{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:11:13Z","timestamp":1767651073915,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319955810"},{"type":"electronic","value":"9783319955827"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95582-7_11","type":"book-chapter","created":{"date-parts":[[2018,7,11]],"date-time":"2018-07-11T10:31:17Z","timestamp":1531305077000},"page":"185-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Timed Epistemic Knowledge Bases for Social Networks"],"prefix":"10.1007","author":[{"given":"Ra\u00fal","family":"Pardo","sequence":"first","affiliation":[]},{"given":"C\u00e9sar","family":"S\u00e1nchez","sequence":"additional","affiliation":[]},{"given":"Gerardo","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,12]]},"reference":[{"key":"11_CR1","unstructured":"Lenhart, A., Purcell, K., Smith, A., Zickuhr, K.: Social media & mobile internet use among teens and young adults. Millennials. Pew Internet & American Life Project (2010)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Madejski, M., Johnson, M., Bellovin, S.: A study of privacy settings errors in an online social network. In: PERCOM Workshops 2012, pp. 340\u2013345. IEEE (2012)","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it\u2019s complicated. In: SOUPS 2012, pp. 9:1\u20139:15. ACM (2012)","DOI":"10.1145\/2335356.2335369"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: IMC 2011, pp. 61\u201370. ACM (2011)","DOI":"10.1145\/2068816.2068823"},{"key":"11_CR5","unstructured":"Madejski, M., Johnson, M.L., Bellovin, S.M.: The failure of online social network privacy settings. Technical report, Columbia University (2011)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Pardo, R., Kelly\u00e9rov\u00e1, I., S\u00e1nchez, C., Schneider, G.: Specification of evolving privacy policies for online social networks. In: TIME 2016, pp. 70\u201379. IEEE (2016)","DOI":"10.1109\/TIME.2016.15"},{"key":"11_CR7","unstructured":"The Guardian: As fake news takes over Facebook feeds, many are taking satire as fact. www.theguardian.com\/media\/2016\/nov\/17\/facebook-fake-news-satire . Accessed 20 Oct 2017"},{"key":"11_CR8","unstructured":"The Guardian: How to solve Facebook\u2019s fake news problem: experts pitch their ideas. www.theguardian.com\/technology\/2016\/nov\/29\/facebook-fake-news-problem-experts-pitch-ideas-algorithms . Accessed 20 Oct 2017"},{"key":"11_CR9","unstructured":"The Guardian: Obama is worried about fake news on social media-and we should be too. www.theguardian.com\/media\/2016\/nov\/20\/barack-obama-facebook-fake-news-problem . Accessed 20 Oct 2017"},{"key":"11_CR10","unstructured":"van Zee, M., Doder, D., Dastani, M., van der Torre, L.W.N.: AGM revision of beliefs about action and time. In: IJCAI 2015, pp. 3250\u20133256. AAAI Press (2015)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-662-55665-8_4","volume-title":"Logic, Rationality, and Interaction","author":"Z Xiong","year":"2017","unstructured":"Xiong, Z., \u00c5gotnes, T., Seligman, J., Zhu, R.: Towards a logic of tweeting. In: Baltag, A., Seligman, J., Yamada, T. (eds.) LORI 2017. LNCS, vol. 10455, pp. 49\u201364. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-55665-8_4"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1017\/S1755020309990141","volume":"2","author":"JY Halpern","year":"2009","unstructured":"Halpern, J.Y., Samet, D., Segev, E.: Defining knowledge in terms of belief: the modal logic perspective. Rev. Symbolic Logic 2, 469\u2013487 (2009)","journal-title":"Rev. Symbolic Logic"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Fong, P.W.: Relationship-based access control: Protection model and policy language. In: CODASPY 2011, pp. 191\u2013202. ACM (2011)","DOI":"10.1145\/1943513.1943539"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Bruns, G., Fong, P.W., Siahaan, I., Huth, M.: Relationship-based access control: its expression and enforcement through hybrid logic. In: CODASPY 2012, pp. 117\u2013124. ACM (2012)","DOI":"10.1145\/2133601.2133616"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jlamp.2017.02.008","volume":"90","author":"R Pardo","year":"2017","unstructured":"Pardo, R., Balliu, M., Schneider, G.: Formalising privacy policies in social networks. J. Logical Algebraic Methods Program. 90, 125\u2013157 (2017)","journal-title":"J. Logical Algebraic Methods Program."},{"issue":"9","key":"11_CR16","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MC.1986.1663327","volume":"19","author":"R Snodgrass","year":"1986","unstructured":"Snodgrass, R., Ahn, I.: Temporal databases. Computer 19(9), 35\u201342 (1986)","journal-title":"Computer"},{"key":"11_CR17","volume-title":"Reasoning About Knowledge","author":"R Fagin","year":"2003","unstructured":"Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning About Knowledge, vol. 4. MIT press Cambridge, Cambridge (2003)"},{"key":"11_CR18","doi-asserted-by":"publisher","DOI":"10.1201\/b17409","volume-title":"Complex Networks: An Algorithmic Perspective","author":"K Erciyes","year":"2014","unstructured":"Erciyes, K.: Complex Networks: An Algorithmic Perspective, 1st edn. CRC Press Inc., Boca Raton (2014)","edition":"1"},{"key":"11_CR19","unstructured":"FlockDB: A distributed fault-tolerant graph database. github.com\/twitter\/flockdb . Accessed 20 Oct 2017"},{"key":"11_CR20","unstructured":"Bronson, N., Amsden, Z., Cabrera, G., Chakka, P., Dimov, P., Ding, H., Ferris, J., Giardullo, A., Kulkarni, S., Li, H., Marchukov, M., Petrov, D., Puzar, L., Song, Y.J., Venkataramani, V.: Tao: Facebook\u2019s distributed data store for the social graph. In: ATC 2013, pp. 49\u201360 (2013)"},{"key":"11_CR21","unstructured":"Neo4j decreases development time-to-market for LinkedIn\u2019s Chitu App. neo4j.com\/case-studies\/linkedin-china\/ . Accessed 20 Oct 2017"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Pardo, R., S\u00e1nchez, C., Schneider, G.: Timed Epistemic Knowledge Bases for Social Networks (Extended Version). ArXiv e-prints (2017)","DOI":"10.1007\/978-3-319-95582-7_11"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-36039-8_9","volume-title":"Logic and Its Applications","author":"I Ben-Zvi","year":"2013","unstructured":"Ben-Zvi, I., Moses, Y.: Agent-time epistemics and coordination. In: Lodaya, K. (ed.) ICLA 2013. LNCS, vol. 7750, pp. 97\u2013108. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36039-8_9"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-319-10431-7_30","volume-title":"Software Engineering and Formal Methods","author":"R Pardo","year":"2014","unstructured":"Pardo, R., Schneider, G.: A formal privacy policy framework for social networks. In: Giannakopoulou, D., Sala\u00fcn, G. (eds.) SEFM 2014. LNCS, vol. 8702, pp. 378\u2013392. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10431-7_30"}],"container-title":["Lecture Notes in Computer Science","Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95582-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T12:29:25Z","timestamp":1571574565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95582-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319955810","9783319955827"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95582-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}