{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:23Z","timestamp":1750306043437,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Sciences and Engineering Research Council of Canada","award":["RGPIN-2014-06611"],"award-info":[{"award-number":["RGPIN-2014-06611"]}]},{"name":"Canada Research Chair","award":["950-229712"],"award-info":[{"award-number":["950-229712"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078867","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"55-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms"],"prefix":"10.1145","author":[{"given":"Seyed Hossein","family":"Ahmadinejad","sequence":"first","affiliation":[{"name":"Nulli, Calgary, AB, Canada"}]},{"given":"Philip W.L.","family":"Fong","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"volume-title":"Proceedings of 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops'2011)","author":"Ahmadinejad Seyed Hossein","key":"e_1_3_2_1_2_1","unstructured":"Seyed Hossein Ahmadinejad , Mohd Anwar , and Philip W. L. Fong . 2011. Inference attacks by third-party extensions to social network systems . In Proceedings of 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops'2011) . Seattle, USA, 282--287. Seyed Hossein Ahmadinejad, Mohd Anwar, and Philip W. L. Fong. 2011. Inference attacks by third-party extensions to social network systems. In Proceedings of 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops'2011). Seattle, USA, 282--287."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484333"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.04.004"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897878"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Web 2.0 Security and Privacy Workshop (W2SP'09)","author":"Becker Justin","year":"2009","unstructured":"Justin Becker and Hao Chen . 2009 . Measuring privacy risk in online social networks . In Proceedings of the Web 2.0 Security and Privacy Workshop (W2SP'09) . Oakland, CA, USA, 8. Justin Becker and Hao Chen. 2009. Measuring privacy risk in online social networks. In Proceedings of the Web 2.0 Security and Privacy Workshop (W2SP'09). Oakland, CA, USA, 8."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195711"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2011.5766885"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.04.016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01704020"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-009-0105-8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_14"},{"key":"e_1_3_2_1_13_1","unstructured":"R. Heatherly M. Kantarcioglu and B. Thuraisingham. 2009. Preventing private information inference attacks on social networks. Technical Report. Computer Science Department University of Texas at Dallas.  R. Heatherly M. Kantarcioglu and B. Thuraisingham. 2009. Preventing private information inference attacks on social networks. Technical Report. Computer Science Department University of Texas at Dallas."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435352"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526899"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456405"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2008.03.019"},{"volume-title":"Cryptography and Data Security","author":"Robling Denning Dorothy Elizabeth","key":"e_1_3_2_1_18_1","unstructured":"Dorothy Elizabeth Robling Denning . 1982. Inference Controls . In Cryptography and Data Security . Addison-Wesley , 331--390. Dorothy Elizabeth Robling Denning. 1982. Inference Controls. In Cryptography and Data Security. Addison-Wesley, 331--390."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 24th IEEE International Conference on Data Engineering Workshop (ICDEW'08)","author":"Xu Wanhong","year":"2008","unstructured":"Wanhong Xu , Xi Zhou , and Lei Li . 2008 . Inferring privacy information via social relations . In Proceedings of the 24th IEEE International Conference on Data Engineering Workshop (ICDEW'08) . Cancun, Mexico, 525--530. Wanhong Xu, Xi Zhou, and Lei Li. 2008. Inferring privacy information via social relations. In Proceedings of the 24th IEEE International Conference on Data Engineering Workshop (ICDEW'08). Cancun, Mexico, 525--530."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078867"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":19,"alternative-id":["10.1145\/3078861.3078867","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078867","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}