{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:50:01Z","timestamp":1725893401463},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642224430"},{"type":"electronic","value":"9783642224447"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22444-7_9","type":"book-chapter","created":{"date-parts":[[2011,10,5]],"date-time":"2011-10-05T21:29:33Z","timestamp":1317850173000},"page":"132-146","source":"Crossref","is-referenced-by-count":1,"title":["A Trust-Augmented Voting Scheme for Collaborative Privacy Management"],"prefix":"10.1007","author":[{"given":"Yanjie","family":"Sun","sequence":"first","affiliation":[]},{"given":"Chenyi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Baptiste","family":"Alcade","sequence":"additional","affiliation":[]},{"given":"Sjouke","family":"Mauw","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Facebook:, http:\/\/www.facebook.com"},{"key":"9_CR2","unstructured":"MySpace, http:\/\/www.myspace.com"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1102199.1102214","volume-title":"Proc. 2005 ACM Workshop on Privacy in the Electronic Society","author":"R. Gross","year":"2005","unstructured":"Gross, R., Acquisti, A., John Heinz III, H.: Information revelation and privacy in online social networks. In: Proc. 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380. ACM, New York (2005)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Ellison, N.B., Steinfield, C., Lampe, C.: Benefits of Facebook Friends: Social capital and college students\u2019 use of online social network sites. Journal of Computer Mediated Communication-Electronic\u00a012(4) (2007)","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"issue":"3","key":"9_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2007.75","volume":"5","author":"D. Rosenblum","year":"2007","unstructured":"Rosenblum, D.: What anyone can know: The privacy risks of social networking sites. IEEE Security and Privacy\u00a05(3), 40\u201349 (2007)","journal-title":"IEEE Security and Privacy"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-540-70567-3_7","volume-title":"Data and Applications Security XXII","author":"B. Carminati","year":"2008","unstructured":"Carminati, B., Ferrari, E.: Privacy-aware collaborative access control in web-based social networks. In: Atluri, V. (ed.) DAS 2008. LNCS, vol.\u00a05094, pp. 81\u201396. Springer, Heidelberg (2008)"},{"key":"9_CR7","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1145\/1367497.1367526","volume-title":"Proc. 17th Conference on World Wide Web","author":"J. Grossklags","year":"2008","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: a game-theoretic analysis of information security games. In: Proc. 17th Conference on World Wide Web, pp. 209\u2013218. ACM, New York (2008)"},{"key":"9_CR8","series-title":"LNCS","first-page":"179","volume-title":"STM 2010","author":"N. Sarrouh","year":"2011","unstructured":"Sarrouh, N., Eilers, F., Nestmann, U., Schieferdecker, I.: Defamation-free networks through user-centered data control. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol.\u00a06710, pp. 179\u2013193. Springer, Heidelberg (2011)"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1145\/1526709.1526780","volume-title":"Proc. 18th International Conference on World Wide Web","author":"A.C. Squicciarini","year":"2009","unstructured":"Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proc. 18th International Conference on World Wide Web, pp. 521\u2013530. ACM, New York (2009)"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BF01726210","volume":"11","author":"E.H. Clarke","year":"1971","unstructured":"Clarke, E.H.: Multipart pricing of public goods. Public Choice\u00a011, 17\u201333 (1971)","journal-title":"Public Choice"},{"key":"9_CR11","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"D. Good","year":"1988","unstructured":"Good, D.: Individuals, interpersonal relations, and trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, Department of Sociology, University of Oxford (1988)"},{"key":"9_CR12","volume-title":"Trust and Power","author":"N. Luhmann","year":"1979","unstructured":"Luhmann, N.: Trust and Power. John Wiley and Sons Inc., Chichester (1979)"},{"volume-title":"Trust: Making and breaking cooperative relations","year":"1988","key":"9_CR13","unstructured":"Gambetta, D. (ed.): Trust: Making and breaking cooperative relations. Department of Sociology, University of Oxford, University of Oxford (1988)"},{"issue":"1","key":"9_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3233\/JCS-2008-16102","volume":"16","author":"K. Krukow","year":"2008","unstructured":"Krukow, K., Nielsen, M., Sassone, V.: A logical framework for history-based access control and reputation systems. Journal of Computer Security\u00a016(1), 63\u2013101 (2008)","journal-title":"Journal of Computer Security"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-642-12459-4_4","volume-title":"Formal Aspects in Security and Trust","author":"F. Eilers","year":"2010","unstructured":"Eilers, F., Nestmann, U.: Deriving trust from experience. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol.\u00a05983, pp. 36\u201350. Springer, Heidelberg (2010)"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-12459-4_3","volume-title":"Formal Aspects in Security and Trust","author":"E. ElSalamouny","year":"2010","unstructured":"ElSalamouny, E., Sassone, V., Nielsen, M.: HMM-based trust model. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol.\u00a05983, pp. 21\u201335. Springer, Heidelberg (2010)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-44875-6_17","volume-title":"Trust Management","author":"E. Gray","year":"2003","unstructured":"Gray, E., Seigneur, J.-M., Chen, Y., Jensen, C.: Trust propagation in small worlds. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol.\u00a02692, pp. 239\u2013254. Springer, Heidelberg (2003)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/11755593_14","volume-title":"Trust Management","author":"A. J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol.\u00a03986, pp. 179\u2013192. Springer, Heidelberg (2006)"},{"key":"9_CR19","series-title":"IFIP","first-page":"17","volume-title":"Proc. Joint iTrust and PST Conferences on Privacy, Trust Management and Security","author":"C. Dong","year":"2007","unstructured":"Dong, C., Russello, G., Dulay, N.: Trust transfer in distributed systems. In: Proc. Joint iTrust and PST Conferences on Privacy, Trust Management and Security. IFIP, vol.\u00a0238, pp. 17\u201330. Springer, Heidelberg (2007)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/978-3-642-12459-4_2","volume-title":"Formal Aspects in Security and Trust","author":"B. Alcalde","year":"2010","unstructured":"Alcalde, B., Mauw, S.: An algebra for trust dilution and trust fusion. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol.\u00a05983, pp. 4\u201320. Springer, Heidelberg (2010)"},{"issue":"4","key":"9_CR21","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.2307\/1961757","volume":"82","author":"H.P. Young","year":"1988","unstructured":"Young, H.P.: Condorcet\u2019s theory of voting. The American Political Science Review\u00a082(4), 1231\u20131244 (1988)","journal-title":"The American Political Science Review"},{"key":"9_CR22","volume-title":"Introduction to Data Mining","author":"P.B. Tan","year":"2005","unstructured":"Tan, P.B., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addison-Wesley, Reading (2005)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Preibusch, S.: The privacy jungle: On the market for privacy in social networks. In: Proc. 8th Workshop on the Economics of Information Security (2009)","DOI":"10.1007\/978-1-4419-6967-5_8"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22444-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,8]],"date-time":"2021-12-08T23:15:35Z","timestamp":1639005335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22444-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642224430","9783642224447"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22444-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}