{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:32:11Z","timestamp":1742934731436,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319281650"},{"type":"electronic","value":"9783319281667"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28166-7_21","type":"book-chapter","created":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T15:29:04Z","timestamp":1452266944000},"page":"431-453","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information"],"prefix":"10.1007","author":[{"given":"Milivoj","family":"Simeonovski","sequence":"first","affiliation":[]},{"given":"Fabian","family":"Bendun","sequence":"additional","affiliation":[]},{"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Backes","sequence":"additional","affiliation":[]},{"given":"Ninja","family":"Marnau","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Druschel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,9]]},"reference":[{"key":"21_CR1","unstructured":"Stanford Named Entity Recognizer (NER). http:\/\/nlp.stanford.edu\/software\/CRF-NER.shtml. Last Accessed: 11 October 2014"},{"key":"21_CR2","unstructured":"The web robots pages. http:\/\/www.robotstxt.org\/. Last Accessed: 10 October 2014"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1007\/978-3-540-76298-0_52","volume-title":"The Semantic Web","author":"S Auer","year":"2007","unstructured":"Auer, S., Bizer, C., Kobilarov, G., Lehmann, J., Cyganiak, R., Ives, Z.G.: DBpedia: a nucleus for a web of open data. In: Aberer, K., et al. (eds.) ISWC\/ASWC 2007. LNCS, vol. 4825, pp. 722\u2013735. Springer, Heidelberg (2007)"},{"key":"21_CR4","unstructured":"Backes, M., Bendun, F., Hoffman, J., Marnau, N.: PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law (Extended Version) (2015). arxiv.org\/abs\/1501.03353"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Backes, M., Gerling, S., Lorenz, S., Lukas, S.: X-pire 2.0 - a user-controlled expiration date and copy protection mechanism. In: Proceedings of the 29th ACM Symposium on Applied Computing (SAC 2014). ACM (2014)","DOI":"10.1145\/2554850.2554856"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Bandhakavi, S., Zhang, C.C., Winslett, M.: Super-sticky and declassifiable release policies for flexible information dissemination control. In: WPES, pp. 51\u201358 (2006)","DOI":"10.1145\/1179601.1179609"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., De Cristofaro, E., Francillon, A., Kaafar, M.A.: EphPub: toward robust ephemeral publishing. In: 2011 19th IEEE International Conference on Network Protocols (ICNP), pp. 165\u2013175, October 2011","DOI":"10.1109\/ICNP.2011.6089048"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Chadwick, D.W., Lievens, S.F.: Enforcing \u201csticky\u201d security policies throughout a distributed application. In: Middleware Security, pp. 1\u20136 (2008)","DOI":"10.1145\/1463342.1463343"},{"key":"21_CR9","unstructured":"Court of Justice of the European Union: Judgment of the court (grand chamber). http:\/\/curia.europa.eu\/juris\/celex.jsf?celex=62012CJ0131. Last Accessed: 10 October 2014"},{"key":"21_CR10","unstructured":"crawler4j: Open source web crawler for Java. https:\/\/code.google.com\/p\/crawler4j\/. Last Accessed: 9 October 2014"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Dierks, T.: The Transport Layer Security (TLS) protocol version 1.2 (2008)","DOI":"10.17487\/rfc5246"},{"key":"21_CR12","unstructured":"European Parliament, Council of the European Union: Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32014R0910. Last Accessed: 10 October 2014"},{"key":"21_CR13","unstructured":"Federal Ministry of the Interior: German national identity card. http:\/\/www.personalausweisportal.de\/EN\/Citizens\/The-New-Identity-Card\/The_New_Identity_Card_node.html. Last Accessed: 10 October 2014"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Finkel, J.R., Grenager, T., Manning, C.D.: Incorporating non-local information into information extraction systems by gibbs sampling. In: Proceedings of the Conference on 43rd Annual Meeting of the Association for Computational Linguistics, ACL 2005, 25\u201330 June 2005. University of Michigan, USA (2005)","DOI":"10.3115\/1219840.1219885"},{"key":"21_CR15","unstructured":"Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, 10\u201314 August 2009, pp. 299\u2013316 (2009)"},{"key":"21_CR16","unstructured":"Google: European privacy requests for search removals. https:\/\/www.google.com\/transparencyreport\/removals\/europeprivacy\/?hl=en. Last Accessed: 23 January 2015"},{"key":"21_CR17","unstructured":"Google Inc.: Search removal request under European Data Protection law. https:\/\/support.google.com\/legal\/contact\/lr_eudpa?product=websearch. Last Accessed: 10 October 2014"},{"key":"21_CR18","unstructured":"Hoffart, J., Yosef, M.A., Bordino, I., F\u00fcrstenau, H., Pinkal, M., Spaniol, M., Taneva, B., Thater, S., Weikum, G.: Robust disambiguation of named entities in text. In: Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing, EMNLP 2011, John McIntyre Conference Centre, Edinburgh, UK, A meeting of SIGDAT, A Special Interest Group of the ACL, 27\u201331 July 2011, pp. 782\u2013792 (2011)"},{"key":"21_CR19","unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Proposed Standard), April 2002. http:\/\/www.ietf.org\/rfc\/rfc3280.txt. obsoleted by RFC 5280, updated by RFCs 4325, 4630"},{"key":"21_CR20","unstructured":"Microsoft: Request to block bing search results in europe. https:\/\/www.bing.com\/webmaster\/tools\/eu-privacy-request. Last Accessed: 10 October 2014"},{"key":"21_CR21","unstructured":"Mont, M.C., Pearson, S., Bramhall, P.: Towards accountable management of identity and privacy: sticky policies and enforceable tracing services. In: DEXA Workshops, pp. 377\u2013382 (2003)"},{"key":"21_CR22","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-0-387-72367-9_21","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"S Nair","year":"2007","unstructured":"Nair, S., Dashti, M., Crispo, B., Tanenbaum, A.: A hybrid PKI-IBC based ephemerizer system. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 241\u2013252. Springer, US (2007)"},{"key":"21_CR23","unstructured":"NLTK: WordNet Interface. http:\/\/www.nltk.org\/howto\/wordnet.html. Last Accessed: 29 September 2014"},{"issue":"3","key":"21_CR24","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1561\/1500000017","volume":"4","author":"C Olston","year":"2010","unstructured":"Olston, C., Najork, M.: Web crawling. Found. Trends Inf. Retrieval 4(3), 175\u2013246 (2010)","journal-title":"Found. Trends Inf. Retrieval"},{"key":"21_CR25","unstructured":"OpenCV: Open source computer vision. http:\/\/opencv.org\/. Last Accessed: 10 October 2014"},{"issue":"9","key":"21_CR26","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MC.2011.225","volume":"44","author":"S Pearson","year":"2011","unstructured":"Pearson, S., Mont, M.C.: Sticky policies: An approach for managing privacy across multiple parties. Computer 44(9), 60\u201368 (2011)","journal-title":"Computer"},{"key":"21_CR27","first-page":"51","volume":"1","author":"R Perlman","year":"2005","unstructured":"Perlman, R.: The Ephemerizer: making data disappear. J. Inf. Syst. Secur. 1, 51\u201368 (2005)","journal-title":"J. Inf. Syst. Secur."},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Reimann, S., D\u00fcrmuth, M.: Timed revocation of user data: long expiration times from existing infrastructure. In: WPES, pp. 65\u201374 (2012)","DOI":"10.1145\/2381966.2381976"},{"issue":"2","key":"21_CR29","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Suchanek, F.M., Kasneci, G., Weikum, G.: Yago: A core of semantic knowledge. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, pp. 697\u2013706 (2007)","DOI":"10.1145\/1242572.1242667"},{"key":"21_CR31","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., Wolf, L.: Deepface: closing the gap to human-level performance in face verification. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, 23\u201328 June 2014, pp. 1701\u20131708 (2014)","DOI":"10.1109\/CVPR.2014.220"},{"key":"21_CR32","unstructured":"The Council of the European Union: Residence permits for third-country nationals. http:\/\/eur-lex.europa.eu\/legal-content\/en\/TXT\/?uri=CELEX:32008R0380. Last Accessed: 10 October 2014"},{"issue":"5895","key":"21_CR33","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L Von Ahn","year":"2008","unstructured":"Von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: reCAPTCHA: Human-based character recognition via web security measures. Science 321(5895), 1465\u20131468 (2008)","journal-title":"Science"},{"key":"21_CR34","unstructured":"Yahoo: Requests to block search results in yahoo search: Resource for european residents. http:\/\/bit.ly\/185Lije. Last Accessed: 20 January 2015"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28166-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T01:10:18Z","timestamp":1612314618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28166-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319281650","9783319281667"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28166-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}