{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:16:40Z","timestamp":1758273400360,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584683"},{"type":"electronic","value":"9783319584690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58469-0_6","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T11:34:53Z","timestamp":1493811293000},"page":"79-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Secure Photo Sharing in Social Networks"],"prefix":"10.1007","author":[{"given":"Pablo","family":"Picazo-Sanchez","sequence":"first","affiliation":[]},{"given":"Ra\u00fal","family":"Pardo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0629-6853","authenticated-orcid":false,"given":"Gerardo","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"6_CR1","unstructured":"Statista: Facebook statistics (2016). https:\/\/www.statista.com\/statistics\/264810\/number-of-monthly-active-facebook-users-worldwide\/. Accessed 4 Oct 2016"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.chb.2014.04.048","volume":"37","author":"A Eftekhar","year":"2014","unstructured":"Eftekhar, A., Fullwood, C., Morris, N.: Capturing personality from facebook photos and photo-related activities: how much exposure do you need? Comput. Hum. Behav. 37, 162\u2013170 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.poetic.2013.10.002","volume":"42","author":"E Litt","year":"2014","unstructured":"Litt, E., Hargittai, E.: Smile, snap, and share? A nuanced approach to privacy and online photo-sharing. Poetics 42, 1\u201321 (2014)","journal-title":"Poetics"},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1080\/1369118X.2015.1077262","volume":"19","author":"K Lobinger","year":"2016","unstructured":"Lobinger, K.: Photographs as things \u2013 photographs of things. A texto-material perspective on photo-sharing practices. Inf. Commun. Soc. 19(4), 475\u2013488 (2016)","journal-title":"Inf. Commun. Soc."},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.tele.2015.06.009","volume":"33","author":"A Malik","year":"2016","unstructured":"Malik, A., Dhir, A., Nieminen, M.: Uses and gratifications of digital photo sharing on facebook. Telematics Inform. 33(1), 129\u2013138 (2016)","journal-title":"Telematics Inform."},{"issue":"2","key":"6_CR6","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIC.2014.107","volume":"19","author":"K Liang","year":"2015","unstructured":"Liang, K., Liu, J.K., Lu, R., Wong, D.S.: Privacy concerns for photo sharing in online social networks. IEEE Internet Comput. 19(2), 58\u201363 (2015)","journal-title":"IEEE Internet Comput."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Taheri-Boshrooyeh, S., K\u00fcp\u00e7\u00fc, A., \u00d6zkasap, O.: Security and privacy of distributed online social networks. In: 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, pp. 112\u2013119, June 2015","DOI":"10.1109\/ICDCSW.2015.30"},{"key":"6_CR8","unstructured":"Bronson, N., Amsden, Z., Cabrera, G., Chakka, P., Dimov, P., Ding, H., Ferris, J., Giardullo, A., Kulkarni, S., Li, H., et al.: Tao: Facebook\u2019s distributed data store for the social graph. In: USENIX ATC 2013, pp. 49\u201360 (2013)"},{"key":"6_CR9","unstructured":"Nishtala, R., Fugal, H., Grimm, S., Kwiatkowski, M., Lee, H., Li, H.C., McElroy, R., Paleczny, M., Peek, D., Saab, P., Stafford, D., Tung, T., Venkataramani, V.: Scaling memcache at facebook. In: NSDI 2013, USENIX, pp. 385\u2013398 (2013)"},{"key":"6_CR10","unstructured":"Diaspora (2016). https:\/\/joindiaspora.com"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568\u2013588. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-20465-4_31"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-662-47854-7_19","volume-title":"Financial Cryptography and Data Security","author":"Y Rouselakis","year":"2015","unstructured":"Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 315\u2013332. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-47854-7_19"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-19379-8_4"},{"issue":"4","key":"6_CR14","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1594977.1592585","volume":"39","author":"R Baden","year":"2009","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. SIGCOMM Comput. Commun. Rev. 39(4), 135\u2013146 (2009)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Schi\u00f6berg, D., Vu, L.H., Datta, A.: Peerson: P2P social networking: early experiences and insights. In: Workshop SNS \u201909 (SNS 2009), pp. 46\u201352. ACM, New York (2009)","DOI":"10.1145\/1578002.1578010"},{"issue":"12","key":"6_CR16","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2009.5350374","volume":"47","author":"LA Cutillo","year":"2009","unstructured":"Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Magaz. 47(12), 94\u2013101 (2009)","journal-title":"IEEE Commun. Magaz."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Nilizadeh, S., Jahid, S., Mittal, P., Borisov, N., Kapadia, A.: Cachet: a decentralized architecture for privacy preserving social networking with caching. In: CoNEXT 2012, pp. 337\u2013348. ACM, New York (2012)","DOI":"10.1145\/2413176.2413215"},{"key":"6_CR18","unstructured":"Ra, M.R., Govindan, R., Ortega, A.: P3: toward privacy-preserving photo sharing. In: NSDI 2013, Lombard, IL, USENIX, pp. 515\u2013528 (2013)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Yuan, L., Mc Nally, D., K\u00fcp\u00e7\u00fc, A., Ebrahimi, T.: Privacy-preserving photo sharing based on a public key infrastructure. In: SPIE Optical Engineering + Applications. Applications of Digital Image Processing XXXVIII (2015)","DOI":"10.1117\/12.2190458"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, L., Jung, T., Liu, C., Ding, X., Li, X.Y., Liu, Y.: POP: privacy-preserving outsourced photo sharing and searching for mobile devices. In: 2015 IEEE 35th International Conference on Distributed Computing Systems, pp. 308\u2013317, June 2015","DOI":"10.1109\/ICDCS.2015.39"},{"issue":"6","key":"6_CR21","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s10207-014-0270-9","volume":"14","author":"H Qian","year":"2015","unstructured":"Qian, H., Li, J., Zhang, Y., Han, J.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14(6), 487\u2013497 (2015)","journal-title":"Int. J. Inf. Secur."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Fong, P.W.: Relationship-based access control: protection model and policy language. In: CODASPY 2011, pp. 191\u2013202. ACM (2011)","DOI":"10.1145\/1943513.1943539"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Pardo, R., Kelly\u00e9rov\u00e1, I., S\u00e1nchez, C., Schneider, G.: Specification of evolving privacy policies for online social networks. In: 23rd International Symposium on Temporal Representation and Reasoning (TIME), pp. 70\u201379 (2016)","DOI":"10.1109\/TIME.2016.15"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-319-10431-7_30","volume-title":"Software Engineering and Formal Methods","author":"R Pardo","year":"2014","unstructured":"Pardo, R., Schneider, G.: A formal privacy policy framework for social networks. In: Giannakopoulou, D., Sala\u00fcn, G. (eds.) SEFM 2014. LNCS, vol. 8702, pp. 378\u2013392. Springer, Cham (2014). doi:10.1007\/978-3-319-10431-7_30"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58469-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:03:26Z","timestamp":1621641806000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58469-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584683","9783319584690"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58469-0_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifipsec.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}