{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:55Z","timestamp":1750307095111,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T00:00:00Z","timestamp":1350259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,15]]},"DOI":"10.1145\/2381966.2381976","type":"proceedings-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T17:13:12Z","timestamp":1350321192000},"page":"65-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Timed revocation of user data"],"prefix":"10.1145","author":[{"given":"Sirke","family":"Reimann","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Markus","family":"D\u00fcrmuth","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Viktor Mayer-Sch\u00f6nberger. Useful void: The art of forgetting in the age of ubiquitous computing. 2007.  Viktor Mayer-Sch\u00f6nberger. Useful void: The art of forgetting in the age of ubiquitous computing. 2007.","DOI":"10.2139\/ssrn.976541"},{"key":"e_1_3_2_1_2_1","unstructured":"Facebook. Available at: http:\/\/www.facebook.com\/.  Facebook. Available at: http:\/\/www.facebook.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Europe versus Facebook. Available at: http:\/\/europe-v-facebook.org\/.  Europe versus Facebook. Available at: http:\/\/europe-v-facebook.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Bruce Schneier. The death of ephemeral conversation. Blog: https:\/\/www.schneier.com\/blog\/archives\/2006\/10\/the_death_of_ep.html October 2006. {Online; accessed July 12 2012}.  Bruce Schneier. The death of ephemeral conversation. Blog: https:\/\/www.schneier.com\/blog\/archives\/2006\/10\/the_death_of_ep.html October 2006. {Online; accessed July 12 2012}."},{"key":"e_1_3_2_1_5_1","first-page":"299","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium","author":"Geambasu Roxana","year":"2009"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089048"},{"key":"e_1_3_2_1_7_1","unstructured":"Julian Backes Michael Backes Markus D\u00fcrmuth Sebastian Gerling and Stefan Lorenz. X-pire! - A digital expiration date for images in social networks.textitCoRR abs\/1112.2649 2011.  Julian Backes Michael Backes Markus D\u00fcrmuth Sebastian Gerling and Stefan Lorenz. X-pire! - A digital expiration date for images in social networks.textitCoRR abs\/1112.2649 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/347319.346289"},{"key":"e_1_3_2_1_9_1","first-page":"91","volume-title":"Proceedings of the 6th Conference on USENIX Security Symposium","author":"Boneh Dan","year":"1996"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.5"},{"key":"e_1_3_2_1_12_1","series-title":"IFIP","first-page":"241","volume-title":"SEC","author":"Nair Srijith K.","year":"2007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.387"},{"key":"e_1_3_2_1_14_1","unstructured":"Flickr. Available at: http:\/\/www.flickr.com\/.  Flickr. Available at: http:\/\/www.flickr.com\/."},{"key":"e_1_3_2_1_15_1","unstructured":"X-pire! Available at: http:\/\/www.x-pire.de\/.  X-pire! Available at: http:\/\/www.x-pire.de\/."},{"key":"e_1_3_2_1_16_1","first-page":"37","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2010","author":"Wolchok Scott","year":"2010"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/297805.297827"},{"key":"e_1_3_2_1_19_1","unstructured":"Official Google Blog (Jesse Alpert and Nissan Hajaj). We knew the web was big... Blog: http:\/\/googleblog.blogspot.com\/2008\/07\/we-knew-web-was-big.html July 2008. {Online; accessed July 12 2012}.  Official Google Blog (Jesse Alpert and Nissan Hajaj). We knew the web was big... Blog: http:\/\/googleblog.blogspot.com\/2008\/07\/we-knew-web-was-big.html July 2008. {Online; accessed July 12 2012}."},{"key":"e_1_3_2_1_20_1","unstructured":"Project Homepage of crawler4j. https:\/\/code.google.com\/p\/crawler4j\/. {Online; accessed July 12 2012}.  Project Homepage of crawler4j. https:\/\/code.google.com\/p\/crawler4j\/. {Online; accessed July 12 2012}."},{"key":"e_1_3_2_1_21_1","unstructured":"Apache Logging Services Project - Apache log4j. https:\/\/logging.apache.org\/log4j\/. {Online; accessed July 12 2012}.  Apache Logging Services Project - Apache log4j. https:\/\/logging.apache.org\/log4j\/. {Online; accessed July 12 2012}."},{"key":"e_1_3_2_1_22_1","unstructured":"Apache Project - Apache HttpComponents. https:\/\/hc.apache.org\/. {Online; accessed July 12 2012}.  Apache Project - Apache HttpComponents. https:\/\/hc.apache.org\/. {Online; accessed July 12 2012}."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_24_1","unstructured":"Internet Archive. Available at: http:\/\/www.archive.org\/.  Internet Archive. Available at: http:\/\/www.archive.org\/."}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Raleigh North Carolina USA","acronym":"CCS'12"},"container-title":["Proceedings of the 2012 ACM workshop on Privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381966.2381976","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381966.2381976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:41Z","timestamp":1750239281000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381966.2381976"}},"subtitle":["long expiration times from existing infrastructure"],"short-title":[],"issued":{"date-parts":[[2012,10,15]]},"references-count":22,"alternative-id":["10.1145\/2381966.2381976","10.1145\/2381966"],"URL":"https:\/\/doi.org\/10.1145\/2381966.2381976","relation":{},"subject":[],"published":{"date-parts":[[2012,10,15]]},"assertion":[{"value":"2012-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}