{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:14:19Z","timestamp":1743063259862,"version":"3.40.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319471686"},{"type":"electronic","value":"9783319471693"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47169-3_33","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T17:56:23Z","timestamp":1475603783000},"page":"407-412","source":"Crossref","is-referenced-by-count":1,"title":["On the Runtime Enforcement of Evolving Privacy Policies in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Gordon J.","family":"Pace","sequence":"first","affiliation":[]},{"given":"Ra\u00fal","family":"Pardo","sequence":"additional","affiliation":[]},{"given":"Gerardo","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"33_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-03240-0_13","volume-title":"Formal Methods for Industrial Critical Systems","author":"C Colombo","year":"2009","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: Dynamic event-based runtime monitoring of real-time and contextual properties. In: Cofer, D., Fantechi, A. (eds.) FMICS 2008. LNCS, vol. 5596, pp. 135\u2013149. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-03240-0_13"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: LARVA \u2013 safer monitoring of real-time Java programs (tool paper). In: SEFM 2009, pp. 33\u201337. IEEE Computer Society (2009)","DOI":"10.1109\/SEFM.2009.13"},{"key":"33_CR3","unstructured":"Diaspora*. https:\/\/diasporafoundation.org\/ . Accessed 1 July 2016"},{"key":"33_CR4","unstructured":"$${\\cal PPF}$$ PPF Diaspora*. Test pod (2016). https:\/\/ppf-diaspora.raulpardo.org , Code. https:\/\/github.com\/raulpardo\/ppf-diaspora"},{"key":"33_CR5","unstructured":"Lenhart, A., Purcell, K., Smith, A., Zickuhr, K.: Social media & mobile internet use among teens and young adults. millennials. Pew Internet & American Life Project (2010)"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: User expectations vs. reality. In: ACM SIGCOMM IMC 2011, pp. 61\u201370. ACM (2011)","DOI":"10.1145\/2068816.2068823"},{"key":"33_CR7","unstructured":"Pardo, R.: Formalising Privacy Policies for Social Networks. Department of Computer Science and Engineering, Chalmers University of Technology, Licentiate thesis (2015)"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-319-10431-7_30","volume-title":"Software Engineering and Formal Methods","author":"R Pardo","year":"2014","unstructured":"Pardo, R., Schneider, G.: A formal privacy policy framework for social networks. In: Giannakopoulou, D., Sala\u00fcn, G. (eds.) SEFM 2014. LNCS, vol. 8702, pp. 378\u2013392. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-10431-7_30"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47169-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T04:08:56Z","timestamp":1568434136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47169-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319471686","9783319471693"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47169-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}