{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:48:39Z","timestamp":1755838119362,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,26]],"date-time":"2008-10-26T00:00:00Z","timestamp":1224979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,26]]},"DOI":"10.1145\/1458082.1458123","type":"proceedings-article","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T12:59:40Z","timestamp":1226408380000},"page":"289-298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["Link privacy in social networks"],"prefix":"10.1145","author":[{"given":"Aleksandra","family":"Korolova","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Rajeev","family":"Motwani","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Shubha U.","family":"Nabar","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Ying","family":"Xu","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.facebook.com\/press\/info.php?statistics","author":"Release Facebook Press","year":"2008","unstructured":"Facebook Press Release . http:\/\/www.facebook.com\/press\/info.php?statistics , 2008 . Facebook Press Release. http:\/\/www.facebook.com\/press\/info.php?statistics, 2008."},{"volume-title":"http:\/\/www.techcrunch.com\/2008\/05\/17\/facebooks-glass-jaw\/","year":"2008","key":"e_1_3_2_1_2_1","unstructured":"TechCrunch. http:\/\/www.techcrunch.com\/2008\/05\/17\/facebooks-glass-jaw\/ , 2008 . TechCrunch. http:\/\/www.techcrunch.com\/2008\/05\/17\/facebooks-glass-jaw\/, 2008."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/www.technologyreview.com\/Wire\/20825\/","author":"Review Technology","year":"2008","unstructured":"Technology Review . http:\/\/www.technologyreview.com\/Wire\/20825\/ , 2008 . Technology Review. http:\/\/www.technologyreview.com\/Wire\/20825\/, 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.046135"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE Symposium on Foundations of Computer Science","author":"Aiello W.","year":"2000","unstructured":"W. Aiello , F. Chung , and L. Liu . A random graph model for power law graphs . IEEE Symposium on Foundations of Computer Science , 2000 . W. Aiello, F. Chung, and L. Liu. A random graph model for power law graphs. IEEE Symposium on Foundations of Computer Science, 2000."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"e_1_3_2_1_7_1","volume-title":"Emergence of scaling in random networks. Science, (509)","author":"Barabasi A.","year":"1999","unstructured":"A. Barabasi and R. Albert . Emergence of scaling in random networks. Science, (509) , 1999 . A. Barabasi and R. Albert. Emergence of scaling in random networks. Science, (509), 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcta.1997.2798"},{"key":"e_1_3_2_1_9_1","volume-title":"ACM-SIAM Sypmosium on Discrete Algorithms","author":"Bollobas B.","year":"2003","unstructured":"B. Bollobas , C. Borgs , T. Chayes , and O. Riordan . Directed scale-free graphs . ACM-SIAM Sypmosium on Discrete Algorithms , 2003 . B. Bollobas, C. Borgs, T. Chayes, and O. Riordan. Directed scale-free graphs. ACM-SIAM Sypmosium on Discrete Algorithms, 2003."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.10084"},{"key":"e_1_3_2_1_11_1","first-page":"69","article-title":"Structure of a large social network","author":"Csanyi G.","year":"2004","unstructured":"G. Csanyi and B. Szendroi . Structure of a large social network . Physical Review E 69 , 2004 . G. Csanyi and B. Szendroi. Structure of a large social network. Physical Review E 69, 2004.","journal-title":"Physical Review E"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/885651.781046"},{"key":"e_1_3_2_1_13_1","volume-title":"Anonymizing social networks","author":"Hay M.","year":"2007","unstructured":"M. Hay , G. Miklau , D. Jensen , P. Weis , and S. Srivastava . Anonymizing social networks . University of Massachusetts , Amherst Technical Report, 2007 . M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. University of Massachusetts, Amherst Technical Report, 2007."},{"key":"e_1_3_2_1_14_1","unstructured":"M. Kelly. Facebook Security: Fighting the good fight. Facebook blog http:\/\/blog.new.facebook.com\/blog.php?post=25844207130 August 7 2008.  M. Kelly. Facebook Security: Fighting the good fight. Facebook blog http:\/\/blog.new.facebook.com\/blog.php?post=25844207130 August 7 2008."},{"key":"e_1_3_2_1_15_1","volume-title":"Navigation in a small world. Nature, (845)","author":"Kleinberg J.","year":"2000","unstructured":"J. Kleinberg . Navigation in a small world. Nature, (845) , 2000 . J. Kleinberg. Navigation in a small world. Nature, (845), 2000."},{"key":"e_1_3_2_1_16_1","volume-title":"January 20","author":"Krebs B.","year":"2006","unstructured":"B. Krebs . Account Hijackings Force LiveJournal Changes. Washington Post , January 20 , 2006 . B. Krebs. Account Hijackings Force LiveJournal Changes. Washington Post, January 20, 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/795666.796570"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3121445.3121464"},{"key":"e_1_3_2_1_19_1","volume-title":"H. Kargupta, J. Han","author":"Liu K.","year":"2008","unstructured":"K. Liu , K. Das , T. Grandison , and H. Kargupta . Privacy-preserving data analysis on graphs and social networks . In H. Kargupta, J. Han , P. Yu, R. Motwani, and V. Kumar, editors, Next Generation Data Mining. CRC Press , 2008 . K. Liu, K. Das, T. Grandison, and H. Kargupta. Privacy-preserving data analysis on graphs and social networks. In H. Kargupta, J. Han, P. Yu, R. Motwani, and V. Kumar, editors, Next Generation Data Mining. CRC Press, 2008."},{"key":"e_1_3_2_1_20_1","unstructured":"M. Mihail A. Saberi and P. Tetali. Random walks with lookahead in power law random graphs. Internet Mathematics.  M. Mihail A. Saberi and P. Tetali. Random walks with lookahead in power law random graphs. Internet Mathematics."},{"key":"e_1_3_2_1_21_1","volume-title":"Cambridge University Press New York","author":"Motwani R.","year":"1995","unstructured":"R. Motwani and P. Raghavan . Cambridge University Press New York , NY , USA , 1995 . R. Motwani and P. Raghavan. Cambridge University Press New York, NY, USA, 1995."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/00029890.1954.11988466"},{"key":"e_1_3_2_1_23_1","volume-title":"USA","author":"Wasserman S.","year":"1994","unstructured":"S. Wasserman and K. Faust . Cambridge University Press, Cambridge , USA , 1994 . S. Wasserman and K. Faust. Cambridge University Press, Cambridge, USA, 1994."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the International Workshop on Privacy, Security and Trust in KDD","author":"Zheleva E.","year":"2007","unstructured":"E. Zheleva and L. Getoor . Preserving the privacy of sensitive relationships in graph data . In Proceedings of the International Workshop on Privacy, Security and Trust in KDD , 2007 . E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. In Proceedings of the International Workshop on Privacy, Security and Trust in KDD, 2007."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"}],"event":{"name":"CIKM08: Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","ACM Association for Computing Machinery","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Napa Valley California USA","acronym":"CIKM08"},"container-title":["Proceedings of the 17th ACM conference on Information and knowledge management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1458082.1458123","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1458082.1458123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:44Z","timestamp":1750287224000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1458082.1458123"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,26]]},"references-count":26,"alternative-id":["10.1145\/1458082.1458123","10.1145\/1458082"],"URL":"https:\/\/doi.org\/10.1145\/1458082.1458123","relation":{},"subject":[],"published":{"date-parts":[[2008,10,26]]},"assertion":[{"value":"2008-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}