{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T15:38:02Z","timestamp":1773070682982,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,2,18]],"date-time":"2017-02-18T00:00:00Z","timestamp":1487376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s13278-017-0425-6","type":"journal-article","created":{"date-parts":[[2017,2,18]],"date-time":"2017-02-18T04:25:26Z","timestamp":1487391926000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["A trust-based collaborative access control model with policy aggregation for online social networks"],"prefix":"10.1007","volume":"7","author":[{"given":"Nemi Chandra","family":"Rathore","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,18]]},"reference":[{"key":"425_CR1","doi-asserted-by":"crossref","unstructured":"Abdessalem T, Dhia IB (2011) A reachability-based access control model for online social networks. In: Databases and social networks. DBSocial \u201911. ACM, New York, pp 31\u201336","DOI":"10.1145\/1996413.1996419"},{"key":"425_CR2","doi-asserted-by":"crossref","unstructured":"Besmer A, Heather RL (2010) Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, New York, pp 1563\u20131572","DOI":"10.1145\/1753326.1753560"},{"key":"425_CR3","doi-asserted-by":"crossref","unstructured":"Carminati B, Ferrari E (2011) Collaborative access control in on-line social networks. In: 2011 7th International conference on collaborative computing: networking, applications and worksharing (CollaborateCom), pp 231\u2013240","DOI":"10.4108\/icst.collaboratecom.2011.247109"},{"key":"425_CR4","doi-asserted-by":"crossref","unstructured":"Carminati B, Ferrari E, Perego A (2006) Rule-based access control for social networks. In: On the move to meaningful Internet systems 2006: OTM 2006 workshops. Lecture Notes in Computer Science, vol 4278. Springer, Berlin, pp 1734\u20131744","DOI":"10.1007\/11915072_80"},{"issue":"4","key":"425_CR5","doi-asserted-by":"crossref","first-page":"22","DOI":"10.4018\/jisp.2008100102","volume":"2","author":"B Carminati","year":"2008","unstructured":"Carminati B, Ferrari E, Perego A (2008) A decentralized security framework for web-based social networks. Int J Inf Secur Privacy (IJISP) 2(4):22\u201353","journal-title":"Int J Inf Secur Privacy (IJISP)"},{"issue":"1","key":"425_CR6","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/1609956.1609962","volume":"13","author":"B Carminati","year":"2009","unstructured":"Carminati B, Ferrari E, Perego A (2009) Enforcing access control in web-based social networks. ACM Trans Inf Syst Secur 13(1):6\u20131638","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"2\u20133","key":"425_CR7","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.cose.2010.08.003","volume":"30","author":"B Carminati","year":"2011","unstructured":"Carminati B, Ferrari E, Heatherly R, Kantarcioglu M, Thuraisingham B (2011) Semantic web-based social network access control. Comput Secur 30(2\u20133):108\u2013115","journal-title":"Comput Secur"},{"key":"425_CR8","doi-asserted-by":"crossref","unstructured":"Cheng Y, Park J, Sandhu R (2012) Relationship-based access control for online social networks: beyond user-to-user relationships. In: 2012 International conference on social computing (SocialCom) and privacy, security, risk and trust (PASSAT), pp 646\u2013655","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"425_CR9","doi-asserted-by":"crossref","unstructured":"Cheng Y, Park J, Sandhu R (2014) Attribute-aware relationship-based access control for online social networks. In: Data and applications security and privacy XXVIII. Lecture Notes in Computer Science, vol 8566. Springer, Berlin, pp 292\u2013306","DOI":"10.1007\/978-3-662-43936-4_19"},{"key":"425_CR10","doi-asserted-by":"crossref","unstructured":"Dhia IB (2012) Access control in social networks: a reachability-based approach. In: Proceedings of the 2012 Joint EDBT\/ICDT Workshops. ACM, New York, pp 227\u2013232","DOI":"10.1145\/2320765.2320828"},{"key":"425_CR11","unstructured":"Facebook, Facebook Data Policy (2015). www.facebook.com\/about\/privacy\/"},{"key":"425_CR12","doi-asserted-by":"crossref","unstructured":"Fong P (2011) Relationship-based access control: protection model and policy language. In: Proceedings of the first ACM conference on data and application security and privacy. ACM, New York, pp 191\u2013202","DOI":"10.1145\/1943513.1943539"},{"key":"425_CR13","unstructured":"Gates CE (2007) Access control requirements for Web 2.0 security and privacy. In: Proceedings of workshop on Web 2.0 security & privacy (W2SP)"},{"key":"425_CR14","doi-asserted-by":"crossref","unstructured":"Gebser M, Kaminski R, K\u00f6nig A, Schaub T (2011) Advances in gringo Series 3, pp 345\u2013351","DOI":"10.1007\/978-3-642-20895-9_39"},{"key":"425_CR15","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.artint.2012.04.001","volume":"187\u2013188","author":"M Gebser","year":"2012","unstructured":"Gebser M, Kaufmann B, Schaub T (2012) Conflict-driven answer set solving: from theory to practice. Artif Intell 187\u2013188:52\u201389","journal-title":"Artif Intell"},{"key":"425_CR16","doi-asserted-by":"crossref","unstructured":"Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society. WPES \u201905. ACM, New York, pp 71\u201380","DOI":"10.1145\/1102199.1102214"},{"issue":"1","key":"425_CR17","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1067699.1067705","volume":"25","author":"CM Hoadley","year":"2005","unstructured":"Hoadley CM, Kilner PG (2005) Using technology to transform communities of practice into knowledge-building communities. SIGGROUP Bull 25(1):31\u201340","journal-title":"SIGGROUP Bull"},{"key":"425_CR18","doi-asserted-by":"crossref","unstructured":"Hu H, Ahn G-J (2011) Multiparty authorization framework for data sharing in online social networks. In: Li Y (ed)Data and applications security and privacy XXV. Lecture Notes in Computer Science, vol 6818. Springer, Berlin, pp 29\u201343","DOI":"10.1007\/978-3-642-22348-8_5"},{"issue":"7","key":"425_CR19","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1109\/TKDE.2012.97","volume":"25","author":"H Hu","year":"2013","unstructured":"Hu H, Ahn GJ, Jorgensen J (2013) Multiparty access control for online social networks: model and mechanisms. IEEE Trans Knowl Data Eng 25(7):1614\u20131627","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"425_CR20","unstructured":"Kruk SR, Grzonkowski S, Gzella A, Woroniecki T, Choi H-C (2006) The Semantic Web\u2014Aswc 2006: First Asian Semantic Web Conference, Beijing, China, 3\u20137 September 2006. In: Mizoguchi R, Shi Z, Giunchiglia F (eds) Proceedings, D-FOAF: distributed identity management with access rights delegation. Springer, Berlin, pp 140\u2013154"},{"key":"425_CR21","unstructured":"Lifschitz V (2008) What is answer set programming?. In: Proceedings of the twenty-third AAAI conference on artificial intelligence, AAAI 2008, Chicago, Illinois, USA, 13\u201317 July 2008, pp 1594\u20131597"},{"issue":"1","key":"425_CR22","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1145\/2556612","volume":"8","author":"J Mcauley","year":"2014","unstructured":"Mcauley J, Leskovec J (2014) Discovering social circles in ego networks. ACM Trans Knowl Discov Data 8(1):4\u20131428","journal-title":"ACM Trans Knowl Discov Data"},{"key":"425_CR23","first-page":"60","volume":"2","author":"S Milgram","year":"1967","unstructured":"Milgram S (1967) The small world problem. Psychol Today 2:60\u201367","journal-title":"Psychol Today"},{"key":"425_CR24","unstructured":"Morrison K (2014) The growth of social media: from passing trend to international obsession. http:\/\/www.adweek.com\/socialtimes\/the-growth-of-social-media-from-trend-to-obsession-infographic\/142323"},{"key":"425_CR25","unstructured":"Pang J, Zhang Y (2013) A new access control scheme for Facebook-style social networks. CoRR abs\/1304.2504"},{"key":"425_CR26","unstructured":"Pew Research Center (2010) Pew Research Center: global publics embrace social networking. Pew Research Center, 2010. http:\/\/pewglobal.org\/2010\/12\/15\/global-publics-embrace-social-networking"},{"key":"425_CR27","doi-asserted-by":"crossref","unstructured":"Rathore NC, Tripathy S (2016) Collaborative access control mechanism for online social networks. In: Advanced computing\u20146th IEEE international conference, IACC 2016, Bhimavaram, A.P. India, 27\u201328 February 2016, Proceedings, pp 19\u201324","DOI":"10.1007\/978-3-319-28034-9_19"},{"key":"425_CR28","doi-asserted-by":"crossref","unstructured":"Rathore NC, Tripathy S, Chandra J (2015) Predicting user visibility in online social networks using local connectivity properties. In: Distributed computing and Internet technology\u201411th international conference, ICDCIT 2015, Bhubaneswar, India, 5\u20138 February 2015. Proceedings, 2015, pp 419\u2013430","DOI":"10.1007\/978-3-319-14977-6_46"},{"key":"425_CR29","doi-asserted-by":"crossref","unstructured":"Rathore NC, Shaw P, Tripathy S (2016) Collaborative access control mechanism for online social networks. In: Distributed computing and Internet technology\u201412th international conference, ICDCIT 2016, Bhubaneswar, India, 15\u201318 January 2016, Proceedings, pp 142\u2013147","DOI":"10.1007\/978-3-319-28034-9_19"},{"key":"425_CR30","unstructured":"SBRI (2015a) Statistics Brain Research Institute: Facebook Statistics, 2015. http:\/\/www.statisticbrain.com\/facebook-statistics"},{"key":"425_CR31","unstructured":"SBRI (2015b) Statistics Brain Research Institute: Social Networking Statistics, 2015. http:\/\/www.statisticbrain.com\/social-networking-statistics\/"},{"key":"425_CR32","doi-asserted-by":"crossref","unstructured":"Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC (2010) Learning based access control in online social networks. In: Proceedings of the 19th international conference on World Wide Web. ACM, New York, pp 1179\u20131180","DOI":"10.1145\/1772690.1772863"},{"key":"425_CR33","doi-asserted-by":"crossref","unstructured":"Squicciarini AC, Shehab M, Paci F (2009) Collective privacy management in social networks. In: Proceedings of the 18th international conference on World Wide Web. WWW \u201909. ACM, New York, pp 521\u2013530","DOI":"10.1145\/1526709.1526780"},{"issue":"1","key":"425_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13278-014-0221-5","volume":"4","author":"J White","year":"2014","unstructured":"White J, Park J, Kamhoua C (2014) Kwiat K (2014) Social network attack simulation with honeytokens. Soc Netw Anal Min 4(1):1\u20134","journal-title":"Soc Netw Anal Min"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-017-0425-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-017-0425-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-017-0425-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T21:11:59Z","timestamp":1568841119000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-017-0425-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,18]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["425"],"URL":"https:\/\/doi.org\/10.1007\/s13278-017-0425-6","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,18]]},"article-number":"7"}}