{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:15:24Z","timestamp":1751602524387,"version":"3.41.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788159"},{"type":"electronic","value":"9783319788166"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78816-6_17","type":"book-chapter","created":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T03:02:48Z","timestamp":1524538968000},"page":"234-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["$$SoNeUCON_{ABC}Pro$$SoNeUCONABCPro: An Access Control Model for Social Networks with\u00a0Translucent User Provenance"],"prefix":"10.1007","author":[{"given":"Lorena","family":"Gonz\u00e1lez-Manzano","sequence":"first","affiliation":[]},{"given":"Mark","family":"Slaymaker","sequence":"additional","affiliation":[]},{"given":"Jose M.","family":"de Fuentes","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Vayenas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"17_CR1","unstructured":"The Advanced Distributed Learning (ADL) Initiative. Experience API, version 1.0.1 (2013). http:\/\/www.adlnet.org\/wp-content\/uploads\/2013\/10\/xAPI_v1.0.1-2013-10-01.pdf . Accessed July 2016"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-22263-4_12","volume-title":"Privacy Enhancing Technologies","author":"F Beato","year":"2011","unstructured":"Beato, F., Kohlweiss, M., Wouters, K.: Scramble! Your social network data. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 211\u2013225. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22263-4_12"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/3-540-44450-5_6","volume-title":"FST TCS 2000: Foundations of Software Technology and Theoretical Computer Science","author":"P Buneman","year":"2000","unstructured":"Buneman, P., Khanna, S., Tan, W.-C.: Data provenance: some basic issues. In: Kapoor, S., Prasad, S. (eds.) FSTTCS 2000. LNCS, vol. 1974, pp. 87\u201393. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44450-5_6"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1108\/17440080810919468","volume":"4","author":"B Carminati","year":"2008","unstructured":"Carminati, B., Ferrari, E.: Access control and privacy in web-based social networks. Int. J. Web Inf. Syst. 4, 395\u2013415 (2008)","journal-title":"Int. J. Web Inf. Syst."},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1734","DOI":"10.1007\/11915072_80","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"B Carminati","year":"2006","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006, Part II. LNCS, vol. 4278, pp. 1734\u20131744. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11915072_80"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Private relationships in social networks. In: ICDE, pp. 163\u2013171. IEEE (2007)","DOI":"10.1109\/ICDEW.2007.4400987"},{"issue":"1","key":"17_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1609956.1609962","volume":"13","author":"B Carminati","year":"2009","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. TISSEC 13(1), 6 (2009)","journal-title":"TISSEC"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Park, J., Sandhu, R.: Relationship-based access control for online social networks: beyond user-to-user relationships. In: SocialCom, pp. 646\u2013655 (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Bijon, K., Sandhu, R.: Extended ReBAC administrative models with cascading revocation and provenance support. In: SACMAT, pp. 161\u2013170. ACM (2016)","DOI":"10.1145\/2914642.2914655"},{"issue":"12","key":"17_CR10","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2009.5350374","volume":"47","author":"LA Cutillo","year":"2009","unstructured":"Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47(12), 94\u2013101 (2009)","journal-title":"IEEE Commun. Mag."},{"key":"17_CR11","unstructured":"Danezis, G., Mittal, P.: Sybilinfer: detecting sybil nodes using social networks. In: NDSS (2009)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Davidson, S.B., et al.: On provenance and privacy. In: EDBT\/ICDT, pp. 3\u201310. ACM (2011)","DOI":"10.1145\/1938551.1938554"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Fong, P.W.L., Siahaan, I.: Relationship-based access control policies and their policy languages. In: SACMAT, pp. 51\u201360. ACM (2011)","DOI":"10.1145\/1998441.1998450"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Gilbert, E.: Designing social translucence over social networks. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2731\u20132740. ACM (2012)","DOI":"10.1145\/2207676.2208670"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.cose.2014.03.009","volume":"43","author":"L Gonz\u00e1lez-Manzano","year":"2014","unstructured":"Gonz\u00e1lez-Manzano, L., Gonz\u00e1lez-Tablas, A.I., de Fuentes, J.M., Ribagorda, A.: $$SoNeUCON_{ABC}$$SoNeUCONABC, an expressive usage control model for web-based social networks. Comput. Secur. 43, 159\u2013187 (2014)","journal-title":"Comput. Secur."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Jahid, S., et al.: DECENT: a decentralized architecture for enforcing privacy in online social networks. In: PERCOM Workshops, pp. 326\u2013332. IEEE (2012)","DOI":"10.1109\/PerComW.2012.6197504"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Lalas, E., Papathanasiou, A., Lambrinoudakis, C.: Privacy and traceability in social networking sites. In: PCI, pp. 127\u2013132. IEEE (2012)","DOI":"10.1109\/PCi.2012.57"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Li, J., et al.: Role based access control for social network sites. In: JCPC, pp. 389\u2013394. IEEE (2009)","DOI":"10.1109\/JCPC.2009.5420153"},{"key":"17_CR19","unstructured":"Lynch, S.: The Agency \u201cCannot Survive Without Being More Transparent\u201d. https:\/\/www.gsb.stanford.edu\/insights\/former-nsa-head-michael-hayden-agency-cannot-survive-without-being-more-transparent . Accessed July 2016 (2014)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Joshi, J.: OSNAC: an ontology-based access control model for social networking systems. In: SOCIALCOM, pp. 751\u2013759. IEEE Computer Society (2010)","DOI":"10.1109\/SocialCom.2010.116"},{"key":"17_CR21","unstructured":"Munckhof, C.V.D.: Content based access control in social network sites. Master\u2019s thesis. Eindhoven University of Technology (2011)"},{"issue":"3","key":"17_CR22","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/01449290410001669914","volume":"23","author":"FFH Nah","year":"2004","unstructured":"Nah, F.F.H.: A study on tolerable waiting time: how long are web users willing to wait? Behav. Inf. Technol. 23(3), 153\u2013163 (2004)","journal-title":"Behav. Inf. Technol."},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Park, J., Nguyen, D., Sandhu, R.: On data provenance in group-centric secure collaboration. In: CollaborateCom, pp. 221\u2013230. IEEE (2011)","DOI":"10.4108\/icst.collaboratecom.2011.247192"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Park, J., Nguyen, D., Sandhu, R.: A provenance-based access control model. In: PST, pp. 137\u2013144. IEEE (2012)","DOI":"10.1109\/PST.2012.6297930"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Pei, J., Ye, X.: Towards policy retrieval for provenance based access control model. In: TrustCom, pp. 769\u2013776. IEEE (2014)","DOI":"10.1109\/TrustCom.2014.101"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-642-24559-6_17","volume-title":"Formal Methods and Software Engineering","author":"D Power","year":"2011","unstructured":"Power, D., Slaymaker, M., Simpson, A.: Conformance checking of dynamic access control policies. In: Qin, S., Qiu, Z. (eds.) ICFEM 2011. LNCS, vol. 6991, pp. 227\u2013242. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24559-6_17"},{"issue":"9","key":"17_CR27","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40\u201348 (1994)","journal-title":"IEEE Commun. Mag."},{"key":"17_CR28","unstructured":"Scowen, R.S.: Extended BNF-a generic base standard. Technical report, ISO\/IEC 14977 (1998). http:\/\/www.cl.cam.ac.uk\/mgk25\/iso-14977.pdf"},{"key":"17_CR29","volume-title":"Surveillance After Snowden: Effective Espionage in an Age of Transparency","author":"R Simcox","year":"2015","unstructured":"Simcox, R.: Surveillance After Snowden: Effective Espionage in an Age of Transparency. The Henry Jackson Society, London (2015)"},{"key":"17_CR30","unstructured":"ISO Standards. Date and time format - ISO 8601 (1988)"},{"issue":"05","key":"17_CR31","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Wei, W., et al.: Sybildefender: defend against sybil attacks in large social networks. In: INFOCOM, pp. 1951\u20131959. IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195572"},{"key":"17_CR33","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/1151659.1159945","volume":"36","author":"H Yu","year":"2006","unstructured":"Yu, H., et al.: Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput. Commun. Rev. 36, 267\u2013278 (2006)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"17_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-24177-7_4","volume-title":"Computer Security \u2013 ESORICS 2015","author":"Y Zheng","year":"2015","unstructured":"Zheng, Y., Wang, B., Lou, W., Hou, Y.T.: Privacy-preserving link prediction in decentralized online social networks. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015, Part II. LNCS, vol. 9327, pp. 61\u201380. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24177-7_4"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: ICDE, pp. 506\u2013515. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497459"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78816-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T22:05:12Z","timestamp":1751580312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78816-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788159","9783319788166"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78816-6_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}