{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:24:25Z","timestamp":1759091065899,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T00:00:00Z","timestamp":1328572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,2,7]]},"DOI":"10.1145\/2133601.2133619","type":"proceedings-article","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T15:39:28Z","timestamp":1328629168000},"page":"141-148","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Cookie-based privacy issues on google services"],"prefix":"10.1145","author":[{"given":"Vincent","family":"Toubiana","sequence":"first","affiliation":[{"name":"Alcatel-Lucent Bell-Labs France, Nozay, France"}]},{"given":"Vincent","family":"Verdot","sequence":"additional","affiliation":[{"name":"Alcatel-Lucent Bell-Labs France, Nozay, France"}]},{"given":"Benoit","family":"Christophe","sequence":"additional","affiliation":[{"name":"Alcatel-Lucent Bell-Labs France, Nozay, France"}]}],"member":"320","published-online":{"date-parts":[[2012,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Eric Butler. Firesheep 2010. http:\/\/codebutler.com\/firesheep.  Eric Butler. Firesheep 2010. http:\/\/codebutler.com\/firesheep."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881154"},{"key":"e_1_3_2_1_3_1","unstructured":"Christopher W. Clifton and Mummoorthy Murugesan. Providing privacy through plausibly deniable search. April 2009.  Christopher W. Clifton and Mummoorthy Murugesan. Providing privacy through plausibly deniable search. April 2009."},{"key":"e_1_3_2_1_4_1","unstructured":"Electronic Frontier Foundation. Https everywhere. https:\/\/www.eff.org\/https-everywhere.  Electronic Frontier Foundation. Https everywhere. https:\/\/www.eff.org\/https-everywhere."},{"key":"e_1_3_2_1_5_1","unstructured":"Daniel C. Howe and Helen Nissenbaum. Trackmenot: resisting surveillance in web search. In I. Kerr C. Lucock V. Steeves (Eds.) Lessons from the Identity Trail: Privacy Anonymity and Identity in a Networked Society pages 409--428 Oxford UK 2009. Oxford University Press.  Daniel C. Howe and Helen Nissenbaum. Trackmenot: resisting surveillance in web search. In I. Kerr C. Lucock V. Steeves (Eds.) Lessons from the Identity Trail: Privacy Anonymity and Identity in a Networked Society pages 409--428 Oxford UK 2009. Oxford University Press."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1108\/14684520910985693"},{"key":"e_1_3_2_1_7_1","unstructured":"Andrew Swerdlow Jessica Staddon. Public vs. publicized: Content use trends and privacy expectations 2011.  Andrew Swerdlow Jessica Staddon. Public vs. publicized: Content use trends and privacy expectations 2011."},{"key":"e_1_3_2_1_8_1","unstructured":"Mitja Kolsek. Session fixation vulnerability in web-based applications December 2002. http:\/\/www.acrossecurity.com\/papers\/session_fixation.pdf.  Mitja Kolsek. Session fixation vulnerability in web-based applications December 2002. http:\/\/www.acrossecurity.com\/papers\/session_fixation.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"Thoughtcrime Labs. Google sharing. http:\/\/www.googlesharing.net.  Thoughtcrime Labs. Google sharing. http:\/\/www.googlesharing.net."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314351"},{"key":"e_1_3_2_1_11_1","unstructured":"TMN Team. Unsearch. https:\/\/chrome.google.com\/webstore\/detail\/jojanedhfpmmjlkakmkhkgalbaokiphp.  TMN Team. Unsearch. https:\/\/chrome.google.com\/webstore\/detail\/jojanedhfpmmjlkakmkhkgalbaokiphp."},{"key":"e_1_3_2_1_12_1","unstructured":"Alma Whitten. The freedom to be who you want to be... February 2011. http:\/\/googlepublicpolicy.blogspot.com\/2011\/02\/freedom-to-be-who-you-want-to-be.html.  Alma Whitten. The freedom to be who you want to be... February 2011. http:\/\/googlepublicpolicy.blogspot.com\/2011\/02\/freedom-to-be-who-you-want-to-be.html."}],"event":{"name":"CODASPY'12: Second ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'12"},"container-title":["Proceedings of the second ACM conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133619","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2133601.2133619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:52Z","timestamp":1750241152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,7]]},"references-count":12,"alternative-id":["10.1145\/2133601.2133619","10.1145\/2133601"],"URL":"https:\/\/doi.org\/10.1145\/2133601.2133619","relation":{},"subject":[],"published":{"date-parts":[[2012,2,7]]},"assertion":[{"value":"2012-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}