{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T15:06:52Z","timestamp":1748617612840,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319184661"},{"type":"electronic","value":"9783319184678"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18467-8_4","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T08:12:03Z","timestamp":1431072723000},"page":"51-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["POSN: A Personal Online Social Network"],"prefix":"10.1007","author":[{"given":"Esra","family":"Erdin","sequence":"first","affiliation":[]},{"given":"Eric","family":"Klukovich","sequence":"additional","affiliation":[]},{"given":"Gurhan","family":"Gunduz","sequence":"additional","affiliation":[]},{"given":"Mehmet Hadi","family":"Gunes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,9]]},"reference":[{"key":"4_CR1","unstructured":"Friendica: The internet is our social network. \n                    http:\/\/friendica.com"},{"key":"4_CR2","unstructured":"Retroshare: secure communications with friends. \n                    http:\/\/retroshare.sourceforge.net"},{"key":"4_CR3","unstructured":"Diaspora: community-run, distributed social-network. \n                    https:\/\/joindiaspora.com"},{"key":"4_CR4","unstructured":"Tent: All your data in one place. \n                    https:\/\/tent.io"},{"issue":"4","key":"4_CR5","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/49.839937","volume":"18","author":"G Ateniese","year":"2000","unstructured":"Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications 18(4), 628\u2013639 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM 2009","DOI":"10.1145\/1592568.1592585"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-16955-7_10","volume-title":"Middleware 2010","author":"M Bertier","year":"2010","unstructured":"Bertier, M., Frey, D., Guerraoui, R., Kermarrec, A.-M., Leroy, V.: The gossple anonymous social network. In: Gupta, I., Mascolo, C. (eds.) Middleware 2010. LNCS, vol. 6452, pp. 191\u2013211. Springer, Heidelberg (2010)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Schi\u00f6berg, D., Vu, L.-H., Datta, A.: Peerson: P2p social networking: early experiences and insights. In: SNS 2009 (2009)","DOI":"10.1145\/1578002.1578010"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Cutillo, L., Molva, R., Strufe, T.: Safebook: feasibility of transitive cooperation for privacy on a decentralized social network. In: WOWMOM 2009 (2009)","DOI":"10.1109\/WOWMOM.2009.5282446"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Dodds, P.S., Muhamad, R., Watts, D.J.: An experimental study of search in global social networks. Science (2003)","DOI":"10.1126\/science.1081058"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Durr, M., Maier, M., Dorfmeister, F.: Vegas - a secure and privacy-preserving peer-to-peer online social network. In: SocialCom\/PASSAT (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.42"},{"key":"4_CR12","unstructured":"Feldman, A.J., Blankstein, A., Freedman, M.J., Felten, E.W.: Social networking with frientegrity: privacy and integrity with an untrusted provider. In: USENIX Security 2012"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Graffi, K., Gross, C., Mukherjee, P., Kovacevic, A., Steinmetz, R.: Lifesocial.kom: a p2p-based platform for secure online social networks. In: P2P 2010","DOI":"10.1109\/P2P.2010.5569977"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Guha, S., Tang, K., Francis, P.: Noyb: privacy in online social networks. In: WOSN 2008","DOI":"10.1145\/1397735.1397747"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Gunes, M.H., Evrenosoglu, C.: Blind processing: securing data against system administrators. In: IEEE\/IFIP NOMS 2010","DOI":"10.1109\/NOMSW.2010.5486559"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Karaoglu, H.T., Akgun, M.B., Gunes, M.H., Yuksel, M.: Multi path considerations for anonymized routing: challenges and opportunities. In: IFIP NTMS 2012","DOI":"10.1109\/NTMS.2012.6208768"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Kardes, H., Sevincer, A., Gunes, M.H., Yuksel, M.: Six degrees of separation among US researchers. In: IEEE\/ACM ASONAM 2012","DOI":"10.1109\/ASONAM.2012.109"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Kirschner, P.A., Karpinski, A.C.: Facebook and academic performance. Computers in Human Behavior (2010)","DOI":"10.1016\/j.chb.2010.03.024"},{"issue":"12","key":"4_CR19","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1016\/j.comcom.2013.04.009","volume":"36","author":"B Li","year":"2013","unstructured":"Li, B., Erdin, E., Gunes, M.H., Bebis, G., Shipley, T.: An Overview of Anonymity Technology Usage. Computer Communications 36(12), 1269\u20131283 (2013)","journal-title":"Computer Communications"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-25821-3_4","volume-title":"Middleware 2011","author":"D Liu","year":"2011","unstructured":"Liu, D., Shakimov, A., C\u00e1ceres, R., Varshavsky, A., Cox, L.P.: Confidant: protecting osn data without locking it up. In: Kon, F., Kermarrec, A.-M. (eds.) Middleware 2011. LNCS, vol. 7049, pp. 61\u201380. Springer, Heidelberg (2011)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Milgram, S.: The small world problem. Psychology Today (1967)","DOI":"10.1037\/e400002009-005"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Narayanan, H.A.J., Gunes, M.H.: Ensuring access control in cloud provisioned healthcare systems. In: IEEE CCNC 2011","DOI":"10.1109\/CCNC.2011.5766466"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Naruchitparames, J., Gunes, M.H.: Enhancing data privacy and integrity in the cloud. In: HPCS 2011","DOI":"10.1109\/HPCSim.2011.5999856"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Naruchitparames, J., Gunes, M.H., Louis, S.J.: Friend recommendations in social networks using genetic algorithms and network topology. In: IEEE CEC 2011","DOI":"10.1109\/CEC.2011.5949888"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Narendula, R., Papaioannou, T., Aberer, K.: My3: a highly-available p2p-based online social network. In: Peer-to-Peer Computing (2011)","DOI":"10.1109\/P2P.2011.6038730"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Nilizadeh, S., Alam, N., Husted, N., Kapadia, A.: Pythia: a privacy aware, peer-to-peer network for social search. In: WPES 2011","DOI":"10.1145\/2046556.2046562"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Nilizadeh, S., Jahid, S., Mittal, P., Borisov, N., Kapadia, A.: Cachet: a decentralized architecture for privacy preserving social networking with caching. In: CoNEXT 2012","DOI":"10.1145\/2413176.2413215"},{"key":"4_CR28","unstructured":"Perrig, A.: Efficient collaborative key management protocols for secure autonomous group communication. In: CrypTEC 1999"},{"issue":"3","key":"4_CR29","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309\u2013329 (2003)","journal-title":"ACM Comput. Surv."},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Seong, S.-W., Seo, J., Nasielski, M., Sengupta, D., Hangal, S., Keat, S., Chu, T.R., Dodson, B., Lam, M.S.: Prpl: a decentralized social networking infrastructure. In: MCS 2010","DOI":"10.1145\/1810931.1810939"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Shakimov, A., Lim, H., Caceres, R., Cox, L., Li, K., Liu, D., Varshavsky, A.: Vis-a-vis: privacy-preserving online social networking via virtual individual servers. In: COMSNETS 2011","DOI":"10.1109\/COMSNETS.2011.5716497"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Sharma, R., Datta, A.: Supernova: super-peers based architecture for decentralized online social networks. In: COMSNETS 2012","DOI":"10.1109\/COMSNETS.2012.6151349"},{"key":"4_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-25821-3_3","volume-title":"Middleware 2011","author":"P Stuedi","year":"2011","unstructured":"Stuedi, P., Mohomed, I., Balakrishnan, M., Mao, Z.M., Ramasubramanian, V., Terry, D., Wobber, T.: Contrail: enabling decentralized social networks on smartphones. In: Kon, F., Kermarrec, A.-M. (eds.) Middleware 2011. LNCS, vol. 7049, pp. 41\u201360. Springer, Heidelberg (2011)"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: CoNEXT 2009","DOI":"10.1145\/1658939.1658959"},{"key":"4_CR35","unstructured":"Yeung, C.-M.A., Liccardi, I., Lu, K., Seneviratne, O., Berners-lee, T.: Decentralization: the future of online social networking. In: W3C Workshop on the Future of Social Networking Position Papers (2009)"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Wilson, C., Steinbauer, T., Wang, G., Sala, A., Zheng, H., Zhao, B.Y.: Privacy, availability and economics in the polaris mobile social network. In: HotMobile 2011","DOI":"10.1145\/2184489.2184499"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Wilson, R.E., Gosling, S.D., Graham, L.T.: A review of Facebook research in the social sciences. Perspectives on Psychological Science, May 2012","DOI":"10.1177\/1745691612442904"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, L., Mislove, A.: Building confederated web-based services with priv.io. In: COSN 2013","DOI":"10.1145\/2512938.2512943"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18467-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T20:28:21Z","timestamp":1559161701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18467-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184661","9783319184678"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18467-8_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}