Abstract
A social network is a structure of individuals or organizations, which are connected by one or more types of interdependency, such as friendship, affinity, common interests or knowledge. Social networks use now web 2.0 technology and the users may need to follow a series of restrictions or conditions to join or add contents. We look here at their context and threats, in order to ascertain their needs for security. We propose the use of patterns to specify these requirements in a precise way and we present two specific patterns. A pattern is an encapsulated solution to a software problem in a given context. We present here the Participation-Collaboration Pattern, which describes the functionality of the collaboration between users in applications and the Collaborative Tagging Pattern, which is useful to share content using keywords to tag bookmarks, photographs and other contents. We also discuss possible improvements to the current situation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A.C. Weaver and B.B. Morrison, “Social networking”, Computer IEEE, Feb 2008, 97–100.
E.B. Fernandez, “Security patterns”, Proceedings of the Eigth International Symposium on System and Information Security – SSI’2006, Keynote talk, Sao Jose dos Campos, Brazil, Nov 08–10, 2006.
E.M. Maximilien, T. Grandison, T. Sun, D. Richardson, S. Guo, and K. Liu, “Privacy-as-a-Service: Models, algorithms, and results on the Facebook platform”, Proceedings of Web 2.0 Security and Privacy, 2009.
N. Bilton, “Price of Facebook privacy? Start clicking”, The New York Times, May 13, 2010.
M. Brandel, “Baited and duped on Facebook”, Computerworld, Oct 19, 2009, 28–35.
R. Westervelt, “Facebook attacks prompt investments in social networking security”, SearchSecurity.com, Jan 11, 2010.
“Elgg–Open Source Social Networking Platform”, http://www.elgg.org/
E.M. Maximilien, “Mobile mashups: Thoughts, directions, and challenges”, Proceedings of the 2nd IEEE Internaional Conference on Semantic Computing, 2008.
J. Wortham and N. Bilton, “Big web attack on Twitter is third assault this year”, The New York Times, Dec 19, 2009.
D. Hinchcliffe, N. Nickull, and J. Governor, “Web 2.0 Architectures”, O’Reilly Media, 2009.
F.L. Brown, J. DeVietri, G. Diaz, and E.B. Fernandez, “The Authenticator pattern”, Proceedings of Pattern Language of Programs (PloP’99), 2009.
Facebook Wiki, 2009, November 5, Wiki, http://wiki.developers.facebook.com/index.php/Main_Page
E.B. Fernandez and R. Pan, “A pattern language for security models”, Proceedings of PLoP, 2001.
Flickr X, 2009, http://en.wikipedia.org/wiki/Flickr
Technorati, 2009, http://en.wikipedia.org/wiki/Technorati
Slashdot, http://en.wikipedia.org/wiki/Slashdot
Wikipedia, “OpenSocial”, http://en.wikipedia.org/wiki/OpenSocial
L.A. Cutillo, R. Molva, and T. Strufe, “Safebook: A privacy-preserving online social network leveraging on real-life trust”, IEEE Communications, Dec 2009, 94–101.
E.B. Fernandez and J. Munoz-Arteaga, “Extending a secure software methodology with usability aspects”, position paper for the 3rd Workshop on Software Patterns and Quality (SPAQu’09), in conjunction with OOPSLA, 2009.
E.B. Fernandez, K. Hashizume, I. Buckley, M.M. Larrondo-Petrie, and M. VanHilst, “Web services security: standards and products”, Chapter 8 in “Web services security development and architecture: theoretical and practical issues”, Carlos A. Gutierrez, Eduardo F. Medina, and M. Piattini (Eds.), IGI Global Group, 2010, 152–177.
A. Ennai and S. Bose, “MobileSOA: A service oriented Web 2.0 framework for context-aware, lightweight and flexible mobile applications”, Proceedings of EDOC, 2008.
E.B. Fernandez, M.M. Larrondo-Petrie, T. Sorgente, and M. VanHilst, “A methodology to develop secure systems using patterns”, Chapter 5 in “Integrating security and software engineering: Advances and future vision”, H. Mouratidis and P. Giorgini (Eds.), IDEA Press, 2006, 107–126.
M. Gotta, “Reference architecture for social network sites, in perceptions on collaboration and social software”, 2008, http://mikeg.typepad.com/perceptions/2008/07/reference-archi.html
B. Stone, “Too much information? Hah! Sharing all online is the point”, The New York Times, Apr 23, 2010.
Wikipedia, 2009, http://en.wikipedia.org/wiki/Wikipedia_(terminology)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Fernandez, E.B., Marin, C., Petrie, M.M.L. (2010). Security Requirements for Social Networks in Web 2.0. In: Furht, B. (eds) Handbook of Social Network Technologies and Applications. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-7142-5_26
Download citation
DOI: https://doi.org/10.1007/978-1-4419-7142-5_26
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-7141-8
Online ISBN: 978-1-4419-7142-5
eBook Packages: Computer ScienceComputer Science (R0)