{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:34:24Z","timestamp":1730270064921,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/iri.2012.6303043","type":"proceedings-article","created":{"date-parts":[[2012,9,19]],"date-time":"2012-09-19T16:50:59Z","timestamp":1348073459000},"page":"449-456","source":"Crossref","is-referenced-by-count":2,"title":["Performance analysis of relationship-based access control in OSNs"],"prefix":"10.1109","author":[{"given":"Barbara","family":"Carminati","sequence":"first","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Jacopo","family":"Girardi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.46"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2011.15"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397746"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.14"},{"key":"13","first-page":"60","article-title":"The Small World Problem","volume":"2","author":"milgram","year":"1967","journal-title":"Psychology Today"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87781-3_6"},{"journal-title":"Computing and Applying Trust in Web-Based Social Networks","year":"2005","author":"golbeck","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1002\/net.20417"},{"journal-title":"Four Degrees of Separation","year":"2011","author":"backstrom","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11207-2_9"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1321211.1321251"},{"key":"10","first-page":"303","article-title":"A privacy preservation model for facebook-style social network systems","author":"fong","year":"2009","journal-title":"Proceedings of the 14th European Conference on Research in Computer Security ESORICS'09"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609962"},{"key":"6","article-title":"Trust&share: Trusted information sharing in online social networks, demo paper","author":"carminati","year":"2012","journal-title":"IEEE ICDE 2012 Conference"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592585"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.43"}],"event":{"name":"2012 IEEE 13th International Conference on Information Reuse & Integration (IRI)","start":{"date-parts":[[2012,8,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2012,8,10]]}},"container-title":["2012 IEEE 13th International Conference on Information Reuse &amp; Integration (IRI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294629\/6302564\/06303043.pdf?arnumber=6303043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:10:31Z","timestamp":1490127031000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6303043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iri.2012.6303043","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}