Bibliography for Privacy and Online Social Networks (COMS E6998-004)

[KR01] Balachander Krishnamurthy and Jennifer Rexford. Web Protocols and Practice: HTTP/1.1, Networking Protocols, Caching, and Traffic Measurement. Addison-Wesley, May 2001. ISBN 0-201-710889-0.
[MM12] Jonathan R. Mayer and John C. Mitchell. Third-party web tracking: Policy and technology. In Proceedings of IEEE Symposium on Security and Privacy, May 2012. https://stanford.edu/~jmayer/papers/trackingsurvey12.pdf.
[BKMP12] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In Proceedings of IEEE Symposium on Security and Privacy, May 2012. http://www.lbs.cs.uni-saarland.de/publications/obliviad.pdf.
[Swe02] Latanya Sweeney. k-anonymity: a model for protecting privacy. International Journal of Uncertain. Fuzziness and Knowledge-Based Systems, 10(5):557-570, 2002.
[CSTW12] Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, and Andrew Williams. Hummingbird: Privacy at the time of Twitter. In Proceedings of IEEE Symposium on Security and Privacy, May 2012.
[Mar10] Marco Balduzzi, et al. Abusing social networks for automated user profiling. In RAID, 2010. http://www.iseclab.org/papers/raid2010.pdf.
[GPS09] Joshua Gomez, Travis Pinnick, and Ashkan Soltani. Knowprivacy: The current state of web privacy, data collection and information sharing, June 2009. http://knowprivacy.org/report/KnowPrivacy_Final_Report.pdf.
[KW06] Balachander Krishnamurthy and Craig E. Wills. Generating a privacy footprint on the Internet. In Proceedings of IMC, October 2006. http://www.research.att.com/~bala/papers/pfp-imc06.pdf.
[KW09b] Balachander Krishnamurthy and Craig E. Wills. Privacy diffusion on the web: A longitudinal perspective. In WWW, 2009. http://www.research.att.com/~bala/papers/www09.pdf.
[RKW12] Franziska Roesner, Tadayoshi Kohno, and David Wetherall. Detecting and defending against third-party tracking on the web. In Symposium on Networked Systems Design and Implementation, April 2012. http://www.franziroesner.com/pdf/webtracking-NSDI2012.pdf.
[Roo10] Arnold Roosendaal. Facebook tracks and traces everyone: Like this! Technical report, Tilburg Law School, November 2010. Legal Studies Research Paper Series No. 03/2011. http://ssrn.com/abstract=1717563.
[GCF10] Saikat Guha, Bin Cheng, and Paul Francis. Challenges in measuring online advertising systems. In Proceedings of IMC, November 2010. http://research.microsoft.com/en-us/um/people/saikat/pub/imc10-ads.pdf.
[WXG11] Na Wang, Heng Xu, and Jens Grossklags. Third-party apps on Facebook: Privacy and the illusion of control. In Proceedings of the ACM Symposium on Computer Human Interaction for Management of Information Technology, December 2011. http://faculty.ist.psu.edu/xu/papers/conference/Wang_chimit_2011.pdf.
[KW09a] B. Krishnamurthy and C. Wills. On the leakage of personally identifiable information via online social networks. In Proceedings of the Workshop on Online Social Networks, August 2009. http://www.research.att.com/~bala/papers/wosn09.pdf.
[KNW11] B. Krishnamurthy, K. Naryshkin, and C. Wills. Privacy leakage vs. protection measures: the growing disconnect. In Web 2.0 Workshop on Security and Privacy, May 2011. http://www.research.att.com/~bala/papers/w2sp11.pdf.
[KW10] Balachander Krishnamurthy and Craig E. Wills. Privacy leakage in mobile online social networks. In Proceedings of the Workshop on Online Social Networks, June 2010. http://www.research.att.com/~bala/papers/pmob.pdf.
[EGC+10b] William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, Vancouver, BC Canada, October 2010. http://static.usenix.org/event/osdi10/tech/full_papers/Enck.pdf.
[WCG+11] David Wetherall, David Choffnes, B. Greenstein, Seungyeop Han, Peter Hornyack, Jaeyeon Jung, Stuart Schechter, and Xiao Wang. Privacy revelations for web and mobile apps. In Proceedings of HotOS, May 2011. http://appanalysis.org/jjung/jaeyeon-pub/hotos2011-revelations.pdf.
[HHJ+11] P Hornyack, S Han, J Jung, S Schechter, and D Wetherall. These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In In Proc. of ACM CCS, October 2011.
[JJLS10] Dongseok Jang, Ranjit Jhala, Sorin Lerner, and Hovav Shacham. An emperical study of privacy-violating information flows in JavaScript web applications. In In Proc. of ACM CCS, October 2010. http://cseweb.ucsd.edu/~hovav/dist/history.pdf.
[PDS11] Sai Teja Peddinti, Avis Dsouza, and Nitesh Saxena. Cover locations: Availing location-based services without revealing the location. In ACM Workshop on Privacy in the Electronic Society (WPES), October 2011. http://www.cis.uab.edu/saxena/docs/ps-wpes11.pdf.
[FNH10] Julien Freudiger, Raoul Neu, and Jean-Pierre Hubaux. Private sharing of user location over online social networks. In Hot Topics in Privacy Enhancing Technologies, July 2010. http://petsymposium.org/2010/papers/hotpets10-Freudiger.pdf.
[MVGD10] Alan Mislove, Bimal Viswanath, Krishna P. Gummadi, and Peter Druschel. You are who you know: Inferring user profiles in online social networks. In International Conference of Web Search and Data Mining (WSDM), February 2010. http://www.ccs.neu.edu/home/amislove/publications/Inferring-WSDM.pdf.
[CCP10] Claude Castelluccia, Emiliano De Cristofaro, and Daniele Perito. Private information disclosure from web searches (or how to reconstruct users' search histories). In Privacy Enhancing Technologies Symposium, July 2010.
[NS08] A. Narayanan and V. Shmatikov. Robust de-anonymization of large datasets. In Proceedings of IEEE Symposium on Security and Privacy, May 2008.
[PCKM11] Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, and Pere Manils. How unique and traceable are usernames? In Privacy Enhancing Technologies Symposium, July 2011. http://planete.inrialpes.fr/~perito/papers/pets11.pdf.
[FMSW11] Gerald Friedland, Gregor Maier, Robin Sommer, and Nicholas Weaver. Sherlock Holmes' evil twin: on the impact of global inference for online privacy. In Proceedings of the New Security Paradigms Workshop, September 2011.
[MSK11] Huina Mao, Xin Shuai, and Apu Kapadia. Loose tweets: An analysis of privacy leaks on Twitter. In ACM Workshop on Privacy in the Electronic Society (WPES), October 2011. http://www.cs.indiana.edu/~kapadia/papers/loosetweets-wpes11.pdf.
[IWPL11] D. Irani, S. Webb, C. Pu, and Kang Li. Modeling unintended personal-information leakage from multiple online social networks. IEEE Internet Computing, pages 13-19, May/June 2011. http://www.cc.gatech.edu/~danesh/download/DIrani_InternetComp_2011.pdf.
[AWS+11] Mika D. Ayenson, Kietrich J. Wambach, Ashkan Soltani, Nathaniel Good, and Chris Jay Hoofnagle. Flash cookies and privacy II: Now with HTML5 and ETag respawning, July 2011. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1898390.
[MC11] A. M. McDonald and L. F. Cranor. A survey of the use of Adobe Flash Local Shared Objects to respawn HTTP cookies, January 2011. http://www.casos.cs.cmu.edu/publications/papers/CMUCyLab11001.pdf.
[SCM+09] Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, and Chris Jay Hoofnagle. Flash cookies and privacy, August 2009. http://ssrn.com/abstract=1446862.
[Eck10] Peter Eckersley. How unique is your web browser? In Privacy Enhancing Technologies, volume 6205, pages 1-18. 2010. https://panopticlick.eff.org/browser-uniqueness.pdf.
[JO10] Artur Janc and Lukasz Olejnik. Feasibility and real-world implications of web browser history detection. In Web 2.0 Workshop on Security and Privacy, May 2010. http://www.w2spconf.com/2010/papers/p26.pdf.
[LUB+11] Pedro G. Leon, Blase Ur, Rebecca Balebako, Lorrie Faith Cranor, Richard Shay, and Yang Wang. Why Johhny can't opt out? a usability evaluation of tools to limit online behavioral advertising. Technical report, CMU, 2011. http://www.cylab.cmu.edu/files/pdfs/tech_reports/CMUCyLab11017.pdf.
[Ang10] Julia Angwin. The web's new gold mine: Your secrets. Wall Street Journal, July 30, 2010. What They Know (series). http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html.
[wsj] What they know (series). http://online.wsj.com/public/page/what-they-know-digital-privacy.html.
[BGS11] A. Braunstein, L. Granka, and J. Staddon. Indirect content privacy surveys: Measuring privacy without asking about it. In Symposium on Usable Privacy and Security, 2011. http://www.alexbraunstein.com/soups2011.pdf.
[WZ11] Craig E. Wills and Mihajlo Zeljkovic. A personalized approach to web privacy-awareness, attitudes and actions. Information Management and Computer Security, 19(1):53-73, 2011. http://www.cs.wpi.edu/~cew/papers/imcs11.pdf.
[TAC] Targeted Advertising Cookie Opt-Out. http://www.abine.com/preview/taco.php.
[prib] PrivacyScore Analytics - Your Online Privacy Guide. http://privacyscore.com/.
[pria] W3C Privacy Dashboard. http://code.w3.org/privacy-dashboard.
[DNTb] Do not track. donottrack.us.
[DNT11] S. 913: Do-not-track online act of 2011, 2011. http://www.govtrack.us/congress/bill.xpd?bill=s112-913.
[AdB] Adblock plus. http://adblockplus.org/.
[ie9] Internet Explorer tracking protection. http://windows.microsoft.com/en-US/internet-explorer/privacy.
[Gho] Ghostery: Find out how Web sites are watching you. http://www.ghostery.com/.
[HN08] D. Howe and H. Nissenbaum. Trackmenot: Resisting surveillance in web search. In Ian Kerr, Carole Lucock, and Valerie Steeves, editors, On the Identity Trail: Privacy, Anonymity and Identity in a Networked Society. 2008. http://cs.nyu.edu/trackmenot/TMN-Howe-Niss08-ch23.pdf.
[nos] NoScript - JavaScript/Java/Flash blocker for a safer Firefox experience. http://noscript.net/.
[FL11] Matthew Fredrikson and Benjamin Livshits. RePriv: Re-imagining content personalization and in-browser privacy. In Proceedings of the IEEE Symposium on Security & Privacy, May 2011. http://www.ieee-security.org/TC/SP2011/PAPERS/2011/paper009.pdf.
[FDJL11] Matthew Fredrikson, Drew Davidson, Somesh Jha, and Benjamin Livshits. Towards enforcable data-driven privacy policies. In Web 2.0 Workshop on Security and Privacy, May 2011. http://www.w2spconf.com/2011/papers/dataDrivenPrivacy.pdf.
[YXY+12] Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, and Martin Abadi. Host fingerprinting and tracking on the web: Privacy and security implications. In Proceedings of the Network & Distributed System Security Symposium, February 2012. http://research.microsoft.com/pubs/156901/ndss2012.pdf.
[YLW+09] Jun Yan, Ning Liu, Gang Wang, Wen Zhang, Yun Jiang, and Zheng Chen. How much can behavioral targeting help online advertising? In In Proc. of WWW, 2009. http://www2009.eprints.org/27/1/p261.pdf.
[Acq09] A Acquisti. Nudging privacy: The behavioral economics of personal information. Security & Privacy, 2009. http://www.heinz.cmu.edu/~acquisti/papers/acquisti-privacy-nudging.pdf.
[TNB+10] V Toubiana, A Narayanan, D Boneh, H Nissenbaum, and S Barocas. Adnostic: Privacy preserving targeted advertising. Proc. NDSS, 2010. http://crypto.stanford.edu/adnostic/adnostic-ndss.pdf.
[GCF11] Saikat Guha, Bin Cheng, and Paul Francis. Privad: Practical privacy in online advertising. In Symposium on Networked Systems Design and Implementation (NSDI), March 2011. http://adresearch.mpi-sws.org/privad-system.pdf.
[GR11] Arpita Ghosh and Aaron Roth. Selling privacy at auction. In Proc. ACM EC, pages 199-208, New York, New York, USA, 2011. ACM Press. http://research.yahoo.com/files/ec053-ghosh.pdf.
[REC+11] Christopher Riederer, Vijay Erramilli, Augustin Chaintreau, Balachander Krishnamurthy, and Pablo Rodriguez. For sale: Your data, by: You. In Proceedings of the Workshop on Hot Topics in Networking, Cambridge, MA USA, November 2011. http://www.research.att.com/~bala/papers/hotnets11.pdf.
[Bur11] Interactive Advertising Bureau. Internet advertising revenues hit $7.3 billion in Q1 ’11, 2011. http://www.iab.net/about_the_iab/recent_press_releases/press_release_archive/press_release/pr-052611.
[May11a] Jonathan Mayer. Tracking the trackers: Self-help tools, September 2011. http://cyberlaw.stanford.edu/node/6730.
[May11b] Jonathan Mayer. Tracking the trackers: To catch a history thief, July 2011. http://cyberlaw.stanford.edu/node/6695.
[May11c] Jonathan Mayer. Tracking the trackers: Where everybody knows your username, October 2011. http://cyberlaw.stanford.edu/node/6740.
[Kor10] Aleksandra Korolova. Privacy violations using microtargeted ads: A case study. In Proceedings of the ICDM, December 2010. http://theory.stanford.edu/~korolova/Privacy_violations_using_microtargeted_ads.pdf.
[AEY10] Annie I. Anton, Julia B. Earp, and Jessica D. Young. How Internet users' privacy concerns have evolved since 2002. IEEE Security and Privacy, 8:21-27, 2010.
[TRU09] TRUSTe. 2009 study: Consumer attitudes about behavioral targeting, March 2009. http://www.truste.com/pdf/TRUSTe_TNS_2009_BT_Study_Summary.pdf.
[MC10b] Aleecia M. McDonald and Lorrie Faith Cranor. Beliefs and behaviors: Internet users' understanding of behavioral advertising. In Proceedings of the Conference on Communication, Information and Internet Policy, October 2010. http://aleecia.com/authors-drafts/tprc-behav-AV.pdf.
[TKH+09] Joseph Turow, Jennifer King, Chris Jay Hoofnagle, Amy Bleakley, and Michael Hennessey. Americans reject tailored advertising and three activities to enable it, September 2009. http://ssrn.com/abstract=1478214.
[JBBM06] Collin Jackson, Andrew Bortz, Dan Boneh, and John C. Mitchell. Protecting browser state from web privacy attacks. In Proceedings of the International World Wide Web Conference, Edinburgh, Scotland, May 2006. http://crypto.stanford.edu/sameorigin/sameorigin.pdf.
[Kri01] David M. Kristol. Http cookies: Standards, privacy, and politics. ACM Trans. Internet Technol., 1(2):151-198, November 2001.
[dnta] Do not track plus. http://donottrackplus.com/.
[GT11] Avi Goldfarb and Catherine E. Tucker. Privacy regulation and online advertising. Management Science, 57:57-71, January 2011. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1600259.
[TECA11] Janice Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22:254-268, 2011.
[BB09] Stefan Berthold and Rainer Böhme. Valuating privacy with option pricing theory. In In Proceedings of the Workshop on Economics of Information Security, June 2009. http://weis09.infosecon.net/files/128/paper128.pdf.
[PB11] Sören Preibusch and Joseph Bonneau. The privacy landscape: product differentiation on data collection. In The Tenth Workshop on the Economics of Information Security (WEIS), 2011. http://preibusch.de/publications/Preibusch-Bonneau__privacy-landscape.pdf.
[ftc10] Protecting consumer privacy in an era of rapid change, December 2010. Federal Trade Commission. Preliminary FTC Staff Report. http://www.ftc.gov/os/2010/12/101201privacyreport.pdf.
[ABJB10] Gaurav Aggrawal, Elie Bursztein, Collin Jackson, and Dan Boneh. An analysis of private browsing modes in modern browsers. In Proc. of 19th Usenix Security Symposium, August 2010.
[KMW07] Balachander Krishnamurthy, Delfina Malandrino, and Craig E. Wills. Measuring privacy loss and the impact of privacy protection in web browsing. In Proceedings of the Symposium on Usable Privacy and Security, pages 52-63, Pittsburgh, PA USA, July 2007.
[GB10] Seda Gürses and Bettina Berendt. The social web and privacy: Practices, reciprocity and conflict detection in social networks. In Elena Ferrari and Francesco Bonchi, editors, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques. Chapmand and Hall/CRC Press, 2010. http://www.cosic.esat.kuleuven.be/publications/article-1304.pdf.
[DG10] George Danezis and Seda Gürses. A critical review of 10 years of privacy technology. In Proceedings of Surveillance Cultures: A Global Surveillance Society?, April 2010. http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf.
[Nis11] Helen Nissenbaum. A contextual approach to privacy online. Daedalus the Journal of the American Academy of Arts & Sciences, 140(4):32-48, Fall 2011. http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf.
[TN11] Vincent Toubiana and Helen Nissenbaum. An analysis of google log retention policies. Journal of Privacy and Confidentiality, 3(1):3-26, 2011. http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf.
[BLS+12] Rebecca Balebako, Pedro Leon, Richard Shay, Blase Ur, and Lorrie Faith Cranor. Measuring the effectiveness of privacy tools for limiting behavioral advertising. In Web 2.0 Workshop on Security and Privacy, May 2012. http://www.w2spconf.com/2012/papers/w2sp12-final2.pdf.
[MC10a] Aleecia M. McDonald and Lorrie Faith Cranor. Americans' attitudes about internet behavioral advertising practices. In ACM Workshop on Privacy in the Electronic Society (WPES), October 2010. http://aleecia.com/authors-drafts/wpes-behav-AV.pdf.
[HHB10] Hamed Haddadi, Pan Hui, and Ian Brown. Mobiad: Private and scalable mobile advertising. In Proceedings of the ACM International Workshop on Mobility in the Evolving Internet Architecture, September 2010. http://haddadi.ir/pubs/mobiad2k10.pdf.
[vE11] Rob van Eijk. Web tracking detection system (tds): An effective strategy to reduce systematic monitoring and profiling of user habits across websites., August 2011. Master's thesis, international M.Sc. program ICT in Business, Leiden Institute of Advanced Computer Science (LIACS), Leiden University. http://www.blaeu.com/uploads/free_access/master_thesis_rob_van_eijk_definitieve_versie.pdf.
[JPH12] Nicola Jentzsch, Sören Preibusch, and Andreas Harasser. Study on monetising privacy. an economic model for pricing personal information, February 2012.
[PKB12] Sören Preibusch, Kat Krol, and Alastair R. Beresford. The privacy economics of voluntary over-disclosure in web forms. In The Eleventh Workshop on the Economics of Information Security (WEIS), June 2012.
[BKP12] Alastair R. Beresford, Dorothea Kübler, and Sören Preibusch. Unwillingness to pay for privacy: A field experiment. Economics Letters, 117(1):25-27, 2012. http://www.sciencedirect.com/science/article/pii/S0165176512002182. [ DOI ]
[sha] ShareMeNot. http://sharemenot.cs.wpi.edu/.
[Acq10] Alessandro Acquisti. The economics of personal data and the economics of privacy, December 2010. Organisation for Economic Co-operationg and Development. Joint WPISP-WPIE Roundtable. http://www.oecd.org/dataoecd/8/51/46968784.pdf.
[Kri10] Balachander Krishnamurthy. I know what you will do next summer. ACM SIGCOMM CCR, 40(5), 2010. http://www.research.att.com/~bala/papers/ccr10-priv.pdf.
[Kri13] Balachander Krishnamurthy. Privacy and online social networks: Can colorless green ideas sleep furiously? IEEE Security and Privacy, May-June 2013.
[Nar13] Arvind Narayanan. What happened to the crypto dream? parts 1 and 2. IEEE Security and Privacy, March-April, May-June 2013.
[EKKV11] Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. PiOS: Detecting privacy leaks in iOS applications. In NDSS, February 2011.
Keywords: iphone, privacy, security, smartphones
[GEC+13] Gill, Erramilli, Chaintreau, Krishnamurthy, Papagiannaki, and Rodriguez. Follow the money: Understanding economics of online aggregation and advertising. In Proceedings of IMC, October 2013.
[Sol07] Daniel J. Solove. "'i've got nothing to hide' and other misunderstandings of privacy". San Diego Law Review, Vol. 44, p. 745, 2007. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565.
[Rot10] Robert L. Rothman. A guide to privacy law, 2010. http://www.privassoc.com/Documents/ICLE%203rd%20Annual%20Information%20Technology%20Law%20Seminar%209-22-2010.pdf.
[WLM07] James Waldo, Herbert S. Lin, and Lynette I. Millett. Thinking about privacy. In Engaging privacy and information technology in a digital age. National Academic Press, 2007. http://www.nap.edu/openbook.php?record\_id=11896.
[MFSV] Mary Madden, Susannah Fox, Aaron Smith, and Jessica Vitak. Digital footprints. http://www.pewinternet.org/Reports/2007/Digital-Footprints/1-Summary-of-Findings.aspx.
[RKKM] Lee Rainie, Sara Kiesler, Ruogu Kang, and Mary Madden. Anonymity, privacy, and security online. http://pewinternet.org/Reports/2013/Anonymity-online.aspx.
[Gra08] Graham Cormode and Balachander Krishnamurthy. Key differences between Web 1.0 and Web 2.0. First Monday, 13(6), June 2008. http://www.research.att.com/~bala/papers/web1v2.pdf.
[WT99] Alma Whitten and J.D. Tygar. Why johnny can't encrypt: A usability case study of pgp 5.0. In 8th USENIX Security Symposium, August 1999.
[AS99] A. Adams and M. A. Sasse. Users are not the enemy: why users compromise security mechanisms and how to take remedial measures. Communications of the ACM, 42(12):40-46, 1999.
[Cha85] D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, 1985.
[Yek10] Sergey Yekhanin. Private information retrieval. Communications of the ACM, 53(4):68-73, 2010.
[RR99] M. K. Reiter and A. D Rubin. Anonymous web transactions with crowds. Communications of the ACM, 42(2):32-48, 1999.
[AG09] Alessandro Acquisti and Ralph Gross. Predicting social security numbers from public data. Proceedings of the National Academy of Science, July 2009.
[Kri09] B. Krishnamurthy. A measure of online social networks. 2009. Invited paper.
[KGA08] B. Krishnamurthy, P. Gill, and M. Arlitt. A few chirps about twitter. In Proceedings of the first workshop on Online social networks, pages 19-24. ACM, 2008.
[LWF] Nick Lane and Nicky Walton-Flynn. White paper – mobile social networking. http://www.telecoms.com/files/2009/05/buongiorno_final-fmt_nl-3110-f.pdf.
[KW08] Balachander Krishnamurthy and Craig E. Wills. Characterizing privacy in online social networks. In Proceedings of the first workshop on Online social networks, 2008.
[GBCT13] Eric Gilbert, Saeideh Bakhshi, Shuo Chang, and Loren Terveen. "i need to try this"?: A statistical overview of pinterest. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 2427-2436, 2013.
[EGC+10a] W Enck, P Gilbert, B Chun, L Cox, J Jung, P McDaniel, and A Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. https://www.usenix.org/legacy/events/osdi10/tech/full_papers/Enck.pdf, 2010.
[new59] Automatic linkage of vital records. Science, 130(3381):954-959, Oct 1959.
[lin] Record linkage and privacy: Issues in creating new federal research and statistical information. GAO-01-126SP Report April 2001. http://www.gao.gov/new.items/d01126sp.pdf.
[MKGV07] Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthu Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Transaction on Knowledge Discovery from Data (TKDD), 1(3), 2007.

This file was generated by bibtex2html 1.95.