{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T02:50:53Z","timestamp":1761706253854,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T00:00:00Z","timestamp":1250467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,8,17]]},"DOI":"10.1145\/1592665.1592667","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T14:08:35Z","timestamp":1251122915000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["Privacy-enabling social networking over untrusted networks"],"prefix":"10.1145","author":[{"given":"Jonathan","family":"Anderson","sequence":"first","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[{"name":"KU Leuven, Cambridge, Belgium"}]},{"given":"Joseph","family":"Bonneau","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Frank","family":"Stajano","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2009,8,17]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029200"},{"key":"e_1_3_2_1_3_1","unstructured":"danah michele boyd.\n  Taken Out of Context - American Teen Sociality in Networked Publics\n  . PhD thesis University of California Berkeley 2008\n  .  danah michele boyd. Taken Out of Context - American Teen Sociality in Networked Publics. PhD thesis University of California Berkeley 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1688899.1688920"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578010"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of Web 2.0 Security and Privacy 2008","author":"Felt A.","year":"2008","unstructured":"Felt , A. , and Evans , D . Privacy Protection for Social Networking Platforms . In Proceedings of Web 2.0 Security and Privacy 2008 ( 2008 ). Felt, A., and Evans, D. Privacy Protection for Social Networking Platforms. In Proceedings of Web 2.0 Security and Privacy 2008 (2008)."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the USENIX Symposium on Internet Technologies and Systems","author":"Gong L.","year":"1997","unstructured":"Gong , L. , Mueller , M. , Prafullchandra , H. , and Schemers , R . Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 . In Proceedings of the USENIX Symposium on Internet Technologies and Systems ( 1997 ). Gong, L., Mueller, M., Prafullchandra, H., and Schemers, R. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems (1997)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397747"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_10_1","volume-title":"Secure untrusted data repository (SUNDR). the 6th Symposium on Operating Systems Design and Implementation","author":"Li J.","year":"2004","unstructured":"Li , J. , Krohn , M. , Mazieres , D. , and Shasha , D . Secure untrusted data repository (SUNDR). the 6th Symposium on Operating Systems Design and Implementation ( 2004 ). Li, J., Krohn, M., Mazieres, D., and Shasha, D. Secure untrusted data repository (SUNDR). the 6th Symposium on Operating Systems Design and Implementation (2004)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067629.806537"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456405"},{"key":"e_1_3_2_1_13_1","unstructured":"McGonigle B. Some profiles on MySpace.com not what they seem. http:\/\/www.boston.com\/news\/ nation\/washington\/articles\/2006\/10\/16\/some_ profiles_on_myspacecom_not_what_they_seem\/ October 2006. The Boston Globe.  McGonigle B. Some profiles on MySpace.com not what they seem. http:\/\/www.boston.com\/news\/ nation\/washington\/articles\/2006\/10\/16\/some_ profiles_on_myspacecom_not_what_they_seem\/ October 2006. The Boston Globe."},{"key":"e_1_3_2_1_14_1","unstructured":"Mills E. Facebook suspends app that permitted peephole. http:\/\/news.cnet.com\/8301-10784_3-9977762-7.html Jun 2008. CNET News.  Mills E. Facebook suspends app that permitted peephole. http:\/\/news.cnet.com\/8301-10784_3-9977762-7.html Jun 2008. CNET News."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/986655.986669"},{"key":"e_1_3_2_1_16_1","unstructured":"Pilkington E. Blackmail claim stirs fears over Facebook. http:\/\/www.guardian.co.uk\/business\/2007\/jul\/16\/usnews.news Jul 2007. The Guardian.  Pilkington E. Blackmail claim stirs fears over Facebook. http:\/\/www.guardian.co.uk\/business\/2007\/jul\/16\/usnews.news Jul 2007. The Guardian."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408667"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102216"},{"key":"e_1_3_2_1_19_1","unstructured":"Randall D. and Richards V. Facebook can ruin your life. And so can MySpace Bebo... http:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/news\/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html February 2008. The Independent.  Randall D. and Richards V. Facebook can ruin your life. And so can MySpace Bebo... http:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/news\/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html February 2008. The Independent."},{"key":"e_1_3_2_1_20_1","unstructured":"Story L. and Stone B. Facebook Retreats on Online Tracking. http:\/\/www.nytimes.com\/2007\/11\/ 30\/technology\/30face.html Nov 2007. The New York Times.  Story L. and Stone B. Facebook Retreats on Online Tracking. http:\/\/www.nytimes.com\/2007\/11\/ 30\/technology\/30face.html Nov 2007. The New York Times."},{"key":"e_1_3_2_1_21_1","first-page":"112","volume-title":"Multi-channel Protocols. In Proceedings of the International Workshop on Security Protocols","author":"Wong F.-L.","year":"2005","unstructured":"Wong , F.-L. , and Stajano , F . Multi-channel Protocols. In Proceedings of the International Workshop on Security Protocols ( 2005 ), pp. 112 -- 1127 . Wong, F.-L., and Stajano, F. Multi-channel Protocols. In Proceedings of the International Workshop on Security Protocols (2005), pp. 112 -- 127."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.64"}],"event":{"name":"SIGCOMM '09: ACM SIGCOMM 2009 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"],"location":"Barcelona Spain","acronym":"SIGCOMM '09"},"container-title":["Proceedings of the 2nd ACM workshop on Online social networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1592665.1592667","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1592665.1592667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:35Z","timestamp":1750253375000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1592665.1592667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,17]]},"references-count":21,"alternative-id":["10.1145\/1592665.1592667","10.1145\/1592665"],"URL":"https:\/\/doi.org\/10.1145\/1592665.1592667","relation":{},"subject":[],"published":{"date-parts":[[2009,8,17]]},"assertion":[{"value":"2009-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}