what-when-how
In Depth Tutorials and Information
A
A
B
C
D
0
1
1
1
A
D
B
B
1
0
0
0
C
C
0
0
0
1
D
0
0
0
0
Figure11.1
Graphandmatrix.
Figure 11.1 illustrates these two techniques in detail. Statistical analysis is an
advanced approach to establish a social network model. It aims at modeling prob-
abilities of relational ties between nodes.
11.1.2 Transition to Sociotechnical Networks (STNs)
Based on the characteristics of social networks, sociotechnical networks (STNs)
incorporate some new technical elements. An STN includes the technologies that
sustain human interaction, and the technologies that people construct and use in
collaborations. In STNs, the social and the technical are essentially inseparable and
coconstitutive [4,5]. Online social network Web sites such as MySpace, Facebook,
and Wikipedia pertain to STNs. Other examples are the electrical power grid and
the transportation network. he main purpose of an STN is to facilitate the com-
munication among users and to exchange and share information.
Cloud-computing-based STN: Recently a concept called “cloud computing” has
been proposed to reflect the fact that lots of network users collaborate through a vir-
tual organization that includes a series of computing resources, which are essentially
mapped to realistic physical facilities such as different clusters located everywhere in
the Internet. Such a cloud-computing-based architecture is an excellent medium to
form an STN since humans and physical infrastructure can interact with each other
through virtual network resource access under some type of access rules.
In this chapter, we will target security issues, especially trust models in such a
cloud-computing-based STN.
11.1.3 Security in Sociotechnical Networks
he benefits from STNs do not come without a price. When considering the
security, privacy, and trust of the STN services, several serious matters emerge.
Malicious participants can easily exploit social relationships and attack these com-
munities by disseminating misinformation, impersonating digital identities, and
with social-network-enhanced phishing. Generally, STN services contain a lot of
information that may be protected so that they are inaccessible. Unfortunately,
there are still some “back doors” opened for malicious participants to access, based
on complicated social relationships. What's worse, group attacks have come into
Search WWH ::




Custom Search