{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:41Z","timestamp":1750307201631,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T00:00:00Z","timestamp":1311120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["NSF-CNS-0831360"],"award-info":[{"award-number":["NSF-CNS-0831360"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,20]]},"DOI":"10.1145\/2078827.2078842","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["ROAuth"],"prefix":"10.1145","author":[{"given":"Mohamed","family":"Shehab","sequence":"first","affiliation":[{"name":"University of North Carolina, Charlotte, NC"}]},{"given":"Said","family":"Marouf","sequence":"additional","affiliation":[{"name":"University of North Carolina, Charlotte, NC"}]},{"given":"Christopher","family":"Hudel","sequence":"additional","affiliation":[{"name":"University of North Carolina, Charlotte, NC"}]}],"member":"320","published-online":{"date-parts":[[2011,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_2_1","volume-title":"Recommender Systems Handbook: A Complete Guide for Research Scientists and Practitioners","author":"Adomavicius G.","year":"2010","unstructured":"G. Adomavicius and Y. Kwon . In Recommender Systems Handbook: A Complete Guide for Research Scientists and Practitioners , chapter Multi-Criteria Recommender Systems - Forthcoming. Springer , 2010 . G. Adomavicius and Y. Kwon. In Recommender Systems Handbook: A Complete Guide for Research Scientists and Practitioners, chapter Multi-Criteria Recommender Systems - Forthcoming. Springer, 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1817271.1817457"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837120"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2009.82"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of Workshop on Web 2.0 Security & Privacy (W2SP 2007)","author":"Carrie D.","year":"2007","unstructured":"D. Carrie and E. Gates . Access control requirements for web 2.0 security and privacy . In Proc. of Workshop on Web 2.0 Security & Privacy (W2SP 2007) , 2007 . D. Carrie and E. Gates. Access control requirements for web 2.0 security and privacy. In Proc. of Workshop on Web 2.0 Security & Privacy (W2SP 2007), 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1862330.1862337"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253568"},{"key":"e_1_3_2_1_9_1","unstructured":"Facebook. Facebook Press Room. http:\/\/www.facebook.com\/press\/info.php?statistics 2010.  Facebook. Facebook Press Room. http:\/\/www.facebook.com\/press\/info.php?statistics 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_11_1","volume-title":"Workshop on web 2.0 security and privacy. oakland, ca. 22 may 2008","author":"Felt A.","year":"2008","unstructured":"A. Felt and D. Evans . Workshop on web 2.0 security and privacy. oakland, ca. 22 may 2008 . privacy protection for social networking platforms, 2008 . A. Felt and D. Evans. Workshop on web 2.0 security and privacy. oakland, ca. 22 may 2008. privacy protection for social networking platforms, 2008."},{"key":"e_1_3_2_1_12_1","unstructured":"FriendCameo Inc. FriendCameo. http:\/\/friendcameo.com 2010.  FriendCameo Inc. FriendCameo. http:\/\/friendcameo.com 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572539"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/138859.138867"},{"volume-title":"Proc. 21st ACM Symposium on Operating Systems Principles (SOSP '07)","author":"Gollu K. K.","key":"e_1_3_2_1_15_1","unstructured":"K. K. Gollu , S. Saroiu , and A. Wolman . A social networking-based access control scheme for personal content . Proc. 21st ACM Symposium on Operating Systems Principles (SOSP '07) . Work in progress. K. K. Gollu, S. Saroiu, and A. Wolman. A social networking-based access control scheme for personal content. Proc. 21st ACM Symposium on Operating Systems Principles (SOSP '07). Work in progress."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_17_1","volume-title":"More content-less control: Access control in the Web 2.0. Web 2.0 Security & Privacy","author":"Hart M.","year":"2003","unstructured":"M. Hart , R. Johnson , and A. Stent . More content-less control: Access control in the Web 2.0. Web 2.0 Security & Privacy , 2003 . M. Hart, R. Johnson, and A. Stent. More content-less control: Access control in the Web 2.0. Web 2.0 Security & Privacy, 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312682"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234787"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1998.649263"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1812598.1812632"},{"key":"e_1_3_2_1_23_1","volume-title":"http:\/\/tools.ietf.org\/html\/rfc4627","author":"ON.","year":"2006","unstructured":"JS ON. JSON. http:\/\/tools.ietf.org\/html\/rfc4627 , 2006 . JSON. JSON. http:\/\/tools.ietf.org\/html\/rfc4627, 2006."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456380"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2007.4296633"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297253"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.21"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009050"},{"key":"e_1_3_2_1_29_1","unstructured":"Mozilla. Mozilla XML User Interface Language (XUL). https:\/\/developer.mozilla.org\/En\/XUL.  Mozilla. Mozilla XML User Interface Language (XUL). https:\/\/developer.mozilla.org\/En\/XUL."},{"key":"e_1_3_2_1_30_1","unstructured":"Mozilla Firefox. Mozilla Firefox Privacy and Security Extensions. https:\/\/addons.mozilla.org\/en-US\/firefox\/extensions\/privacy-security.  Mozilla Firefox. Mozilla Firefox Privacy and Security Extensions. https:\/\/addons.mozilla.org\/en-US\/firefox\/extensions\/privacy-security."},{"key":"e_1_3_2_1_31_1","unstructured":"OAuth 2.0. Access Token OAuth 2.0. http:\/\/tools.ietf.org\/html\/draft-ietf-oauth-v2-10\\#page-5.  OAuth 2.0. Access Token OAuth 2.0. http:\/\/tools.ietf.org\/html\/draft-ietf-oauth-v2-10\\#page-5."},{"key":"e_1_3_2_1_32_1","unstructured":"OAuth 2.0. The OAuth 2.0 Protocol. http:\/\/tools.ietf.org\/html\/draft-ietf-oauth-v2-10 2010.  OAuth 2.0. The OAuth 2.0 Protocol. http:\/\/tools.ietf.org\/html\/draft-ietf-oauth-v2-10 2010."},{"key":"e_1_3_2_1_33_1","unstructured":"OAuth 2.0. Web server client profile oauth 2.0. http:\/\/tools.ietf.org\/html\/draft-ietf-oauth-v2-10\\#section-1.4.1 2010.  OAuth 2.0. Web server client profile oauth 2.0. http:\/\/tools.ietf.org\/html\/draft-ietf-oauth-v2-10\\#section-1.4.1 2010."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968832"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/192844.192905"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968828"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/421425"},{"key":"e_1_3_2_1_39_1","unstructured":"Twitter Inc. Twitter. http:\/\/twitter.com.  Twitter Inc. Twitter. http:\/\/twitter.com."}],"event":{"name":"SOUPS '11: Symposium On Usable Privacy and Security","sponsor":["Carnegie Mellon CyLab","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Pittsburgh Pennsylvania","acronym":"SOUPS '11"},"container-title":["Proceedings of the Seventh Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2078827.2078842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:15Z","timestamp":1750241175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078842"}},"subtitle":["recommendation based open authorization"],"short-title":[],"issued":{"date-parts":[[2011,7,20]]},"references-count":39,"alternative-id":["10.1145\/2078827.2078842","10.1145\/2078827"],"URL":"https:\/\/doi.org\/10.1145\/2078827.2078842","relation":{},"subject":[],"published":{"date-parts":[[2011,7,20]]},"assertion":[{"value":"2011-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}