{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T07:20:45Z","timestamp":1744183245353},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/socialcom-passat.2012.82","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T20:32:19Z","timestamp":1358454739000},"page":"526-531","source":"Crossref","is-referenced-by-count":1,"title":["Towards Social Networking: A Proof-of-Concept Model"],"prefix":"10.1109","author":[{"given":"Yasuhiro","family":"Sato","sequence":"first","affiliation":[]},{"given":"Hirona","family":"Shimokawa","sequence":"additional","affiliation":[]},{"given":"Shingo","family":"Ata","sequence":"additional","affiliation":[]},{"given":"Ikuo","family":"Oka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934900"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1592648.1592659"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019309"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.117"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187907"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242685"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0011976"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188255"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068852"}],"event":{"name":"2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)","start":{"date-parts":[[2012,9,3]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2012,9,5]]}},"container-title":["2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6403618\/6406254\/06406303.pdf?arnumber=6406303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:23:35Z","timestamp":1490142215000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6406303\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/socialcom-passat.2012.82","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}