{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:10:09Z","timestamp":1743149409324,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319619484"},{"type":"electronic","value":"9783319619491"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61949-1_22","type":"book-chapter","created":{"date-parts":[[2017,7,14]],"date-time":"2017-07-14T00:14:26Z","timestamp":1499991266000},"page":"203-212","source":"Crossref","is-referenced-by-count":0,"title":["Preserving Privacy in a P2P Social Network"],"prefix":"10.1007","author":[{"given":"Monica","family":"Mordonini","sequence":"first","affiliation":[]},{"given":"Agostino","family":"Poggi","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Tomaiuolo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,15]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Amft, T., Guidi, B., Graffi, K., Ricci, L.: Frodo: friendly routing over dunbar-based overlays. In: 2015 IEEE 40th Conference on Local Computer Networks (LCN), pp. 356\u2013364. IEEE (2015)","DOI":"10.1109\/LCN.2015.7366330"},{"key":"22_CR2","unstructured":"Anne, V.K., Praveen, G., Ramesh, N., Kurra, R.R.: Extension of MA-ABE for better data security in cloud. Int. J. Comput. Sci. Technol. (IJCST) 3(1\u20131), A-419 (2012)"},{"issue":"4","key":"22_CR3","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/1594977.1592585","volume":"39","author":"R Baden","year":"2009","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. ACM SIGCOMM Comput. Commun. Rev. 39(4), 135\u2013146 (2009)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Schi\u00f6berg, D., Vu, L., Datta, A.: Peerson: P2P social networking: early experiences and insights. In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pp. 46\u201352. ACM (2009)","DOI":"10.1145\/1578002.1578010"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-540-70936-7_28","volume-title":"Theory of Cryptography","author":"M Chase","year":"2007","unstructured":"Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515\u2013534. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-70936-7_28"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 121\u2013130. ACM (2009)","DOI":"10.1145\/1653662.1653678"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Cutillo, L., Molva, R., Strufe, T.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 95 (2009)","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"22_CR9","unstructured":"Ehlert, M.: I2P usability vs. tor usability a bandwidth and latency comparison. In: Seminar Report, Humboldt University of Berlin (2011)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Falkner, J., Piatek, M., John, J.P., Krishnamurthy, A., Anderson, T.: Profiling a million user DHT. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 129\u2013134. ACM (2007)","DOI":"10.1145\/1298306.1298325"},{"issue":"2","key":"22_CR11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4018\/IJDST.2016040103","volume":"7","author":"E Franchi","year":"2016","unstructured":"Franchi, E., Poggi, A., Tomaiuolo, M.: Blogracy: a peer-to-peer social network. Int. J. Distrib. Syst. Technol. (IJDST) 7(2), 37\u201356 (2016)","journal-title":"Int. J. Distrib. Syst. Technol. (IJDST)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Franchi, E., Tomaiuolo, M.: Distributed social platforms for confidentiality and resilience. In: Social Network Engineering for Secure Web Data and Services, p. 114 (2013)","DOI":"10.4018\/978-1-4666-3926-3.ch006"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398. ACM (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Graffi, K., Gro\u00df, C., Mukherjee, P., Kovacevic, A., Steinmetz, R.: Lifesocial.kom: a P2P-based platform for secure online social networks. In: 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), pp. 1\u20132. IEEE (2010)","DOI":"10.1109\/P2P.2010.5569977"},{"key":"22_CR15","unstructured":"Greene, M.: Where has privacy gone? How surveillance programs threaten expectations of privacy. J. Marshall J. Info. Tech. Privacy L. 30, 795 (2014). John Marshall J. Inf. Technol. Privacy Law 30(4), 5 (2014)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Guidi, B., Amft, T., De Salve, A., Graffi, K., Ricci, L.: Didusonet: a P2P architecture for distributed dunbar-based social networks. Peer-to-Peer Netw. Appl. 1\u201318 (2015)","DOI":"10.1007\/s12083-015-0366-7"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568\u2013588. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-20465-4_31"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Li, N.: Local names in SPKI\/SDSI. In: Proceedings of 13th IEEE Computer Security Foundations Workshop, CSFW-13. IEEE Computer Society (2000)","DOI":"10.1109\/CSFW.2000.856921"},{"issue":"13","key":"22_CR19","doi-asserted-by":"crossref","first-page":"2618","DOI":"10.1016\/j.ins.2010.03.004","volume":"180","author":"H Lin","year":"2010","unstructured":"Lin, H., Cao, Z., Liang, X., Shao, J.: Secure threshold multi authority attribute based encryption without a central authority. Inf. Sci. 180(13), 2618\u20132632 (2010)","journal-title":"Inf. Sci."},{"key":"22_CR20","volume-title":"Json Web Signature (JWS)","author":"J Muijnck-Hughes","year":"2011","unstructured":"Muijnck-Hughes, J.: Json Web Signature (JWS). Radboud University Nijmegen, Nijmegen (2011)"},{"issue":"4","key":"22_CR21","doi-asserted-by":"crossref","first-page":"803","DOI":"10.4134\/BKMS.2009.46.4.803","volume":"46","author":"S M\u00fcller","year":"2009","unstructured":"M\u00fcller, S., Katzenbeisser, S., Eckert, C.: On multi-authority ciphertext-policy attribute-based encryption. Bull. Korean Math. Soc. 46(4), 803\u2013819 (2009)","journal-title":"Bull. Korean Math. Soc."},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Tomaiuolo, M.: Trust management and delegation for the administration of web services. In: Organizational, Legal, and Technological Dimensions of Information System Administration, pp. 18\u201337 (2014)","DOI":"10.4018\/978-1-4666-4526-4.ch002"},{"issue":"2","key":"22_CR23","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2012","unstructured":"Wan, Z., Liu, J., Deng, R.H.: Hasbe: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743\u2013754 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"22_CR24","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","volume":"30","author":"G Wang","year":"2011","unstructured":"Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320\u2013331 (2011)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Smart Objects and Technologies for Social Good"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61949-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T01:00:30Z","timestamp":1569805230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61949-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319619484","9783319619491"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61949-1_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}