{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:14Z","timestamp":1750307054302,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,18]],"date-time":"2012-09-18T00:00:00Z","timestamp":1347926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,18]]},"DOI":"10.1145\/2413296.2413306","type":"proceedings-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T15:12:21Z","timestamp":1355757141000},"page":"105-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["All your base are belong to US"],"prefix":"10.1145","author":[{"given":"Richard","family":"Ford","sequence":"first","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL, USA"}]},{"given":"Liam M.","family":"Mayron","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The New York Times","author":"Barbaro M.","year":"2006","unstructured":"M. Barbaro and T. Zeller . A face is exposed for aol searcher no. 4417749 . The New York Times , Aug. 2006 . Downloaded from http:\/\/www.nytimes.com\/ 2006\/08\/09\/technology\/09aol.html. M. Barbaro and T. Zeller. A face is exposed for aol searcher no. 4417749. The New York Times, Aug. 2006. Downloaded from http:\/\/www.nytimes.com\/2006\/08\/09\/technology\/09aol.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900567"},{"key":"e_1_3_2_1_3_1","volume-title":"Dec.","author":"Department of Defense.","year":"1985","unstructured":"Department of Defense. Department of Defense Trusted Computer System Evaluation Critera. DoD 5200.28-STD , Dec. 1985 . Department of Defense. Department of Defense Trusted Computer System Evaluation Critera. DoD 5200.28-STD, Dec. 1985."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"volume-title":"April","year":"2012","key":"e_1_3_2_1_5_1","unstructured":"Flickr. Flickr website , April 2012 . http:\/\/www.flickr.com\/map\/. Flickr. Flickr website, April 2012. http:\/\/www.flickr.com\/map\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073287"},{"volume-title":"April","year":"2012","key":"e_1_3_2_1_7_1","unstructured":"Geoeye. About us , April 2012 . http:\/\/geoeye.com\/CorpSite\/about-us\/. Geoeye. About us, April 2012. http:\/\/geoeye.com\/CorpSite\/about-us\/."},{"volume-title":"April","year":"2012","key":"e_1_3_2_1_8_1","unstructured":"Google. Google maps website , April 2012 . http:\/\/maps.google.com. Google. Google maps website, April 2012. http:\/\/maps.google.com."},{"key":"e_1_3_2_1_9_1","volume-title":"No More Secrets: National Security Strategies for a Transparent World","author":"Kochems A.","year":"2010","unstructured":"A. Kochems . No More Secrets: National Security Strategies for a Transparent World . American Bar Association Standing Committee on Law and National Security, Jan. 2010 . A. Kochems. No More Secrets: National Security Strategies for a Transparent World. American Bar Association Standing Committee on Law and National Security, Jan. 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118093467"},{"volume-title":"April","year":"2012","key":"e_1_3_2_1_11_1","unstructured":"Microsoft. Microsoft bing maps website , April 2012 . http:\/\/www.bing.com\/maps\/. Microsoft. Microsoft bing maps website, April 2012. http:\/\/www.bing.com\/maps\/."},{"volume-title":"April","year":"2012","key":"e_1_3_2_1_12_1","unstructured":"OpenStreetMap. Openstreetmap website , April 2012 . http:\/\/www.openstreetmap.org\/. OpenStreetMap. Openstreetmap website, April 2012. http:\/\/www.openstreetmap.org\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1527017.1527028"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.939835"},{"key":"e_1_3_2_1_15_1","volume-title":"Nov.","author":"Reichhardt T.","year":"2006","unstructured":"T. Reichhardt . The first photo from space. Air & Space magazine , Nov. 2006 . T. Reichhardt. The first photo from space. Air & Space magazine, Nov. 2006."},{"volume-title":"April","year":"2012","key":"e_1_3_2_1_16_1","unstructured":"Twitter. Twitter website , April 2012 . http:\/\/twitter.com\/. Twitter. Twitter website, April 2012. http:\/\/twitter.com\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.39"},{"volume-title":"April","year":"2012","key":"e_1_3_2_1_18_1","unstructured":"Wikimapia. wikimapia website , April 2012 . http:\/\/wikimapia.org\/. Wikimapia. wikimapia website, April 2012. http:\/\/wikimapia.org\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Wikimedia. Geohack April 2012. http:\/\/toolserver.org\/ geohack\/.  Wikimedia. Geohack April 2012. http:\/\/toolserver.org\/ geohack\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Yahoo! Yahoo! maps website April 2012. http:\/\/maps.yahoo.com\/.  Yahoo! Yahoo! maps website April 2012. http:\/\/maps.yahoo.com\/."}],"event":{"name":"NSPW '12: The New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc","ACM Association for Computing Machinery","Microsoft Microsoft","CA Labs CA Labs"],"location":"Bertinoro Italy","acronym":"NSPW '12"},"container-title":["Proceedings of the 2012 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413296.2413306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2413296.2413306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:09Z","timestamp":1750238469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413296.2413306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,18]]},"references-count":20,"alternative-id":["10.1145\/2413296.2413306","10.1145\/2413296"],"URL":"https:\/\/doi.org\/10.1145\/2413296.2413306","relation":{},"subject":[],"published":{"date-parts":[[2012,9,18]]},"assertion":[{"value":"2012-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}