{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:21:38Z","timestamp":1762867298497,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T00:00:00Z","timestamp":1501459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,31]]},"DOI":"10.1145\/3110025.3110073","type":"proceedings-article","created":{"date-parts":[[2017,11,14]],"date-time":"2017-11-14T14:40:22Z","timestamp":1510670422000},"page":"421-426","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["REACT"],"prefix":"10.1145","author":[{"given":"Gaurav","family":"Misra","sequence":"first","affiliation":[{"name":"Security Lancaster Research Center, Lancaster University, Lancaster, United Kingdom"}]},{"given":"Jose M.","family":"Such","sequence":"additional","affiliation":[{"name":"Department of Informatics, King's College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,7,31]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum H.","year":"2004","unstructured":"H. Nissenbaum, \"Privacy as contextual integrity,\" Washington Law Review, vol. 79, p. 119, 2004.","journal-title":"Washington Law Review"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1007\/s10676-010-9224-8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/2335356.2335369"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2207676.2208552"},{"unstructured":"P. Wisniewski B. P. Knijnenburg and H. Richter Lipford \"Profiling facebook users privacy behaviors \" in SOUPS2014 Workshop on Privacy Personas and Segmentation 2014.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/2335356.2335374"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/MC.2016.83"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1772690.1772727"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/TDSC.2013.34"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2207676.2207680"},{"key":"e_1_3_2_1_11_1","first-page":"548","article-title":"Learning to discover social circles in ego networks","volume":"272","author":"McAuley J. J.","year":"2012","unstructured":"J. J. McAuley and J. Leskovec, \"Learning to discover social circles in ego networks.\" in NIPS, vol. 272, 2012, pp. 548--556.","journal-title":"NIPS"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/1995966.1996000"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_3_2_1_14_1","first-page":"49","article-title":"Non-sharing communities? an empirical study of community detection for access control decisions,\" in IEEE\/ACM ASONAM, 2016","author":"Misra G.","year":"2016","unstructured":"G. Misra, J. M. Such, and H. Balogun, \"Non-sharing communities? an empirical study of community detection for access control decisions,\" in IEEE\/ACM ASONAM, 2016. IEEE, 2016, pp. 49--56.","journal-title":"IEEE"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1518701.1518736"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Bff: A tool for eliciting tie strength and user communities in social networking services","author":"Fogu\u00e9s R. L.","year":"2013","unstructured":"R. L. Fogu\u00e9s, J. M. Such, A. Espinosa, and A. Garcia-Fornes, \"Bff: A tool for eliciting tie strength and user communities in social networking services,\" Information Systems Frontiers, pp. 1--13, 2013.","journal-title":"Information Systems Frontiers"},{"key":"e_1_3_2_1_17_1","first-page":"868","article-title":"Improve: Identifying minimal profile vectors for similarity based access control","author":"Misra G.","year":"2016","unstructured":"G. Misra, J. M. Such, and H. Balogun, \"Improve: Identifying minimal profile vectors for similarity based access control,\" in IEEE TrustCom. IEEE, 2016, pp. 868--875.","journal-title":"IEEE TrustCom. IEEE"},{"key":"e_1_3_2_1_18_1","first-page":"9","volume-title":"Providing access control to online photo albums based on tags and linked data.\" in AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0","author":"Yeung A.","year":"2009","unstructured":"C.-m. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, \"Providing access control to online photo albums based on tags and linked data.\" in AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0, 2009, pp. 9--14."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1103\/PhysRevLett.94.160202"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2897053.2897063"},{"key":"e_1_3_2_1_21_1","volume-title":"The class imbalance problem: A systematic study,\" Intelligent data analysis","author":"Japkowicz N.","year":"2002","unstructured":"N. Japkowicz and S. Stephen, \"The class imbalance problem: A systematic study,\" Intelligent data analysis, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1837110.1837122"},{"doi-asserted-by":"publisher","unstructured":"G. Danezis \"Inferring privacy policies for social networking services \" in Proc of the 2nd ACM workshop on Security and artificial intelligence 2009. 10.1145\/1654988.1654991","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1654988.1654991"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1016\/j.cose.2013.07.007"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1177\/1461444810365313"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/PerComW.2012.6197509"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/TKDE.2016.2539165"}],"event":{"sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"acronym":"ASONAM '17","name":"ASONAM '17: Advances in Social Networks Analysis and Mining 2017","location":"Sydney Australia"},"container-title":["Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3110025.3110073","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3110025.3110073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:42Z","timestamp":1750212822000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3110025.3110073"}},"subtitle":["REcommending Access Control decisions To social media users"],"short-title":[],"issued":{"date-parts":[[2017,7,31]]},"references-count":27,"alternative-id":["10.1145\/3110025.3110073","10.1145\/3110025"],"URL":"https:\/\/doi.org\/10.1145\/3110025.3110073","relation":{},"subject":[],"published":{"date-parts":[[2017,7,31]]},"assertion":[{"value":"2017-07-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}