{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T22:20:59Z","timestamp":1772058059845,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642279003","type":"print"},{"value":"9783642279010","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_1","type":"book-chapter","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T02:01:25Z","timestamp":1326765685000},"page":"1-13","source":"Crossref","is-referenced-by-count":4,"title":["Preserving Privacy in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Fatemeh","family":"Raji","sequence":"first","affiliation":[]},{"given":"Ali","family":"Miri","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Davarpanah Jazi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1177\/001872675400700102","volume":"7","author":"J. Barnes","year":"1954","unstructured":"Barnes, J.: Class and Committees in a Norwegian Island Parish. Human Relations\u00a07, 39\u201358 (1954)","journal-title":"Human Relations"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Boyd, D., Ellison, N.: Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication\u00a013(1) (2007)","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks (the Facebook case). In: ACM Workshop on Privacy in the Electronic Society (WPES 2005), pp. 71\u201380 (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"1_CR4","unstructured":"Chen, S., Williams, M.A.: Privacy in social networks: A comparative study. In: Pacific Asia Conference on Information Systems, pp. 33\u201342 (2009)"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.2307\/1229286","volume":"50","author":"J. Kang","year":"1998","unstructured":"Kang, J.: Information privacy in cyberspace transactions. Stanford Law Review\u00a050, 1193\u20131294 (1998)","journal-title":"Stanford Law Review"},{"key":"1_CR6","unstructured":"http:\/\/en.wikipedia.org\/wiki\/privacy\n                    \n                    \n                   (accessed April 2011)"},{"key":"1_CR7","unstructured":"http:\/\/en.wikipedia.org\/wiki\/information\/privacy\n                    \n                    \n                   (accessed July 2011)"},{"key":"1_CR8","unstructured":"Jones, H., Soltren, J.H.: Facebook: Threats to privacy. Technical report, Massachusetts Institute of Technology (December 2005)"},{"key":"1_CR9","unstructured":"Facebook statement of rights and responsibilities, \n                    \n                      http:\/\/www.facebook.com\/terms.php\n                    \n                    \n                   (accessed June 2011)"},{"key":"1_CR10","unstructured":"Goettke, R., Christiana, J.: Privacy and online social networking websites. Technical report, Harvard University (2007)"},{"key":"1_CR11","unstructured":"http:\/\/technology.timesonline.co.uk\/tol\/news\/tech_and_web\/article6644199.ece\n                    \n                    \n                   (accessed July 2009)"},{"key":"1_CR12","unstructured":"http:\/\/en.wikipedia.org\/wiki\/information\/privacy_law\n                    \n                    \n                   (accessed April 2011)"},{"key":"1_CR13","unstructured":"http:\/\/www.priv.gc.ca\/media\/nr-c\/2009\/nr-c_090716_e.cfm\n                    \n                    \n                   (accessed May 2011)"},{"key":"1_CR14","unstructured":"http:\/\/www.guardian.co.uk\/media\/2011\/mar\/16\/eu-social-network-sites-privacy\n                    \n                    \n                   (accessed April 2011)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Luo, B., Lee, D.: On protecting private information in social networks: A proposal. In: The 25th International Conference on Data Engineering (ICDE 2009), pp. 1603\u20131606 (2009)","DOI":"10.1109\/ICDE.2009.158"},{"key":"1_CR16","unstructured":"Mohtasebi, A., Borazjani, P.: Privacy concerns in social networks and online communities. In: The VALA 2010 15th Biennial Conference and Exhibition, Melbourne, Australia (2010)"},{"key":"1_CR17","unstructured":"http:\/\/www.nytimes.com\/2010\/07\/25\/magazine\/25privacy-t2.html\n                    \n                    \n                   (accessed July 2011)"},{"issue":"4","key":"1_CR18","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MIC.2011.50","volume":"15","author":"H. Gao","year":"2011","unstructured":"Gao, H., Hu, J., Huang, T., Wang, J., Chen, Y.: Security issues in online social networks. IEEE Internet Computing\u00a015(4), 56\u201363 (2011)","journal-title":"IEEE Internet Computing"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Lucas, M.M., Borisov, N.: FlyByNight: mitigating the privacy risks of social networking. In: The 7th ACM Workshop on Privacy in the Electronic Society (WPES 2009), Alexandria, Virginia, USA, pp. 1\u20138 (October 2008)","DOI":"10.1145\/1456403.1456405"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Luo, W., Xie, Q., Hengartner, U.: Facecloak: An architecture for user privacy on social networking sites. In: 12th IEEE International Conference on Computational Science and Engineering (CSE 2009), Vancouver, BC, Canada, pp. 26\u201333 (August 2009)","DOI":"10.1109\/CSE.2009.387"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. In: The First Workshop on Online Social Networks (WOSN 2008), Seattle, WA, USA, pp. 49\u201354 (2008)","DOI":"10.1145\/1397735.1397747"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: An online social network with user defined privacy, and scholarship. In: The ACM SIGCOMM 2009 Conference on Data Communication (SIGCOMM 2009), New York, NY, USA, pp. 135\u2013146 (2009)","DOI":"10.1145\/1592568.1592585"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Tootoonchian, A., Gollu, K.K., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: Social access control for web 2.0. In: The First ACM SIGCOMM Workshop on Online Social Networks (WOSN 2008), Seattle, WA, USA (August 2008)","DOI":"10.1145\/1397735.1397746"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: Better privacy for social networks. In: The 5th ACM International Conference on Emerging Networking EXperiments and Technologies (CoNEXT), Rome, Italy, pp. 169\u2013180 (2009)","DOI":"10.1145\/1658939.1658959"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Sun, J., Zhu, X., Fang, Y.: A privacy-preserving scheme for online social networks with efficient revocation. In: The 2010 IEEE Conference on Computer Communications (INFOCOM 2010), San Diego, CA, USA, pp. 2516\u20132524 (July 2010)","DOI":"10.1109\/INFCOM.2010.5462080"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Hu, Z., Wang, H., Hu, H., Ahn, G.J.: A collaborative framework for privacy protection in online social networks. In: The 6th International Conference on Collaborative Computing (CollaborateCom 2010), Chicago, Illinois, USA (October 2010)","DOI":"10.4108\/icst.collaboratecom.2010.52"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Jahid, S., Mittal, P., Borisov, N.: EASiER: Encryption-based access control in social networks with efficient revocation. In: 6th ACM Symposium on Information Computer and Communications Security (ASIACCS), Hong Kong (March 2011)","DOI":"10.1145\/1966913.1966970"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Raji, F., Miri, A., Jazi, M.D., Malek, B.: Online social network with flexible and dynamic privacy policies. In: 15th CSI International Symposium on Computer Science and Software Engineering (CSSE 2011), Tehran, Iran (June 2011)","DOI":"10.1109\/CSICSSE.2011.5963982"},{"key":"1_CR29","volume-title":"Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems","author":"B. Carminati","year":"2010","unstructured":"Carminati, B., Ferrari, E.: Privacy-aware access control in social networks: Issues and solutions. In: Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T00:02:52Z","timestamp":1556150572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}