{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:33:05Z","timestamp":1770978785702,"version":"3.50.1"},"reference-count":174,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T00:00:00Z","timestamp":1571184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001711","name":"Swiss National Science Foundation","doi-asserted-by":"crossref","award":["200021_178978"],"award-info":[{"award-number":["200021_178978"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,11,30]]},"abstract":"<jats:p>The privacy of individuals does not only depend on their own actions and data but may also be affected by the privacy decisions and by the data shared by other individuals. This interdependence is an essential aspect of privacy and ignoring it can lead to serious privacy violations. In this survey, we summarize and analyze research on interdependent privacy risks and on the associated (cooperative and non-cooperative) solutions. We also demonstrate that interdependent privacy has been studied in isolation in different research communities. By doing so, we systematize knowledge on interdependent privacy research and provide insights on how this research should be conducted and which challenges it should address.<\/jats:p>","DOI":"10.1145\/3360498","type":"journal-article","created":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T18:55:35Z","timestamp":1571252135000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["A Survey on Interdependent Privacy"],"prefix":"10.1145","volume":"52","author":[{"given":"Mathias","family":"Humbert","sequence":"first","affiliation":[{"name":"Cyber-Defence Campus, armasuisse Science and Technology, Switzerland"}]},{"given":"Benjamin","family":"Trubert","sequence":"additional","affiliation":[{"name":"University of Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7147-1828","authenticated-orcid":false,"given":"K\u00e9vin","family":"Huguenin","sequence":"additional","affiliation":[{"name":"University of Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,10,16]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Facebook: Where Your Friends Are Your Worst Enemies.","author":"Storm Packet","year":"2013"},{"key":"e_1_2_1_2_1","volume-title":"How an online DNA service revealed the suspected golden state killer. Time","author":"Abrams Abigail","year":"2018"},{"key":"e_1_2_1_3_1","volume-title":"Fong","author":"Acquisti Alessandro","year":"2012"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906412"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.57"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.111"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Hadar Aviram. 2012. What would you do? Conducting web-based factorial vignette surveys. In Handbook of Survey Methodology for the Social Sciences Lior Gideon (Ed.). DOI:https:\/\/doi.org\/10.1007\/978-1-4614-3876-2_26  Hadar Aviram. 2012. What would you do? Conducting web-based factorial vignette surveys. In Handbook of Survey Methodology for the Social Sciences Lior Gideon (Ed.). DOI:https:\/\/doi.org\/10.1007\/978-1-4614-3876-2_26","DOI":"10.1007\/978-1-4614-3876-2_26"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681052"},{"key":"e_1_2_1_9_1","first-page":"1405","article-title":"Simulating the large-scale erosion of genomic privacy over time","volume":"2015","author":"Backes Michael","year":"2018","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinfo."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133972"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2014.6815277"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the Web 2.0 Security and Privacy Workshop (W2SP\u201909)","author":"Becker Justin Lee","year":"2009"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the EuroS8P. DOI:https:\/\/doi.org\/10","author":"Berrang P.","year":"2018"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_29"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517842"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","volume-title":"Individual and Group Privacy","author":"Bloustein Edward J.","DOI":"10.4324\/9781351319966"},{"key":"e_1_2_1_19_1","unstructured":"Violet Blue. 2013a. Anger Mounts after Facebook\u2019s \u2019shadow Profiles\u2019 Leak in Bug. Retrieved from https:\/\/www.zdnet.com\/article\/anger-mounts-after-facebooks-shadow-profiles-leak-in-bug\/.  Violet Blue. 2013a. Anger Mounts after Facebook\u2019s \u2019shadow Profiles\u2019 Leak in Bug. Retrieved from https:\/\/www.zdnet.com\/article\/anger-mounts-after-facebooks-shadow-profiles-leak-in-bug\/."},{"key":"e_1_2_1_20_1","volume-title":"Firm: Facebook\u2019s Shadow Profiles Are \u201cfrightening","author":"Blue Violet","year":"2013"},{"key":"e_1_2_1_21_1","volume-title":"Networked privacy. Surveil. Soc. 10, 3\/4","author":"Boyd Danah","year":"2012"},{"key":"e_1_2_1_22_1","volume-title":"Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. Guardian","author":"Cadwalladr Carole","year":"2018"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247109"},{"key":"e_1_2_1_24_1","article-title":"Information privacy concern about peer disclosure in online social networks","volume":"62","author":"Chen Jin","year":"2015","journal-title":"IEEE Trans. Engineer. Manage."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0344-8"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819996"},{"key":"e_1_2_1_27_1","volume-title":"Kim","author":"Choi Ben C. F.","year":"2015"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the ICIS.","author":"Choi Chun Fung","year":"2013"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.29297\/orbit.v1i2.38"},{"key":"e_1_2_1_30_1","volume-title":"Multipart pricing of public goods. Public Choice 11, 1","author":"Clarke Edward H.","year":"1971"},{"key":"e_1_2_1_31_1","volume-title":"Proc. Natl. Acad. Sci. 107","author":"Crandall D. J.","year":"2010"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06811-4_16"},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Emiliano De Cristofaro. 2013. An exploratory ethnographic study of issues and concerns with whole genome sequencing. arXiv:1306.4962. DOI:https:\/\/doi.org\/10.14722\/usec.2014.23020 arxiv:cs q-bio\/1306.4962  Emiliano De Cristofaro. 2013. An exploratory ethnographic study of issues and concerns with whole genome sequencing. arXiv:1306.4962. DOI:https:\/\/doi.org\/10.14722\/usec.2014.23020 arxiv:cs q-bio\/1306.4962","DOI":"10.14722\/usec.2014.23020"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"e_1_2_1_35_1","volume-title":"Ross","author":"Dey Ratan","year":"2013"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195711"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2017.2709740"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0900282106"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_2_1_41_1","volume-title":"Open data, data protection, and group privacy. Philos. Technol. 27, 1","author":"Floridi Luciano","year":"2014"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038920"},{"key":"e_1_2_1_43_1","volume-title":"Singh","author":"Fogues Ricard L.","year":"2017"},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the ACySe.","author":"Fogues Ricard L.","year":"2015"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2321570"},{"key":"e_1_2_1_47_1","volume-title":"Structural equation modeling and regression: Guidelines for research practice. Commun. Assoc. Info. Syst. 4, 1","author":"Gefen David","year":"2000"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06749-0_11"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the USENIX Security.","author":"Gong Neil Zhenqiang","year":"2016"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594455"},{"key":"e_1_2_1_51_1","volume-title":"CooPeD: Co-owned personal data management. Comput. Secur. 47","author":"Gonz\u00e1lez-Manzano Lorena","year":"2014"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.30"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020489"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2630421"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2646584.2646590"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029837"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_14"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462113"},{"key":"e_1_2_1_60_1","unstructured":"Benjamin Mako Hill. 2014. Google Has Most of My Email Because It Has All of Yours. Retrieved from https:\/\/mako.cc\/copyrighteous\/google-has-most-of-my-email-because-it-has-all-of-yours.  Benjamin Mako Hill. 2014. Google Has Most of My Email Because It Has All of Yours. Retrieved from https:\/\/mako.cc\/copyrighteous\/google-has-most-of-my-email-because-it-has-all-of-yours."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22348-8_5"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076747"},{"key":"e_1_2_1_63_1","article-title":"Multiparty access control for online social networks: Model and mechanisms","volume":"25","author":"Hu Hongxin","year":"2013","journal-title":"IEEE Trans. Knowl. Data Engineer."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613097"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516707"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_24"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035538"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_38"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029834"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_2_1_72_1","volume-title":"Mistree","author":"Jernigan Carter","year":"2009"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858415"},{"key":"e_1_2_1_74_1","article-title":"Measuring individuals\u2019 concerns over collective privacy on social networking sites. Cyberpsychol","volume":"10","author":"Jia Haiyan","year":"2016","journal-title":"J. Psychosoc. Res. Cyberspace"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052695"},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the ICWSM.","author":"Jurgens David","year":"2013"},{"key":"e_1_2_1_77_1","volume-title":"A utility maximizing and privacy preserving approach for protecting kinship in genomic databases. Bioinformatics 34, 2","author":"Kale Gulce","year":"2018"},{"key":"e_1_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Bernadette Kamleitner and Vince Mitchell. 2019. Your data is my data: A framework for addressing interdependent privacy infringements. J. Public Policy Market. (2019). DOI:https:\/\/doi.org\/10.1177\/0743915619858924  Bernadette Kamleitner and Vince Mitchell. 2019. Your data is my data: A framework for addressing interdependent privacy infringements. J. Public Policy Market. (2019). DOI:https:\/\/doi.org\/10.1177\/0743915619858924","DOI":"10.1177\/0743915619858924"},{"key":"e_1_2_1_79_1","volume-title":"Proceedings of the PrAISe. DOI:https:\/\/doi.org\/10","author":"Kek\u00fcll\u00fco\u011flu Dilara","year":"2016"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989345"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2514689"},{"key":"e_1_2_1_82_1","volume-title":"Ward","author":"Klug William S.","year":"2003"},{"key":"e_1_2_1_83_1","volume-title":"Probabilistic Graphical Models: Principles and Techniques","author":"Koller Daphne"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197511"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_2_1_86_1","volume-title":"A survey of interdependent information security games. Comput. Surveys 47, 2","author":"Laszka Aron","year":"2014"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301352"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3058060.3058081"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134702"},{"key":"e_1_2_1_90_1","volume-title":"Wong","author":"Liang Kaitai","year":"2015"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526899"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23279"},{"key":"e_1_2_1_93_1","volume-title":"Proceedings of the ICDE. DOI:https:\/\/doi.org\/10","author":"Machanavajjhala A.","year":"2006"},{"key":"e_1_2_1_94_1","volume-title":"Robust relationship inference in genome-wide association studies. Bioinformatics 26, 22","author":"Manichaikul Ani","year":"2010"},{"key":"e_1_2_1_95_1","volume-title":"Game theory meets network security and privacy. Comput. Surveys 45, 3","author":"Manshaei Mohammad Hossein","year":"2013"},{"key":"e_1_2_1_96_1","volume-title":"Marwick and Danah Boyd","author":"Alice","year":"2014"},{"key":"e_1_2_1_97_1","article-title":"Birds of a feather: Homophily in social networks. Annu","volume":"27","author":"McPherson Miller","year":"2001","journal-title":"Rev. Sociol."},{"key":"e_1_2_1_98_1","volume-title":"Fong","author":"Mehregan Pooya","year":"2016"},{"key":"e_1_2_1_99_1","volume-title":"Fong","author":"Mehregan Pooya","year":"2014"},{"key":"e_1_2_1_100_1","volume-title":"Stefan Schmid, and Roger Wattenhofer.","author":"Meier Dominic","year":"2014"},{"key":"e_1_2_1_101_1","volume-title":"Vanstone","author":"Menezes Alfred J.","year":"1997"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_2_1_103_1","volume-title":"Such","author":"Misra Gaurav","year":"2017"},{"key":"e_1_2_1_104_1","volume-title":"Such","author":"Misra Gaurav","year":"2017"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23046"},{"key":"e_1_2_1_106_1","volume-title":"DNA and family trees to crack five more cold cases. The New York Times","author":"Murphy Heather","year":"2018"},{"key":"e_1_2_1_107_1","volume-title":"Game Theory: Analysis of Conflict (6th print ed.)","author":"Myerson Roger B.","year":"2004"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102135"},{"key":"e_1_2_1_109_1","doi-asserted-by":"crossref","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum Helen Fay","DOI":"10.1515\/9780804772891"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23002"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_10"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2561281"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0017"},{"key":"e_1_2_1_114_1","article-title":"Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study","volume":"26","author":"Ozdemir Zafer D.","year":"2017","journal-title":"Eur. J. Info. Syst."},{"key":"e_1_2_1_115_1","volume-title":"Survey on access control for community-centered collaborative systems. Comput. Surveys 51, 1","author":"Paci Federica","year":"2018"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_2_1_117_1","volume-title":"Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management. IET Info. Secur. 10, 2","author":"Palomar Esther","year":"2016"},{"key":"e_1_2_1_118_1","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"Pearl Judea"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185354.2185358"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-2589.2010.00052.x"},{"key":"e_1_2_1_121_1","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"Petronio Sandra Sporbert"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12601-2_14"},{"key":"e_1_2_1_123_1","volume-title":"Proceedings of the ICIS.","author":"Pu Yu","year":"2015"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0005"},{"key":"e_1_2_1_125_1","volume-title":"Proceedings of the SOUPS.","author":"Pu Yu","year":"2017"},{"key":"e_1_2_1_126_1","unstructured":"Andrew Quodling. 2018. Shadow Profiles\u2014Facebook Knows about You Even If You\u2019re Not on Facebook. Retrieved from http:\/\/theconversation.com\/shadow-profiles-facebook-knows-about-you-even-if-youre-not-on-facebook-94804.  Andrew Quodling. 2018. Shadow Profiles\u2014Facebook Knows about You Even If You\u2019re Not on Facebook. Retrieved from http:\/\/theconversation.com\/shadow-profiles-facebook-knows-about-you-even-if-youre-not-on-facebook-94804."},{"key":"e_1_2_1_127_1","unstructured":"Laura Radaelli Piotr Sapiezynski Florimond Houssiau Erez Shmueli and Yves-Alexandre de Montjoye. 2018. Quantifying surveillance in the networked age: Node-based intrusions and group privacy. arXiv:1803.09007. arxiv:cs\/1803.09007  Laura Radaelli Piotr Sapiezynski Florimond Houssiau Erez Shmueli and Yves-Alexandre de Montjoye. 2018. Quantifying surveillance in the networked age: Node-based intrusions and group privacy. arXiv:1803.09007. arxiv:cs\/1803.09007"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2016.14"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_38"},{"key":"e_1_2_1_130_1","volume-title":"creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday 15, 1","author":"Raynes-Goldie Kate","year":"2010"},{"key":"e_1_2_1_131_1","volume-title":"Proceedings of the EC. DOI:https:\/\/doi.org\/10","author":"Redmiles Elissa M.","year":"1916"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484702.2484706"},{"key":"e_1_2_1_133_1","volume-title":"Bigham","author":"Sadilek Adam","year":"2012"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_2_1_135_1","volume-title":"Genomic privacy and limits of individual detection in a pool. Nature Genet. 41, 9","author":"Sankararaman Sriram","year":"2009"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660470"},{"key":"e_1_2_1_137_1","volume-title":"How to share a secret. Commun. ACM 22, 11","author":"Shamir Adi","year":"1979"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0004"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2015.09.010"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064025"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0193-7"},{"key":"e_1_2_1_143_1","first-page":"531","article-title":"CoPE: Enabling collaborative privacy management in online social networks","volume":"62","author":"Squicciarini Anna C.","year":"2011","journal-title":"J. Amer. Soc. Info. Sci. Technol."},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456407"},{"key":"e_1_2_1_145_1","volume-title":"Such and Natalia Criado","author":"Jose","year":"2014"},{"key":"e_1_2_1_146_1","article-title":"Resolving multi-party privacy conflicts in social media","volume":"28","author":"Such Jose M.","year":"2016","journal-title":"IEEE Trans. Knowl. Data Engineer."},{"key":"e_1_2_1_147_1","volume-title":"Such and Natalia Criado","author":"Jose","year":"2018"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025668"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821512"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.2202\/1935-1704.1319"},{"key":"e_1_2_1_151_1","article-title":"K-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney Latanya","year":"2002","journal-title":"Int. J. Uncert., Fuzz. Knowl.-Based Syst."},{"key":"e_1_2_1_152_1","volume-title":"Collateral damage of Facebook third-party applications: A comprehensive study. Comput. Secur. 77","author":"Symeonidis Iraklis","year":"2018"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_14"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005806705360541"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"e_1_2_1_156_1","volume-title":"Estimating kinship in admixed populations. Amer. J. Hum. Genet. 91","author":"Thornton Timothy","year":"2012"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685553.2685554"},{"key":"e_1_2_1_158_1","volume-title":"Theory of Games and Economic Behavior (60th anniversary ed.)","author":"Neumann John Von"},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_7"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2309953"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076444.2076448"},{"key":"e_1_2_1_163_1","volume-title":"Pedro Giovanni Leon, and Lorrie Faith Cranor","author":"Wang Yang","year":"2011"},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2018.2854785"},{"key":"e_1_2_1_165_1","unstructured":"Alan F. Westin. 1970. Privacy and Freedom. Ig Publishing New York NY.  Alan F. Westin. 1970. Privacy and Freedom. Ig Publishing New York NY."},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2010.13"},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443795"},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2747643"},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205981"},{"key":"e_1_2_1_171_1","volume-title":"Proceedings of the ICWSM.","author":"Zamal Faiyaz Al","year":"2012"},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3269329"},{"key":"e_1_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685287"},{"key":"e_1_2_1_175_1","article-title":"Correlated differential privacy: Hiding information in non-IID data set","volume":"10","author":"Zhu Tianqing","year":"2015","journal-title":"IEEE Trans. Info. Forens. Secur."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360498","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:22:58Z","timestamp":1750202578000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360498"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,16]]},"references-count":174,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,11,30]]}},"alternative-id":["10.1145\/3360498"],"URL":"https:\/\/doi.org\/10.1145\/3360498","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,16]]},"assertion":[{"value":"2019-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}