{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:26Z","timestamp":1750306766456,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,7]],"date-time":"2013-10-07T00:00:00Z","timestamp":1381104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,7]]},"DOI":"10.1145\/2512938.2512943","type":"proceedings-article","created":{"date-parts":[[2013,10,8]],"date-time":"2013-10-08T13:27:04Z","timestamp":1381238824000},"page":"189-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Building confederated web-based services with Priv.io"],"prefix":"10.1145","author":[{"given":"Liang","family":"Zhang","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Alan","family":"Mislove","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,10,7]]},"reference":[{"volume-title":"USENIX ATC","year":"2012","author":"Akhawe D.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1592665.1592667"},{"unstructured":"Amazon EC2 Pricing. http:\/\/aws.amazon.com\/ec2\/pricing.  Amazon EC2 Pricing. http:\/\/aws.amazon.com\/ec2\/pricing.","key":"e_1_3_2_1_3_1"},{"unstructured":"Amazon S3 Pricing. http:\/\/aws.amazon.com\/s3\/pricing.  Amazon S3 Pricing. http:\/\/aws.amazon.com\/s3\/pricing.","key":"e_1_3_2_1_4_1"},{"unstructured":"app.net. http:\/\/join.app.net.  app.net. http:\/\/join.app.net.","key":"e_1_3_2_1_5_1"},{"volume-title":"USENIX Security","year":"2008","author":"Barth A.","key":"e_1_3_2_1_6_1"},{"volume-title":"Dynamic Peer Networks: Pick Two. HotOS","year":"2003","author":"Blake C.","key":"e_1_3_2_1_7_1"},{"volume-title":"OSDI","year":"2010","author":"Beaver D.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/SP.2007.11"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1592568.1592585"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1578002.1578010"},{"doi-asserted-by":"crossref","unstructured":"M. Cha H. Haddadi F. Benevenuto and K. P. Gummadi. Measuring User Influence in Twitter: The Million Follower Fallacy. ICWSM Washington D.C. 2010.  M. Cha H. Haddadi F. Benevenuto and K. P. Gummadi. Measuring User Influence in Twitter: The Million Follower Fallacy. ICWSM Washington D.C. 2010.","key":"e_1_3_2_1_12_1","DOI":"10.1609\/icwsm.v4i1.14033"},{"volume-title":"WebApps","year":"2010","author":"Chandra R.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/2414456.2414460"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/MCOM.2009.5350374"},{"unstructured":"Ciphertext Policy Attribute-Based Encryption. http:\/\/acsc.cs.utexas.edu\/cpabe.  Ciphertext Policy Attribute-Based Encryption. http:\/\/acsc.cs.utexas.edu\/cpabe.","key":"e_1_3_2_1_16_1"},{"unstructured":"Cross-Origin Resource Sharing. http:\/\/www.w3.org\/TR\/cors\/.  Cross-Origin Resource Sharing. http:\/\/www.w3.org\/TR\/cors\/.","key":"e_1_3_2_1_17_1"},{"unstructured":"Diaspora*. http:\/\/www.joindiaspora.com\/.  Diaspora*. http:\/\/www.joindiaspora.com\/.","key":"e_1_3_2_1_18_1"},{"unstructured":"Facebook Statistics. http:\/\/on.fb.me\/UtWB0.  Facebook Statistics. http:\/\/on.fb.me\/UtWB0.","key":"e_1_3_2_1_19_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/1879141.1879147"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/1367497.1367599"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1397735.1397747"},{"unstructured":"HTML5 Specification. http:\/\/bit.ly\/3h8KZG.  HTML5 Specification. http:\/\/bit.ly\/3h8KZG.","key":"e_1_3_2_1_23_1"},{"volume-title":"USENIX ATC","year":"2012","author":"Ingram L.","key":"e_1_3_2_1_24_1"},{"volume-title":"IETF","year":"2000","author":"Kaliski B.","key":"e_1_3_2_1_25_1"},{"volume-title":"HotNets","year":"2007","author":"Krohn M.","key":"e_1_3_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1007\/978-3-642-25821-3_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/1397735.1397742"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/1298306.1298311"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/1989240.1989253"},{"unstructured":"R. Miller. Ma.gnolia Data is Gone for Good. http:\/\/bit.ly\/tbFup.  R. Miller. Ma.gnolia Data is Gone for Good. http:\/\/bit.ly\/tbFup.","key":"e_1_3_2_1_31_1"},{"volume-title":"The Next Web","year":"2011","author":"Myers C. B.","key":"e_1_3_2_1_32_1"},{"volume-title":"NDSS","year":"2007","author":"Nentwich F.","key":"e_1_3_2_1_33_1"},{"volume-title":"NDSS","year":"2009","author":"Nadji Y.","key":"e_1_3_2_1_34_1"},{"unstructured":"G. Ou. Facebook slashes the quality of \"HD\" videos. http:\/\/bit.ly\/bvx86h.  G. Ou. Facebook slashes the quality of \"HD\" videos. http:\/\/bit.ly\/bvx86h.","key":"e_1_3_2_1_35_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1007\/978-3-540-45146-4_36"},{"doi-asserted-by":"crossref","unstructured":"S. N. Porter. A password extension for improved human factors. Comp. & Sec. 1(1) 1982.  S. N. Porter. A password extension for improved human factors. Comp. & Sec. 1(1) 1982.","key":"e_1_3_2_1_37_1","DOI":"10.1016\/0167-4048(82)90025-6"},{"unstructured":"priv.ly. http:\/\/priv.ly.  priv.ly. http:\/\/priv.ly.","key":"e_1_3_2_1_38_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/1536616.1536634"},{"unstructured":"G. Rydstedt E. Bursztein D. Boneh and C. Jackson. Busting frame busting: a study of clickjacking vulnerabilities at popular sites. W2SP Oakland CA 2010.  G. Rydstedt E. Bursztein D. Boneh and C. Jackson. Busting frame busting: a study of clickjacking vulnerabilities at popular sites. W2SP Oakland CA 2010.","key":"e_1_3_2_1_40_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1145\/1835804.1835836"},{"unstructured":"Representational State Transfer. http:\/\/en.wikipedia.org\/wiki\/Representational_state_transfer.  Representational State Transfer. http:\/\/en.wikipedia.org\/wiki\/Representational_state_transfer.","key":"e_1_3_2_1_42_1"},{"volume-title":"COMSNETS","year":"2011","author":"Shakimov A.","key":"e_1_3_2_1_43_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/1592665.1592669"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1007\/978-3-642-25821-3_3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1145\/1397735.1397746"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/1658939.1658959"},{"unstructured":"tent.io. http:\/\/tent.io.  tent.io. http:\/\/tent.io.","key":"e_1_3_2_1_48_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1145\/2342549.2342561"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1109\/WI.2007.60"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.1145\/2184489.2184499"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/2048147.2048224"},{"unstructured":"Zynga. http:\/\/zynga.com.  Zynga. http:\/\/zynga.com.","key":"e_1_3_2_1_53_1"}],"event":{"sponsor":["ACM Association for Computing Machinery"],"acronym":"COSN'13","name":"COSN'13: Conference on Online Social Networks","location":"Boston Massachusetts USA"},"container-title":["Proceedings of the first ACM conference on Online social networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2512938.2512943","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2512938.2512943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:51Z","timestamp":1750231731000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2512938.2512943"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,7]]},"references-count":53,"alternative-id":["10.1145\/2512938.2512943","10.1145\/2512938"],"URL":"https:\/\/doi.org\/10.1145\/2512938.2512943","relation":{},"subject":[],"published":{"date-parts":[[2013,10,7]]},"assertion":[{"value":"2013-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}