{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:59:46Z","timestamp":1743094786649,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223113"},{"type":"electronic","value":"9783030223120"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22312-0_19","type":"book-chapter","created":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T23:02:48Z","timestamp":1560726168000},"page":"271-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Arcana: Enabling Private Posts on Public Microblog Platforms"],"prefix":"10.1007","author":[{"given":"Anirudh","family":"Narasimman","sequence":"first","affiliation":[]},{"given":"Qiaozhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Fengjun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dongwon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.osnem.2018.02.001","volume":"6","author":"L Bahri","year":"2018","unstructured":"Bahri, L., Carminati, B., Ferrari, E.: Decentralized privacy preserving services for online social networks. Online Soc. Netw. Media 6, 18\u201325 (2018)","journal-title":"Online Soc. Netw. Media"},{"key":"19_CR2","unstructured":"Bauerlein, M.: Your dream college can see twitter, too. https:\/\/www.bloomberg.com\/view\/articles\/2013-11-08\/your-dream-college-can-see-facebook-too"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Beato, F., Ion, I., \u010capkun, S., Preneel, B., Langheinrich, M.: For some eyes only: protecting online information sharing. In: ACM CODASPY (2013)","DOI":"10.1145\/2435349.2435351"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Schi\u00f6berg, D., Vu, L.-H., Datta, A.: Peerson: P2p social networking: early experiences and insights. In: ACM SNS Workshop (2009)","DOI":"10.1145\/1578002.1578010"},{"issue":"1","key":"19_CR6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1609956.1609962","volume":"13","author":"B Carminati","year":"2009","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM TISSEC 13(1), 6 (2009)","journal-title":"ACM TISSEC"},{"issue":"3","key":"19_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C-K Chan","year":"2004","unstructured":"Chan, C.-K., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recognit. 37(3), 469\u2013474 (2004)","journal-title":"Pattern Recognit."},{"issue":"3","key":"19_CR8","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727\u2013752 (2010)","journal-title":"Signal Process."},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-642-31540-4_2","volume-title":"Data and Applications Security and Privacy XXVI","author":"Y Cheng","year":"2012","unstructured":"Cheng, Y., Park, J., Sandhu, R.: A user-to-user relationship-based access control model for online social networks. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 8\u201324. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31540-4_2"},{"key":"19_CR10","volume-title":"Digital Watermarking","author":"IJ Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., Honsinger, C.: Digital Watermarking, vol. 53. Springer, Heidelberg (2002)"},{"issue":"12","key":"19_CR11","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2009.5350374","volume":"47","author":"L Cutillo","year":"2009","unstructured":"Cutillo, L., Molva, R., Strufe, T.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47(12), 94\u2013101 (2009)","journal-title":"IEEE Commun. Mag."},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A.: Hummingbird: privacy at the time of twitter. In: IEEE S&P (2012)","DOI":"10.1109\/SP.2012.26"},{"key":"19_CR13","unstructured":"Doshi, N., Jinwala, D.: Updating attribute in CP-ABE: a new approach (2012). arXiv preprint arXiv:1208.5848"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: International World Wide Web Conference (WWW) (2010)","DOI":"10.1145\/1772690.1772727"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-04444-1_19","volume-title":"Computer Security \u2013 ESORICS 2009","author":"PWL Fong","year":"2009","unstructured":"Fong, P.W.L., Anwar, M., Zhao, Z.: A privacy preservation model for facebook-style social network systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 303\u2013320. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04444-1_19"},{"issue":"1","key":"19_CR16","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1080\/17445760.2015.1053808","volume":"31","author":"M Freitas","year":"2016","unstructured":"Freitas, M.: Twister: the development of a peer-to-peer microblogging platform. Int. J. Parallel Emergent Distrib. Syst. 31(1), 20\u201333 (2016)","journal-title":"Int. J. Parallel Emergent Distrib. Syst."},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Gao, B., Berendt, B.: Circles, posts and privacy in egocentric social networks: an exploratory visualization approach. In: IEEE\/ACM ASONAM (2013)","DOI":"10.1145\/2492517.2492654"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Kairam, S., Brzozowski, M., Huffaker, D., Chi, E.: Talking in circles: selective sharing in google+. In: ACM CHI (2012)","DOI":"10.1145\/2207676.2208552"},{"issue":"6 SI","key":"19_CR20","first-page":"96","volume":"11","author":"A Karthick","year":"2017","unstructured":"Karthick, A., Murali, D., Kumaraesan, A., Vijayakumar, K.: Twitterize: anonymous micro-blogging in computer systems and applications. Adv. Nat. Appl. Sci. 11(6 SI), 96\u2013103 (2017)","journal-title":"Adv. Nat. Appl. Sci."},{"key":"19_CR21","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"S Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech house, Norwood (2000)"},{"issue":"8","key":"19_CR22","first-page":"1681","volume":"29","author":"C Lan","year":"2017","unstructured":"Lan, C., Yang, Y., Li, X., Luo, B., Huan, J.: Learning social circles in ego-networks based on multi-view network structure. IEEE TKDE 29(8), 1681\u20131694 (2017)","journal-title":"IEEE TKDE"},{"key":"19_CR23","unstructured":"Leskovec, J., Mcauley, J.J.: Learning to discover social circles in ego networks. In: Advances in Neural Information Processing Systems, pp. 539\u2013547 (2012)"},{"key":"19_CR24","unstructured":"Madejski, M., Johnson, M., Bellovin, S.M.: The failure of online social network privacy settings. Columbia University, Technical report CUCS-010-11 (2011)"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Nilizadeh, S., Jahid, S., Mittal, P., Borisov, N., Kapadia, A.: Cachet: a decentralized architecture for privacy preserving social networking with caching. In: ACM CoNEXT (2012)","DOI":"10.1145\/2413176.2413215"},{"key":"19_CR26","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.comnet.2014.10.005","volume":"75","author":"T Paul","year":"2014","unstructured":"Paul, T., Famulari, A., Strufe, T.: A survey on decentralized online social networks. Comput. Netw. 75, 437\u2013452 (2014)","journal-title":"Comput. Netw."},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Shakimov, A., Varshavsky, A., Cox, L.P., C\u00e1ceres, R.: Privacy, cost, and availability tradeoffs in decentralized osns. In: ACM WOSN (2009)","DOI":"10.1145\/1592665.1592669"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Singh, I., Butkiewicz, M., Madhyastha, H.V., Krishnamurthy, S.V., Addepalli, S.: Enabling private conversations on twitter. In: ACSAC, pp. 409\u2013418 (2012)","DOI":"10.1145\/2420950.2421009"},{"issue":"3","key":"19_CR29","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSP.2013.3","volume":"11","author":"I Singh","year":"2013","unstructured":"Singh, I., Butkiewicz, M., Madhyastha, H.V., Krishnamurthy, S.V., Addepalli, S.: Twitsper: tweeting privately. IEEE Secur. Priv. 11(3), 46\u201350 (2013)","journal-title":"IEEE Secur. Priv."},{"key":"19_CR30","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2013.07.007","volume":"41","author":"A Squicciarini","year":"2014","unstructured":"Squicciarini, A., Karumanchi, S., Lin, D., Desisto, N.: Identifying hidden social circles for advanced privacy configuration. Comput. Secur. 41, 40\u201351 (2014)","journal-title":"Comput. Secur."},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Squicciarini, A.C., Sundareswaran, S., Lin, D., Wede, J.: A3p: adaptive policy prediction for shared images over popular content sharing sites. In: Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia (2011)","DOI":"10.1145\/1995966.1996000"},{"key":"19_CR32","first-page":"20","volume":"9","author":"J Vitak","year":"2015","unstructured":"Vitak, J., Blasiola, S., Patil, S., Litt, E.: Balancing audience and privacy tensions on social network sites. Int. J. Commun. 9, 20 (2015)","journal-title":"Int. J. Commun."},{"key":"19_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_4"},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Watson, J., Besmer, A., Lipford, H.R.: +Your circles: sharing behavior on Google+. In: SOUPS. ACM (2012)","DOI":"10.1145\/2335356.2335373"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Xu, Z., Martin, K.M.: Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage. In: IEEE TrustCom (2012)","DOI":"10.1109\/TrustCom.2012.136"},{"key":"19_CR36","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lutes, J., Li, F., Luo, B., Liu, P.: Stalking online: on user privacy in social networks. In: ACM CODASPY, pp. 37\u201348. ACM (2012)","DOI":"10.1145\/2133601.2133607"},{"issue":"8","key":"19_CR37","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1007\/s00607-018-0637-2","volume":"101","author":"Yang Zhao","year":"2018","unstructured":"Zhao, Y., Ren, M., Jiang, S., Zhu, G., Xiong, H.: An efficient and revocable storage CP-ABE scheme in the cloud computing. Computing, 1\u201325 (2018). https:\/\/doi.org\/10.1007\/s00607-018-0637-2","journal-title":"Computing"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22312-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:37:05Z","timestamp":1710257825000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22312-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223113","9783030223120"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22312-0_19","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"34","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifipsec.org\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}