{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:47:58Z","timestamp":1725706078561},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346002"},{"type":"electronic","value":"9783642346019"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34601-9_33","type":"book-chapter","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T21:04:18Z","timestamp":1353013458000},"page":"430-444","source":"Crossref","is-referenced-by-count":0,"title":["Private Friends on a Social Networking Site Operated by an Overly Curious SNP"],"prefix":"10.1007","author":[{"given":"Roman","family":"Schlegel","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: WPES 2005, pp. 71\u201380. ACM (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"33_CR2","unstructured":"Facebook Statistics (November 2011), \n                    \n                      http:\/\/www.facebook.com\/press\/info.php?statistics"},{"issue":"1","key":"33_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1177\/1354856507084416","volume":"14","author":"D. Boyd","year":"2008","unstructured":"Boyd, D.: Facebook\u2019s privacy trainwreck. Convergence: The International Journal of Research into New Media Technologies\u00a014(1), 13\u201320 (2008)","journal-title":"Convergence: The International Journal of Research into New Media Technologies"},{"key":"33_CR4","unstructured":"Symantec: Facebook Applications Accidentally Leaking Access to Third Parties (2011), \n                    \n                      http:\/\/www.symantec.com\/connect\/blogs\/facebook-applications-accidentally-leaking-access-third-parties"},{"key":"33_CR5","unstructured":"MediaPost: Facebook\u2019s Data-Leak Woes Worsening (2010), \n                    \n                      http:\/\/www.mediapost.com\/publications\/article\/138132\/facebooks-data-leak-woes-worsening.html"},{"key":"33_CR6","unstructured":"Digital Trends: Facebook closes loophole that exposes private photos (2011), \n                    \n                      http:\/\/www.digitaltrends.com\/social-media\/facebook-closes-loophole-that-exposes-private-photos\/"},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A. Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 36\u201358. Springer, Heidelberg (2006)"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-76900-2_12","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"C. Delerabl\u00e9e","year":"2007","unstructured":"Delerabl\u00e9e, C.: Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 200\u2013215. Springer, Heidelberg (2007)"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Dhawan, M., Shan, C.-C., Ganapathy, V.: The case for javascript transactions: position paper. In: Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS 2010, pp. 6:1\u20136:7. ACM, New York (2010)","DOI":"10.1145\/1814217.1814223"},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1145\/1190216.1190252","volume-title":"POPL 2007","author":"D. Yu","year":"2007","unstructured":"Yu, D., Chander, A., Islam, N., Serikov, I.: Javascript instrumentation for browser security. In: POPL 2007, pp. 237\u2013249. ACM, New York (2007)"},{"key":"33_CR11","unstructured":"Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: Privacy preserving targeted advertising. In: NDSS (2010)"},{"key":"33_CR12","unstructured":"Guha, S., Cheng, B., Francis, P.: Privad: Practical Privacy in Online Advertising. In: Proceedings of the 8th Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA (March 2011)"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Lucas, M.M., Borisov, N.: flyByNight: mitigating the privacy risks of social networking. In: SOUPS (2009)","DOI":"10.1145\/1572532.1572577"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Guha, S., Tang, K., Francis, P.: Noyb: privacy in online social networks. In: Proc. of the First Workshop on Online Social Networks, WOSN 2008, pp. 49\u201354. ACM (2008)","DOI":"10.1145\/1397735.1397747"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Luo, W., Xie, Q., Hengartner: Facecloak: An architecture for user privacy on social networking sites. In: Computational Science and Engineering, CSE 2009, vol.\u00a03, pp. 26\u201333 (2009)","DOI":"10.1109\/CSE.2009.387"},{"key":"33_CR16","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1592568.1592585","volume-title":"Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, SIGCOMM 2009","author":"R. Baden","year":"2009","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, SIGCOMM 2009, pp. 135\u2013146. ACM, New York (2009)"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Jahid, S., Mittal, P., Borisov, N.: EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation. In: ASIACCS, Hong Kong (March 2011)","DOI":"10.1145\/1966913.1966970"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34601-9_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T09:00:29Z","timestamp":1620118829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34601-9_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346002","9783642346019"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34601-9_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}