For example, the solution of cryptographic suffers from the high overhead implied by key management.
Regarding the solution of enforcement of collaborative protocols, it enforces path discovery through a collaboration driven by the privacy preferences associated with OSN relationships.