Browse Source

add references for facecloak

Carsten Porth 5 years ago
parent
commit
2e2b1447ce
2 changed files with 4 additions and 4 deletions
  1. 2 2
      thesis/bib/bibliography.bib
  2. 2 2
      thesis/content/03-related-work/facecloak.tex

+ 2 - 2
thesis/bib/bibliography.bib

@@ -24,8 +24,8 @@
 
 @InProceedings{luo2009facecloak,
   author       = {Luo, Wanying and Xie, Qi and Hengartner, Urs},
-  title        = {Facecloak: An architecture for user privacy on social networking sites},
-  booktitle    = {Computational Science and Engineering, 2009. CSE'09. International Conference on},
+  title        = {{Facecloak: An architecture for user privacy on social networking sites}},
+  booktitle    = {{Computational Science and Engineering, 2009. CSE'09. International Conference on}},
   year         = {2009},
   volume       = {3},
   pages        = {26--33},

+ 2 - 2
thesis/content/03-related-work/facecloak.tex

@@ -1,4 +1,4 @@
-Researchers Luo, Xiu, and Hengartner of the University of Waterloo in Ontario propose an architecture to protect personal information from social networking platforms. Protection is achieved by transmitting fake data to the social network server and storing the correct data encrypted on a third party server. Authorized users can then replace the fake data with the correct data when they visit the site containing protected data. The prerequisite is that all users use a specific browser extension that communicates with the third party server and replaces content. In concrete terms, this was implemented for Facebook and both a server and an extension for the Firefox browser were developed and successfully tested.
+Researchers Luo, Xiu, and Hengartner of the University of Waterloo in Ontario propose an architecture to protect personal information from social networking platforms \cite{luo2009facecloak}. Protection is achieved by transmitting fake data to the social network server and storing the correct data encrypted on a third party server. Authorized users can then replace the fake data with the correct data when they visit the site containing protected data. The prerequisite is that all users use a specific browser extension that communicates with the third party server and replaces content. In concrete terms, this was implemented for Facebook and both a server and an extension for the Firefox browser were developed and successfully tested.
 
 \subsubsection{Design Principles}
 FaceCloak's design is based on the following four principles:
@@ -16,7 +16,7 @@ After validating several available solutions for personal data protection, the r
 \begin{figure}[h!]
 	\centering
 	\includegraphics[width=0.7\textwidth]{facecloak-architecture}
-	\caption{Schematic representation of the Setup Phase (1), Encryption Phase (2) and Decryption Phase (3) and the data flow taking place between the entities.}
+	\caption{Schematic representation of the Setup Phase (1), Encryption Phase (2) and Decryption Phase (3) and the data flow taking place between the entities. \cite{luo2009facecloak}}
 	\label{fig:facecloak-architecture}
 \end{figure}