{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T02:26:51Z","timestamp":1752460011709,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319611754"},{"type":"electronic","value":"9783319611761"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61176-1_13","type":"book-chapter","created":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:54:25Z","timestamp":1498010065000},"page":"239-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Undoing of Privacy Policies on Facebook"],"prefix":"10.1007","author":[{"given":"Vishwas T.","family":"Patil","sequence":"first","affiliation":[]},{"given":"R. K.","family":"Shyamasundar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,22]]},"reference":[{"key":"13_CR1","unstructured":"Barka, E., Sandhu, R.: Framework for role-based delegation models. In: Proceedings of the 16th Annual Computer Security Applications Conference, p. 168. IEEE Computer Society (2000)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Bonneau, J., et al.: Eight friends are enough: Social graph approximation via public listings. In: 2nd EuroSys Workshop on Social Network Systems, SNS 2009, pp. 13\u201318. ACM (2009)","DOI":"10.1145\/1578002.1578005"},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2007","unstructured":"Boyd, D.M., Ellison, N.B.: Social network sites: Definition, history, and scholarship. J. Comput.-Mediated Commun. 13(1), 210\u2013230 (2007)","journal-title":"J. Comput.-Mediated Commun."},{"key":"13_CR4","unstructured":"Bronson, N., Amsden, Z., et al.: TAO: facebook\u2019s distributed data store for the social graph. In: USENIX ATC 2013, pp. 49\u201360 (2013)"},{"issue":"1","key":"13_CR5","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/1609956.1609962","volume":"13","author":"B Carminati","year":"2009","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM TISSEC 13(1), 6:1\u20136:38 (2009)","journal-title":"ACM TISSEC"},{"issue":"2","key":"13_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10207-007-0044-8","volume":"7","author":"J Crampton","year":"2008","unstructured":"Crampton, J., Khambhammettu, H.: Delegation in role-based access control. Int. J. Inf. Secur. 7(2), 123\u2013136 (2008)","journal-title":"Int. J. Inf. Secur."},{"issue":"11","key":"13_CR7","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.14778\/2536222.2536239","volume":"6","author":"M Curtiss","year":"2013","unstructured":"Curtiss, M., Becker, I., Bosman, T., et al.: Unicorn: a system for searching the social graph. Proc. VLDB Endow. 6(11), 1150\u20131161 (2013)","journal-title":"Proc. VLDB Endow."},{"key":"13_CR8","unstructured":"Facebook: Graph API Overview (2017). https:\/\/developers.facebook.com\/docs\/graph-api\/overview\/"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Fong, P.W.L.: Preventing sybil attacks by privilege attenuation: a design principle for social network systems. In: IEEE Symposium on Security and Privacy, pp. 263\u2013278 (2011)","DOI":"10.1109\/SP.2011.16"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-04444-1_19","volume-title":"Computer Security \u2013 ESORICS 2009","author":"PWL Fong","year":"2009","unstructured":"Fong, P.W.L., Anwar, M., Zhao, Z.: A privacy preservation model for facebook-style social network systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 303\u2013320. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-04444-1_19"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Graham, G.S., Denning, P.J.: Protection: principles and practice. In: Proceedings of the Spring Joint Computer Conference, AFIPS 1972, 16\u201318 May 1972, pp. 417\u2013429. ACM (1972)","DOI":"10.1145\/1478873.1478928"},{"key":"13_CR12","unstructured":"Hangal, S., Maclean, D., Lam, M.S., Heer, J.: All friends are not equal: using weights in social graphs to improve search. In: 4th SNA-KDD Workshop. ACM (2010)"},{"key":"13_CR13","unstructured":"International Association of Privacy Professionals: What is privacy? (2017). https:\/\/iapp.org\/about\/what-is-privacy\/"},{"key":"13_CR14","unstructured":"Jernigan, C., Mistree, B.: Project \u2018Gaydar\u2019 Computes Orientation. In: CACM (2009). http:\/\/cacm.acm.org\/news\/42191-project-gaydar-computes-orientation"},{"key":"13_CR15","volume-title":"Capability-Based Computer Systems","author":"HM Levy","year":"1984","unstructured":"Levy, H.M.: Capability-Based Computer Systems. Digital Press, Bedford (1984)"},{"key":"13_CR16","unstructured":"Li, N., Tripunitara, M.V.: On safety in discretionary access control. In: 2005 IEEE Symposium on Security and Privacy (SP 2005), pp. 96\u2013109, May 2005"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Reisman, D.: The princeton web transparency and accountability project. In: Cerquitelli, T., Quercia, D., Pasquale, F. (eds.) Transparent Data Mining for Big and Small Data. Studies in Big Data, vol. 11, 45\u201357. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-54024-5_3"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-50472-8_15","volume-title":"Distributed Computing and Internet Technology","author":"NV Narendra Kumar","year":"2017","unstructured":"Narendra Kumar, N.V., Shyamasundar, R.K.: Dynamic labelling to enforce conformance of cross domain security\/privacy policies. In: Krishnan, P., Radha Krishna, P., Parida, L. (eds.) ICDCIT 2017. LNCS, vol. 10109, pp. 183\u2013195. Springer, Cham (2017). doi:10.1007\/978-3-319-50472-8_15"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Patil, V.T., Shyamasundar, R.K.: Privacy as a currency: un-regulated? In: 14th International Conference on Security and Cryptography, SECRYPT 2017 (2017, to appear)","DOI":"10.5220\/0006478705860595"},{"key":"13_CR20","unstructured":"Patil, V.T., Shyamasundar, R.K.: Social networks and collective unravelling of privacy. Technical report, ISRDC, IIT Bombay (2017). http:\/\/isrdc.iitb.ac.in\/reports\/isrdc-tr-2017-rks-vtp-sns-privacy.pdf"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Renaud, K.G.D.: Privacy: Aspects, definitions and a multi-faceted privacy preservation approach. In: 2010 Information Security for South Africa, pp. 1\u20138, August 2010","DOI":"10.1109\/ISSA.2010.5588297"},{"issue":"11","key":"13_CR22","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"RS Sandhu","year":"1993","unstructured":"Sandhu, R.S.: Lattice-based access control models. Computer 26(11), 9\u201319 (1993)","journal-title":"Computer"},{"issue":"1","key":"13_CR23","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM TISSEC 3(1), 30\u201350 (2000)","journal-title":"ACM TISSEC"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61176-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T15:47:49Z","timestamp":1710344869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-61176-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319611754","9783319611761"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61176-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Philadelphia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec2017.ittc.ku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}