{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:19:26Z","timestamp":1776107966063,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T00:00:00Z","timestamp":1311120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1016603CNS-1017229"],"award-info":[{"award-number":["CNS-1016603CNS-1017229"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,20]]},"DOI":"10.1145\/2078827.2078846","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Eyeing your exposure"],"prefix":"10.1145","author":[{"given":"Roman","family":"Schlegel","sequence":"first","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN"}]},{"given":"Apu","family":"Kapadia","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN"}]},{"given":"Adam J.","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2011,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"75","volume-title":"ECSCW","author":"Bellotti V.","unstructured":"V. Bellotti and A. Sellen . Design for privacy in ubiquitous computing environments . In ECSCW , pages 75 -, 1993. V. Bellotti and A. Sellen. Design for privacy in ubiquitous computing environments. In ECSCW, pages 75-, 1993."},{"key":"e_1_3_2_1_2_1","volume-title":"Feb.","author":"Cuellar J. R.","year":"2004","unstructured":"J. R. Cuellar , J. B. Morris Jr , D. K. Mulligan , J. Peterson , and J. M. Polk . Geopriv requirements , Feb. 2004 . RFC 3693. J. R. Cuellar, J. B. Morris Jr, D. K. Mulligan, J. Peterson, and J. M. Polk. Geopriv requirements, Feb. 2004. RFC 3693."},{"key":"e_1_3_2_1_4_1","volume-title":"SPKI certificate theory. IETF Request for Comments RFC","author":"Ellison C. M.","year":"1999","unstructured":"C. M. Ellison , B. Frantz , B. Lampson , R. Rivest , B. Thomas , and T. Ylonen . SPKI certificate theory. IETF Request for Comments RFC 2693, Sept. 1999 . C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. IETF Request for Comments RFC 2693, Sept. 1999."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.158"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/142750.142754"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_3_2_1_10_1","first-page":"25","volume-title":"Proceedings of the First International Conference on Security in Pervasive Computing","author":"Hengartner U.","year":"2003","unstructured":"U. Hengartner and P. Steenkiste . Protecting access to people location information . In Proceedings of the First International Conference on Security in Pervasive Computing , pages 25 -- 38 , Boppard, Germany , Mar. 2003 . U. Hengartner and P. Steenkiste. Protecting access to people location information. In Proceedings of the First International Conference on Security in Pervasive Computing, pages 25--38, Boppard, Germany, Mar. 2003."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.33"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"G.\n      Hsieh K. P.\n      Tang W. Y.\n      Low and \n      J. I.\n      Hong\n  . \n  Field deployment of imbuddy: A study of privacy control and feedback mechanisms for contextual im\n  . In J. Krumm G. D. Abowd A. Seneviratne and T. Strang editors Ubicomp volume \n  4717\n   of \n  Lecture Notes in Computer Science pages \n  91\n  --\n  108\n  . \n  Springer 2007\n  .   G. Hsieh K. P. Tang W. Y. Low and J. I. Hong. Field deployment of imbuddy : A study of privacy control and feedback mechanisms for contextual im. In J. Krumm G. D. Abowd A. Seneviratne and T. Strang editors Ubicomp volume 4717 of Lecture Notes in Computer Science pages 91--108. Springer 2007.","DOI":"10.1007\/978-3-540-74853-3_6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884431"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1758156.1758169"},{"key":"e_1_3_2_1_17_1","first-page":"179","volume-title":"Proceedings of The 14th Annual Network and Distributed System Security Symposium (NDSS)","author":"Kapadia A.","year":"2007","unstructured":"A. Kapadia , P. P. Tsang , and S. W. Smith . Attribute-Based Publishing with Hidden Credentials and Hidden Policies . In Proceedings of The 14th Annual Network and Distributed System Security Symposium (NDSS) , pages 179 -- 192 , Mar. 2007 . A. Kapadia, P. P. Tsang, and S. W. Smith. Attribute-Based Publishing with Hidden Credentials and Hidden Policies. In Proceedings of The 14th Annual Network and Distributed System Security Symposium (NDSS), pages 179--192, Mar. 2007."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655084.1655086"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/647988.741491"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.54"},{"key":"e_1_3_2_1_21_1","first-page":"201","volume-title":"Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX III)","author":"Li N.","year":"2003","unstructured":"N. Li and J. C. Mitchell . RT: A role-based trust-management framework . In Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX III) , pages 201 -- 212 , Apr. 2003 . N. Li and J. C. Mitchell. RT: A role-based trust-management framework. In Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX III), pages 201--212, Apr. 2003."},{"key":"e_1_3_2_1_22_1","volume-title":"Oct","author":"Metz R.","year":"2005","unstructured":"R. Metz . Friendster outs voyeurs , Oct 2005 . http:\/\/www.wired.com\/culture\/lifestyle\/news\/2005\/10\/69106. R. Metz. Friendster outs voyeurs, Oct 2005. http:\/\/www.wired.com\/culture\/lifestyle\/news\/2005\/10\/69106."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460445"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186726"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 2001 CHI Conference on Human Factors in Computing Systems","author":"Mynatt E.","year":"2001","unstructured":"E. Mynatt and D. Nguyen . Making ubiquitous computing visible . In Proceedings of the 2001 CHI Conference on Human Factors in Computing Systems , 2001 . E. Mynatt and D. Nguyen. Making ubiquitous computing visible. In Proceedings of the 2001 CHI Conference on Human Factors in Computing Systems, 2001."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054987"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864364"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864431.1864446"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519005"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029140"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027537"},{"key":"e_1_3_2_1_34_1","volume-title":"DARPA Information Survivability Conference and Exposition","author":"Winsborough W. H.","year":"2000","unstructured":"W. H. Winsborough , K. E. Seamons , and V. E. Jones . Automated trust negotiation . In DARPA Information Survivability Conference and Exposition , Jan. 2000 . W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, Jan. 2000."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755730"}],"event":{"name":"SOUPS '11: Symposium On Usable Privacy and Security","location":"Pittsburgh Pennsylvania","acronym":"SOUPS '11","sponsor":["Carnegie Mellon CyLab","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Seventh Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078846","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2078827.2078846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:15Z","timestamp":1750241175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078846"}},"subtitle":["quantifying and controlling information sharing for improved privacy"],"short-title":[],"issued":{"date-parts":[[2011,7,20]]},"references-count":34,"alternative-id":["10.1145\/2078827.2078846","10.1145\/2078827"],"URL":"https:\/\/doi.org\/10.1145\/2078827.2078846","relation":{},"subject":[],"published":{"date-parts":[[2011,7,20]]},"assertion":[{"value":"2011-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}