{"id":"https://openalex.org/W2947729197","doi":"https://doi.org/10.1145/3322431.3325103","title":"FriendGuard","display_name":"FriendGuard","publication_year":2019,"publication_date":"2019-05-28","ids":{"openalex":"https://openalex.org/W2947729197","doi":"https://doi.org/10.1145/3322431.3325103","mag":"2947729197"},"language":"en","primary_location":{"id":"doi:10.1145/3322431.3325103","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3322431.3325103","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3325103","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3325103","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029215838","display_name":"Joshua Morris","orcid":"https://orcid.org/0000-0001-8186-3294"},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Joshua Morris","raw_affiliation_strings":["University of Missouri, Columbia, MO, USA"],"affiliations":[{"raw_affiliation_string":"University of Missouri, Columbia, MO, USA","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101655052","display_name":"Dan Lin","orcid":"https://orcid.org/0000-0002-3062-8240"},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan Lin","raw_affiliation_strings":["University of Missouri, Columbia, MO, USA"],"affiliations":[{"raw_affiliation_string":"University of Missouri, Columbia, MO, USA","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062519505","display_name":"Anna Squicciarini","orcid":"https://orcid.org/0000-0002-7396-1895"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anna Squicciarini","raw_affiliation_strings":["Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029215838"],"corresponding_institution_ids":["https://openalex.org/I76835614"],"apc_list":null,"apc_paid":null,"fwci":0.7032,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.77808593,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.722618579864502},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6047071814537048},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6032552719116211},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5922431349754333},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.5892067551612854},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.53575599193573},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.5238142609596252},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46873268485069275},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.45196375250816345},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4416278600692749},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4162035584449768},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40589988231658936},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.22213605046272278}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.722618579864502},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6047071814537048},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6032552719116211},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5922431349754333},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.5892067551612854},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.53575599193573},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.5238142609596252},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46873268485069275},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.45196375250816345},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4416278600692749},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4162035584449768},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40589988231658936},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.22213605046272278},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3322431.3325103","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3322431.3325103","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3325103","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3322431.3325103","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3322431.3325103","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3325103","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.699999988079071}],"awards":[{"id":"https://openalex.org/G3327296051","display_name":"MASTER: Missouri Advanced Security Training, Educa","funder_award_id":"1914771","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G519588052","display_name":null,"funder_award_id":"DGE-1914771","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7914255127","display_name":null,"funder_award_id":"1453080","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2947729197.pdf","grobid_xml":"https://content.openalex.org/works/W2947729197.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1991976249","https://openalex.org/W1995283549","https://openalex.org/W2028328360","https://openalex.org/W2032005881","https://openalex.org/W2043338008","https://openalex.org/W2054069728","https://openalex.org/W2141496695","https://openalex.org/W2141896947","https://openalex.org/W2155461593","https://openalex.org/W2310978746","https://openalex.org/W2332566694","https://openalex.org/W2469927444","https://openalex.org/W2516944983","https://openalex.org/W2585835859","https://openalex.org/W2783466287","https://openalex.org/W2786119224","https://openalex.org/W2899188089"],"related_works":["https://openalex.org/W2140798747","https://openalex.org/W2948169060","https://openalex.org/W2787993192","https://openalex.org/W2730112582","https://openalex.org/W2110696645","https://openalex.org/W2158269427","https://openalex.org/W2358580169","https://openalex.org/W4381280689","https://openalex.org/W2847365777","https://openalex.org/W2143186832"],"abstract_inverted_index":{"With":[0],"the":[1,44,77,88,129,167,183,202,216],"prevalence":[2],"of":[3,10,27,68,104,112,131,144,158,162,185,194,204],"online":[4,15],"social":[5,102,189],"networking,":[6],"a":[7,48,65,99,105,113,120,139,173,186],"large":[8],"amount":[9],"studies":[11],"have":[12,208],"focused":[13,22],"on":[14,23],"users'":[16],"privacy.":[17],"Existing":[18],"work":[19],"has":[20,39],"heavily":[21],"preventing":[24],"unauthorized":[25],"access":[26],"one's":[28,69],"personal":[29],"information":[30,111],"(e.g.":[31],"locations,":[32],"posts":[33],"and":[34,215,221],"photos).":[35],"Very":[36],"little":[37],"research":[38],"been":[40],"devoted":[41],"into":[42],"protecting":[43],"friend":[45,56,60,70,122,132,205],"search":[46,61,123,151,180],"engine,":[47,124],"service":[49],"that":[50,155,191],"allows":[51,142],"people":[52],"to":[53,79,97,147],"explore":[54],"others'":[55],"lists.":[57],"Although":[58],"most":[59],"engines":[62],"only":[63,141],"disclose":[64],"partial":[66],"view":[67],"list":[71],"(e.g.,":[72],"k":[73,143],"friends)":[74],"or":[75,82],"offer":[76],"ability":[78],"show":[80],"all":[81],"no":[83],"friends,":[84],"attackers":[85],"may":[86],"leverage":[87],"combined":[89],"knowledge":[90],"from":[91,94],"views":[92],"obtained":[93],"different":[95],"queries":[96],"gain":[98],"much":[100],"larger":[101],"network":[103,190],"targeted":[106],"victim,":[107],"potentially":[108],"revealing":[109],"sensitive":[110],"victim.":[114],"In":[115],"this":[116,163],"paper,":[117],"we":[118],"propose":[119],"new":[121],"namely":[125],"FriendGuard,":[126],"which":[127],"guarantees":[128],"degree":[130,203],"exposure":[133],"as":[134,198,200],"set":[135],"by":[136],"users.":[137],"If":[138],"user":[140,164],"his/her":[145],"friends":[146,161,170],"be":[148,172],"disclosed,":[149],"our":[150,179,224],"engine":[152,181],"will":[153,171],"ensure":[154],"any":[156],"attempts":[157],"discovering":[159],"more":[160],"through":[165],"querying":[166],"user's":[168],"other":[169],"failure.":[174],"The":[175],"key":[176],"idea":[177],"underlying":[178],"is":[182,192],"construction":[184],"unique":[187],"sub":[188],"capable":[193],"satisfying":[195],"query":[196],"needs":[197],"well":[199],"controlling":[201],"exposure.":[206],"We":[207],"carried":[209],"out":[210],"an":[211],"extensive":[212],"experimental":[213],"study":[214],"results":[217],"demonstrate":[218],"both":[219],"efficiency":[220],"effectiveness":[222],"in":[223],"approach.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2019-06-07T00:00:00"}
