{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:45:12Z","timestamp":1742957112460,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319459301"},{"type":"electronic","value":"9783319459318"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45931-8_11","type":"book-chapter","created":{"date-parts":[[2016,9,16]],"date-time":"2016-09-16T07:26:19Z","timestamp":1474010779000},"page":"171-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["LAMP - Label-Based Access-Control for More Privacy in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Leila","family":"Bahri","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Carminati","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"William","family":"Lucia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,17]]},"reference":[{"key":"11_CR1","unstructured":"Bahri, L., Carminati, B., Ferrari, E., Lucia, W.: Technical report: Lamp - label-based access control for more privacy in online social networks (2016). https:\/\/drive.google.com\/file\/d\/0B9hyKuTMyMBzeTUxbGZBWHlQSHc\/view"},{"issue":"1","key":"11_CR2","first-page":"6","volume":"13","author":"B Carminati","year":"2009","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. System Secur. (TISSEC) 13(1), 6 (2009)","journal-title":"ACM Trans. Inf. System Secur. (TISSEC)"},{"issue":"4","key":"11_CR3","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1504\/IJCSE.2014.060717","volume":"9","author":"L Caviglione","year":"2014","unstructured":"Caviglione, L., Coccoli, M., Merlo, A.: A taxonomy-based model of security and privacy in online social networks. Int. J. Comput. Sci. Eng. 9(4), 325\u2013338 (2014)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Park, J., Sandhu, R.: Relationship-based access control for online social networks: beyond user-to-user relationships. In: Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Conference on Social Computing (SocialCom), pp. 646\u2013655. IEEE (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Ferrari, E.: Access Control in Data Management Systems. Synthesis Lectures on Data Management, Morgan & Claypool Publishers (2010). http:\/\/dx.doi.org\/10.2200\/S00281ED1V01Y201005DTM004","DOI":"10.2200\/S00281ED1V01Y201005DTM004"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Fong, P.W., Siahaan, I.: Relationship-based access control policies and their policy languages. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, pp. 51\u201360. ACM (2011)","DOI":"10.1145\/1998441.1998450"},{"issue":"4","key":"11_CR7","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MIC.2011.50","volume":"15","author":"H Gao","year":"2011","unstructured":"Gao, H., Hu, J., Huang, T., Wang, J., Chen, Y.: Security issues in online social networks. IEEE Internet Comput. 15(4), 56\u201363 (2011)","journal-title":"IEEE Internet Comput."},{"issue":"7","key":"11_CR8","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/TKDE.2012.97","volume":"25","author":"H Hu","year":"2013","unstructured":"Hu, H., Ahn, G.J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25(7), 1614\u20131627 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Hu, H., Ahn, G.J., Zhao, Z., Yang, D.: Game theoretic analysis of multiparty access control in online social networks. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, pp. 93\u2013102. ACM (2014)","DOI":"10.1145\/2613087.2613097"},{"key":"11_CR10","unstructured":"Madejski, M., Johnson, M.L., Bellovin, S.M.: The failure of online social network privacy settings. Columbia University Academic Commons (2011)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Joshi, J.: Osnac: an ontology-based access control model for social networking systems. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), pp. 751\u2013759. IEEE (2010)","DOI":"10.1109\/SocialCom.2010.116"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-662-43936-4_11","volume-title":"Data and Applications Security and Privacy XXVIII","author":"P Mehregan","year":"2014","unstructured":"Mehregan, P., Fong, P.W.L.: Design patterns for multiple stakeholders in social computing. In: Atluri, V., Pernul, G. (eds.) DBSec 2014. LNCS, vol. 8566, pp. 163\u2013178. Springer, Heidelberg (2014)"},{"key":"11_CR13","unstructured":"ORACLE: Label security administrator\u2019s guide. http:\/\/docs.oracle.com\/cd\/B19306_01\/network.102\/b14267\/intro.htm . Accessed 29 May 2015"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.cose.2015.04.013","volume":"54","author":"J Pang","year":"2015","unstructured":"Pang, J., Zhang, Y.: A new access control scheme for facebook-style social networks. Comput. Secur. 54, 44\u201359 (2015)","journal-title":"Comput. Secur."},{"issue":"3","key":"11_CR15","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1002\/asi.21473","volume":"62","author":"AC Squicciarini","year":"2011","unstructured":"Squicciarini, A.C., Xu, H., Zhang, X.L.: Cope: Enabling collaborative privacy management in online social networks. J. Am. Soc. Inform. Sci. Technol. 62(3), 521\u2013534 (2011)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"key":"11_CR16","unstructured":"Such, J.M., Rovatsos, M.: Privacy policy negotiation in social media. arXiv preprint (2014). arXiv:1412.5278"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45931-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T11:31:31Z","timestamp":1718796691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45931-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319459301","9783319459318"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45931-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"17 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISTP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Information Security Theory and Practice","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wistp2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}