volume: 15 start-page: 646 issue: 4 year: 2016 ident: 334_CR15 publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2016.2604383 – volume: 108 start-page: 1869 issue: 3 year: 2019 ident: 334_CR26 publication-title: Wireless Personal Communications doi: 10.1007/s11277-019-06500-0 |
| SSID | ssj0008979 |
| Score | 2.2477818 |
| Snippet | The widespread adoption of Proximity-based Social Networking (PBSN) applications has been accompanied with several privacy concerns involving location... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 165 |
| SubjectTerms | Algorithms Computer privacy Crime and Society Criminology and Criminal Justice Evaluation Measurement Networking Original Article Privacy Property Protection Proximity Research methodology Security Social networks Social Sciences Welfare state |
| SummonAdditionalLinks | – databaseName: SpringerLINK Contemporary 1997-Present dbid: RSV link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JSwMxFH5oFfHiUhWrVXIQUTTYzCRN4q2KRUFKsVp7G7LMgFhaaavgvzeZpUVRQa8zSQhvn3nLB3AQakqorUmsqKKYciqwNtZiSp30hIpang577t7yVkv0erKdN4WNi2r3IiWZWuoci_ZsTL0pxb763AOQUczmYcG5O-EBG-463an9FbKYsMcwqdeDvFXm-zM-u6NZjPklLZp6m-bq_-65Bit5dIkamTisw1w8KMNSUdxehmrWjYse436iRjE6RMWD4eh5Axrtm07jHDWQL27xnU_v2Hs5i7I_62iQ1Yy726Cj9kWndYzyMQ-OuSjF1NmEh-bV_eU1zjEWsHHKN8HS1I2u6YBbWavpWBqSKM2UcHqs_Sh6bikxkmhmBVdC2HpMSKiDwPEwViLU4RaUBsNBvA2IscQQqUMeUOfyFJEJV5wl7ovEEJYkugKkIHVk8gHkHgejH6WJcMajjHSRI12Uki5iFTiZ7nnJxm_8urpacDDKVXEc-dQxd0ExCStwWnBs9vrn03b-tnwXlj0UfVafVoXSZPQa78GieZs8jUf7qYh-AJ152-8 priority: 102 providerName: Springer Nature |
| Title | PISA: A proximity-based social networking (PBSN) protection model |
| URI | https://link.springer.com/article/10.1057/s41284-022-00334-5 https://www.proquest.com/docview/2806702013 |
| Volume | 36 |
| WOSCitedRecordID | wos000773857100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1743-4645 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0008979 issn: 0955-1662 databaseCode: RSV dateStart: 19990101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dT9swED8BndBeGONDK3TIDxNiAos4set4L1OZWoGgXUb5eov8kUiIqi1tQeK_x04cqiGtL3u5ByexLP_su4vvfD-Ab5GihJpAYEklxZTTGCttDKbUrp5IUsOLYs83F7zXi-_uROIP3KY-rbLSiYWiNiPtzsiPXQSQW9-GRD_Hj9ixRrnoqqfQWIaa9WyIS-nqhsmbJo5FVWuPYdJshv7SjHVRjqfUKWbsctkdnRnF7G_DNPc23wVIC7vT-fS_I16HNe9xola5RD7DUjbcgNUq4X0DGuUNXXSbDXI5ydA-qhpGk4dNaCVn_dYP1EIu4cXdhnrBzvIZVJ62o2GZR27Hjg6Sk37vO_KlHyzgqODZ2YLrTvvq1yn2vAtY2w05w0I3tQpUyI0IApUJTXKpmIzt3lauPD03lGhBFDMxl3FsmhkhkQpDi2sm40hF27AyHA2zL4AYyzURKuIhtWZQEpFzyVlu_1I0YXmu6kCqSU-1L0ruuDEGaREcZzwtgUotUGkBVMrqcPj2zbgsybHw7UaFTuq35zSdQ1OHowrf-eN_97azuLdd-Ojo6MsctQaszCZP2Vf4oJ9n99PJHtRO2r3kcg-Wzzm2shv8dpL8cTLsFrJoCRMrL_s3r3lp7Qo |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1bTxQxFD5BIOgLCkhcWbUPaiDasO202ykJIeuFsGHZbAIqb6W3SYxkF3dXCH_K32g7M2Ujibzx4Otcmpn26zln5nznOwCvM8MIcy2JNdMMM8FybKxzmLGAnkwzJ0qx56890e_np6dyMAe_Uy1MpFUmm1gaajey8R_5dswAihDbkGzv4ieOXaNidjW10Khgceivr8In22S3-yms7xtK9z-ffDzAdVcBbAPcpljatjUtQ4WTrZbx0pJCG67zgFwTxdeFY8RKYrjLhc5z1_aEZIbS8NRe55nJwrgPYIFFZbFIFaSDG8ufy6TtxzFpt2ldpBNCou0Ji44AR-58bJ_GMP_bEc6i21sJ2dLP7T_-32boCSzXETXqVFtgBeb8cBWWEqF_FZpVBTL65s8LPfboLUoHRuMfa9AZdI87O6iDIqEnVntd4-jZHaqyCWhY8eTDXKHNwYfj_haqpS0CoFHZR-gpfLmX91uH-eFo6J8B4rywRJpMUBbcvCayEFrwInyFWcKLwjSApEVWthZdj70_zlWZ_OdCVcBQARiqBIbiDXh3c89FJTly59XNhAZVm5-JmkGhAe8Tnman_z3a87tHewUPD06OeqrX7R9uwCMaAr6Kj9eE-en4l38Bi_Zy-n0yflluDARn942zPxxNQyI |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LbxMxEB6VFlVceBQQgQA-tAgEVuJdO14jIZTSRo1SRZHKozfj10qIKilJWtS_xq9jvLtuBBK99cB1d23J9md_451vZgC2c8sZ911FDTeccskLap33lHNET264l1Wy58-Hcjwujo_VZA1-pViYKKtMZ2J1UPuZi__IO9EDKNG2YXmnbGQRk73B-9MfNFaQip7WVE6jhsgoXPzE69vi3XAP13onywb7Hz8c0KbCAHUIvSVVruds12bSq27XBuVYaawwBaLYxkTs0nPmFLPCF9IUhe8FxnKbZTiCYIrc5tjvDdhAFhaxesJI0ksWKFTK8yco6_WyJmAHzaPOgkdSoFFHH0upcSr-JMWVpfuXc7bivMGd_3m27sLtxtIm_Xpr3IO1MN2CzST034J2HZlMvoST0swDeUHSg9n8-33oT4ZH_bekT6LQJ0aBXdDI-J7UXgYyrfXzOG_k5WT3aPyKNCkvEOikqi_0AD5dy_gewvp0Ng2PgAhROqZsLjOO9G-YKqWRosTbmWOiLG0LWFpw7Zpk7LEmyImuRAFC6hokGkGiK5Bo0YLXl21O61QkV37dTsjQzbG00CtYtOBNwtbq9b97e3x1b89hE-GlD4fj0RO4laEdWMv02rC-nJ-Fp3DTnS-_LebPqj1C4Ot1w-w3vA1LpA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=PISA%3A+A+proximity-based+social+networking+%28PBSN%29+protection+model&rft.jtitle=Security+journal&rft.au=Ramtohul%2C+Asslinah+Mocktoolah&rft.au=Khedo%2C+Kavi+Kumar&rft.date=2023-03-01&rft.issn=0955-1662&rft.eissn=1743-4645&rft.volume=36&rft.issue=1&rft.spage=165&rft.epage=200&rft_id=info:doi/10.1057%2Fs41284-022-00334-5&rft.externalDBID=n%2Fa&rft.externalDocID=10_1057_s41284_022_00334_5 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0955-1662&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0955-1662&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0955-1662&client=summon |