{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T20:10:09Z","timestamp":1749672609436,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319480565"},{"type":"electronic","value":"9783319480572"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_22","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T04:37:01Z","timestamp":1477111021000},"page":"317-328","source":"Crossref","is-referenced-by-count":0,"title":["A Supporting Automatically Mechanism for Data Owner Preventing Personal Privacy from Colluding Attack on Online Social Networks"],"prefix":"10.1007","author":[{"given":"Nguyen Hoang Nam","family":"Pham","sequence":"first","affiliation":[]},{"given":"Thanh Tien","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Thi Kim Tuyen","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"key":"22_CR1","unstructured":"https:\/\/zephoria.com\/top-15-valuable-facebook-statistics\/"},{"key":"22_CR2","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2007","unstructured":"Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput. Mediated Commun. 13, 210\u2013230 (2007)","journal-title":"J. Comput. Mediated Commun."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Conceptual foundations for a model of task-based authorizations. In: 7th IEEE Computer Security Foundations Workshop, pp. 66\u201379. IEEE Computer Society Press (1994)","DOI":"10.1109\/CSFW.1994.315946"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. In: Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Security XI: Status and Prospects, pp. 166\u2013181. Chapman & Hall, Ltd., London. ISBN 0-412-82090-0 (1998)","DOI":"10.1007\/978-0-387-35285-5_10"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Thomas, R.K.: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Second ACM Workshop on Role-Based Access Control, pp. 13\u201319. ACM (1997). ISBN 0897919858","DOI":"10.1145\/266741.266748"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on Privacy in the Electronic Society (WPES 2005), pp. 71\u201380 (2005). ISBN 1-59593-228-3","DOI":"10.1145\/1102199.1102214"},{"key":"22_CR7","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.cose.2014.10.012","volume":"49","author":"Y Li","year":"2015","unstructured":"Li, Y., Li, Y., Yan, Q., Deng, R.H.: Privacy leakage analysis in online social networks. Comput. Secur. 49, 239\u2013254 (2015). http:\/\/dx.doi.org\/10.1016\/j.cose.2014.10.012","journal-title":"Comput. Secur."},{"key":"22_CR8","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.cose.2014.03.009","volume":"43","author":"L Gonz\u00e1lez-Manzano","year":"2014","unstructured":"Gonz\u00e1lez-Manzano, L., Gonz\u00e1lez-Tablas, A.I., de Fuentes, J.M., Ribagorda, A.: SoNeUCONABC, an expressive usage control model for Web-Based Social Networks. Comput. Secur. 43, 159\u2013187 (2014). http:\/\/dx.doi.org\/10.1016\/j.cose.2014.03.009","journal-title":"Comput. Secur."},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Li, J., Tang, Y., Mao, C., Lai, H., Zhu, J.: Role based access control for social network sites. In: Joint Conferences on Pervasive Computing (JCPC) 2009, Tamsui, Taipei, pp. 389\u2013394 (2009)","DOI":"10.1109\/JCPC.2009.5420153"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1734","DOI":"10.1007\/11915072_80","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"B Carminati","year":"2006","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006. LNCS, vol. 4278, pp. 1734\u20131744. Springer, Heidelberg (2006). doi: 10.1007\/11915072_80"},{"key":"22_CR11","unstructured":"Golbeck, J.: Computing and applying trust in web-based social network. Ph.D. thesis, University of Maryland, College Park, Md, USA (2005)"},{"key":"22_CR12","unstructured":"Fong, P.W.L.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, pp. 191\u2013202. ACM, New York (2011). ISBN 978-1-4503-0466-5"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Joshi, J.: Osnac: an ontology-based access control model for social networking systems. In: Proceedings of the 2010 IEEE Second International Conference on Social Computing, SOCIALCOM 2010, pp. 751\u2013759. IEEE Computer Society, Washington (2010). ISBN 978-0-7695-4211-9","DOI":"10.1109\/SocialCom.2010.116"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 177\u2013186. ACM, New York (2009). ISBN 978-1-60558-537-6","DOI":"10.1145\/1542207.1542237"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Park, J., Sandhu, R.: Attribute-aware relationship-based access control for online social networks. In: Data and Applications Security and Privacy XXVIII (2014)","DOI":"10.1007\/978-3-662-43936-4_19"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Bruns, G., Fong, P.W.L., Siahaan, I., Huth, M.: Relationship-based access control: its expression and enforcement through hybrid logic. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY 2012), pp. 117\u2013124. ACM, New York (2012)","DOI":"10.1145\/2133601.2133616"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Fong, P.W.L.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, pp. 191\u2013202. ACM, New York (2011). ISBN 978-1-4503-0466-5","DOI":"10.1145\/1943513.1943539"},{"issue":"7","key":"22_CR18","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1109\/TKDE.2012.97","volume":"25","author":"H Hu","year":"2013","unstructured":"Hu, H., Ahn, G.J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25(7), 1614\u20131627 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"22_CR19","unstructured":"Stanford Large Network Dataset Collection. https:\/\/snap.stanford.edu\/data\/"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:49:29Z","timestamp":1749671369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}