{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:18:09Z","timestamp":1771042689434,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-IIS-1527421"],"award-info":[{"award-number":["NSF-IIS-1527421"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-CNS- 1537924"],"award-info":[{"award-number":["NSF-CNS- 1537924"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-IIS-1527268"],"award-info":[{"award-number":["NSF-IIS-1527268"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078875","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"155-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks"],"prefix":"10.1145","author":[{"given":"Nishant","family":"Vishwamitra","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Yifang","family":"Li","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Kevin","family":"Wang","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Kelly","family":"Caine","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Gail-Joon","family":"Ahn","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2011. The State of Social Media 2011: Social is the new normal. (2011). http:\/\/www.briansolis.com\/2011\/10\/state-of-social-media-2011\/.  2011. The State of Social Media 2011: Social is the new normal. (2011). http:\/\/www.briansolis.com\/2011\/10\/state-of-social-media-2011\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Facebook Privacy Policy. (2017). http:\/\/www.facebook.com\/policy.php\/.  2017. Facebook Privacy Policy. (2017). http:\/\/www.facebook.com\/policy.php\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Facebook Sharing Settings. (2017). www.facebook.com\/help\/459934584025324\/.  2017. Facebook Sharing Settings. (2017). www.facebook.com\/help\/459934584025324\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). Citeseer.","author":"Adu-Oppong F."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2087320"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076747"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613097"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672328"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592668"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_3_2_1_16_1","unstructured":"Yair Levy and Michelle M. Ramim. 2016. Towards an Evaluation of Cyber Risks and Identity Information Sharing Practices in e-Learning Social Networking and Mobile Texting Apps. (2016).  Yair Levy and Michelle M. Ramim. 2016. Towards an Evaluation of Cyber Risks and Identity Information Sharing Practices in e-Learning Social Networking and Mobile Texting Apps. (2016)."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 1st Conference on Usability, Psychology, and Security. USENIX Association Berkeley, CA, USA, 1--8.","author":"Lipford H. R."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.poetic.2013.10.002"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"e_1_3_2_1_20_1","volume-title":"Technical Report CUCS-010-11, Columbia University","author":"Madejski M.","year":"2011"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Erika McCallister Timothy Grance and Karen A. Scarfone. 2010. Sp 800-122. guide to protecting the confidentiality of personally identifiable information (pii). (2010).  Erika McCallister Timothy Grance and Karen A. Scarfone. 2010. Sp 800-122. guide to protecting the confidentiality of personally identifiable information (pii). (2010).","DOI":"10.6028\/NIST.SP.800-122"},{"key":"e_1_3_2_1_22_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). 11","author":"Mondal Mainack","year":"2014"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Kyle B. Murray and Gerald H\u00e4ubl. 2010. Freedom of choice ease of use and the formation of interface preferences. (2010).  Kyle B. Murray and Gerald H\u00e4ubl. 2010. Freedom of choice ease of use and the formation of interface preferences. (2010).","DOI":"10.2139\/ssrn.1698204"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDP7378"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979022"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"key":"e_1_3_2_1_27_1","unstructured":"Cooper Smith. 2013. Facebook users are uploading 350 million new photos each day. Business insider 18 (2013).  Cooper Smith. 2013. Facebook users are uploading 350 million new photos each day. Business insider 18 (2013)."},{"key":"e_1_3_2_1_28_1","unstructured":"Craig Smith. 2016. By the Numbers: 200+ Amazing Facebook Statistics. (2016).  Craig Smith. 2016. By the Numbers: 200+ Amazing Facebook Statistics. (2016)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, InteractionVolume 1. British Computer Society, 111--119","author":"Strater K."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"K. Thomas C. Grier and D. Nicol. 2010. unFriendly: Multi-party Privacy Risks in Social Networks. In Privacy Enhancing Technologies. Springer 236--252.   K. Thomas C. Grier and D. Nicol. 2010. unFriendly: Multi-party Privacy Risks in Social Networks. In Privacy Enhancing Technologies. Springer 236--252.","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2010.13"},{"key":"e_1_3_2_1_34_1","volume-title":"The First International Workshop on The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security (CV-COPS","author":"Yifang Li","year":"2017"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting","volume":"61","author":"Yifang Li","year":"2017"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 6th International Conference on Collaborative Computing (CollaborateCom).","author":"Zhu Y."}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","location":"Indianapolis Indiana USA","acronym":"SACMAT'17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078875","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078875","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":36,"alternative-id":["10.1145\/3078861.3078875","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078875","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}