{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:12:39Z","timestamp":1759032759730},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T00:00:00Z","timestamp":1489968000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Ministry of Science, ICT and Future Planning (MSIP), Korea, under the Information Technology Research Center (ITRC) support program","award":["IITP-2016-H8501-16-1014"],"award-info":[{"award-number":["IITP-2016-H8501-16-1014"]}]},{"name":"the Dongguk University Research Fund of 2016"},{"name":"National Research Foundation of Korea\u2019s (NRF) Basic Science Research Program","award":["NRF-2016R1D1A1A09919318"],"award-info":[{"award-number":["NRF-2016R1D1A1A09919318"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11227-017-2018-6","type":"journal-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T16:48:31Z","timestamp":1490028511000},"page":"3307-3325","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Novel assessment method for accessing private data in social network security services"],"prefix":"10.1007","volume":"73","author":[{"given":"Jong Hyuk","family":"Park","sequence":"first","affiliation":[]},{"given":"Yunsick","family":"Sung","sequence":"additional","affiliation":[]},{"given":"Pradip Kumar","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Young-Sik","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Gangman","family":"Yi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,20]]},"reference":[{"issue":"3","key":"2018_CR1","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MSP.2013.23","volume":"11","author":"J Anderson","year":"2013","unstructured":"Anderson J, Stajano F (2013) Must social networking conflict with privacy? IEEE Secur Priv 11(3):51\u201360","journal-title":"IEEE Secur Priv"},{"issue":"3","key":"2018_CR2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MSP.2013.66","volume":"11","author":"B Krishnamurthy","year":"2013","unstructured":"Krishnamurthy B (2013) Privacy and online social networks: can colorless green ideas sleep furiously? IEEE Secur Priv 11(3):14\u201320","journal-title":"IEEE Secur Priv"},{"issue":"3","key":"2018_CR3","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MSP.2013.47","volume":"11","author":"S Gurses","year":"2013","unstructured":"Gurses S, Diaz C (2013) Two tales of privacy in online social networks. IEEE Secur Priv 11(3):29\u201337","journal-title":"IEEE Secur Priv"},{"issue":"3","key":"2018_CR4","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MIC.2011.24","volume":"15","author":"M Huber","year":"2011","unstructured":"Huber M, Mulazzani M, Kitzler G, Goluch S, Weippl E (2011) Friend-in-the-middle attacks: exploiting social networking sites for spam. IEEE Internet Comput 15(3):28\u201334","journal-title":"IEEE Internet Comput"},{"issue":"3","key":"2018_CR5","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MIC.2011.25","volume":"15","author":"D Irani","year":"2011","unstructured":"Irani D, Webb S, Pu C, Li K (2011) Modeling unintended personal-information leakage from multiple online social networks. IEEE Internet Comput 15(3):13\u201319","journal-title":"IEEE Internet Comput"},{"issue":"3","key":"2018_CR6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MIC.2011.26","volume":"15","author":"N Li","year":"2011","unstructured":"Li N, Zhang N, Das SK (2011) Preserving relation privacy in online social network data. IEEE Internet Comput 15(3):35\u201342","journal-title":"IEEE Internet Comput"},{"key":"2018_CR7","unstructured":"Zilpelwar RA, Bedi RK, Wadhai V (2012) An overview of privacy and security in sns. Int J P2P Netw Trends Technol 2(1):23\u201326"},{"key":"2018_CR8","unstructured":"Rainie L, Kiesler S, Kang R, Madden M, Duggan M, Brown S, Dabbish L (2013) Anonymity, privacy, and security online. Pew ResearchCenter. \n                        http:\/\/pewinternet.org\/Reports\/2013\/Anonymity-online.aspx"},{"issue":"1","key":"2018_CR9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MWC.2014.6757895","volume":"21","author":"X Liang","year":"2014","unstructured":"Liang X, Zhang K, Shen X, Lin X (2014) Security and privacy in mobile social networks: challenges and solutions. IEEE Wirel Commun 21(1):33\u201341","journal-title":"IEEE Wirel Commun"},{"key":"2018_CR10","doi-asserted-by":"crossref","unstructured":"Pranevicius H, Sutiene K (2007) Scenario tree generation by clustering the simulated data paths. In: Proceeding of the 21st European Conference on Modeling and Simulation, Prague, Czech Republic, 4\u20136 June","DOI":"10.7148\/2007-0203"},{"key":"2018_CR11","unstructured":"Grois E, Hsu WH, Voloshin M, Wilkins DC Bayesian network models for generation of crisis management training scenarios. In: Proceedings of the Fifteenth National\/Tenth Conference on Artificial Intelligence\/Innovative Applications of Artificial Intelligence, pp 1113\u20131120"},{"key":"2018_CR12","unstructured":"Kuchler C, Vigerske S (2007) Decomposition of multistage stochastic programs with recombining scenario trees. Technical Report, Humboldt University"},{"issue":"2","key":"2018_CR13","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1287\/mnsc.47.2.295.9834","volume":"47","author":"K H\u00f8yland","year":"2001","unstructured":"H\u00f8yland K, Kaut M, Wallace SW (2001) Generating scenario trees for multistage decision problems. Manag Sci 47(2):295\u2013307","journal-title":"Manag Sci"},{"key":"2018_CR14","doi-asserted-by":"crossref","unstructured":"Sung Y, Helal A, Lee JW, Cho K (2013) Bayesian-based scenario generation method for human activities. In: 2013 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS), May 19\u201320 2013, Montreal, Quebec, Canada, pp 147\u2013157","DOI":"10.1145\/2486092.2486111"},{"key":"2018_CR15","first-page":"755","volume-title":"Computer and information security handbook","author":"F-H Simone","year":"2013","unstructured":"Simone F-H, Stefan B (2013) Chapter 43\u2014privacy-enhancing technologies. In: Vacca JR (ed) Computer and information security handbook, 2nd edn. Morgan Kaufmann, Boston, pp 755\u2013772","edition":"2"},{"key":"2018_CR16","unstructured":"Ian G (2007) Privacy enhancing technologies for the internet III: ten years later. In: Digital privacy: theory, technologies and practices. Auerbach Publications, New York, pp 3\u201318"},{"issue":"2\u20133","key":"2018_CR17","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1111\/j.1748-720X.1997.tb01885.x","volume":"25","author":"L Sweeney","year":"1997","unstructured":"Sweeney L (1997) Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 25(2\u20133):98\u2013110","journal-title":"J Law Med Ethics"},{"key":"2018_CR18","doi-asserted-by":"publisher","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(1):24. doi:\n                        10.1145\/1217299.1217300","DOI":"10.1145\/1217299.1217300"},{"key":"2018_CR19","doi-asserted-by":"publisher","unstructured":"Polakis I, Maggi F, Zanero S, Keromytis AD (2014) Security and privacy measurements in social networks: experiences and lessons learned. In: Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS, vol 14. doi:\n                        10.1109\/BADGERS.2014.9","DOI":"10.1109\/BADGERS.2014.9"},{"key":"2018_CR20","doi-asserted-by":"crossref","unstructured":"Joshi P, Kuo CJ (2011) Security and privacy in online social networks: a survey. In: Multimedia and Expo (ICME), IEEE International Conference on 2011. IEEE, July 2011, pp 1\u20136","DOI":"10.1109\/ICME.2011.6012166"},{"issue":"4","key":"2018_CR21","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1016\/j.dss.2013.01.004","volume":"55","author":"R Chakraborty","year":"2013","unstructured":"Chakraborty R, Vishik C, Rao HR (2013) Privacy preserving actions of older adults on social media: exploring the behavior of opting out of information sharing. Decision support systems. Decis Support Syst 55(4):948\u2013956","journal-title":"Decis Support Syst"},{"key":"2018_CR22","unstructured":"Pimenta PC, De Freitas CM (2010) Security and privacy analysis in social network services. In: Information Systems and Technologies (CISTI), 5th Iberian Conference on 2010. IEEE, June 2010, pp 1\u20136"},{"issue":"3","key":"2018_CR23","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MCOM.2014.6766086","volume":"52","author":"K Zhang","year":"2014","unstructured":"Zhang K, Liang X, Shen X, Lu R (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. Commun Mag IEEE 52(3):58\u201365","journal-title":"Commun Mag IEEE"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-017-2018-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-017-2018-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-017-2018-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T07:40:38Z","timestamp":1499672438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-017-2018-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,20]]},"references-count":23,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["2018"],"URL":"https:\/\/doi.org\/10.1007\/s11227-017-2018-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,20]]}}}