{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:05:52Z","timestamp":1743080752672,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319147222"},{"type":"electronic","value":"9783319147239"}],"license":[{"start":{"date-parts":[[2014,12,25]],"date-time":"2014-12-25T00:00:00Z","timestamp":1419465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,25]],"date-time":"2014-12-25T00:00:00Z","timestamp":1419465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14723-9_3","type":"book-chapter","created":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T13:00:15Z","timestamp":1419426015000},"page":"35-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Ontology-Enabled Access Control and Privacy Recommendations"],"prefix":"10.1007","author":[{"given":"Marcel","family":"Heupel","sequence":"first","affiliation":[]},{"given":"Lars","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Bourimi","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Scerri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,25]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), pp. 173\u2013187. IEEE Computer Society, Oakland, 17\u201320 May 2009","key":"3_CR1","DOI":"10.1109\/SP.2009.22"},{"doi-asserted-by":"crossref","unstructured":"Bourimi, M., Heupel, M., Westermann, B., Kesdogan, D., Planaguma, M., Gimenez, R., Karatas, F., Schwarte, P.: Towards transparent anonymity for user-controlled servers supporting collaborative scenarios. In: Ninth International Conference on Information Technology: New Generations (ITNG), pp. 102\u2013108, April 2012","key":"3_CR2","DOI":"10.1109\/ITNG.2012.23"},{"unstructured":"Scerri, S., Gimenez, R., Herman, F., Bourimi, M., Thiel, S.: digital.me - towards an integrated personal information sphere. In: Federated Social Web 2011 (2011)","key":"3_CR3"},{"unstructured":"Bourimi, M., Scerri, S., Planaguma, M.: A two-level approach to ontology-based access control in pervasive personal servers. Research report (2011)","key":"3_CR4"},{"doi-asserted-by":"crossref","unstructured":"Heupel, M., Fischer, L., Bourimi, M., Kesdo\u01e7an, D., Scerri, S., Hermann, F., Gimenez, R.: Context-aware, trust-based access control for the digital.me userware. In: 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20136 (2012)","key":"3_CR5","DOI":"10.1109\/NTMS.2012.6208766"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-3-642-39265-8_5","volume-title":"Human-Computer Interaction","author":"M Heupel","year":"2013","unstructured":"Heupel, M., Bourimi, M., Kesdo\u011fan, D.: Trust and privacy in the di.me userware. In: Kurosu, M. (ed.) HCII\/HCI 2013, Part III. LNCS, vol. 8006, pp. 39\u201348. Springer, Heidelberg (2013)"},{"doi-asserted-by":"crossref","unstructured":"Heupel, M., Bourimi, M., Kesdogan, D.: The di.me trust approach for supporting collaborative scenarios. In: 1st Workshop on Security in highly connected IT systems (DEXA 2014 workshops), pp. 1\u20135. IEEE CSP, June 2014","key":"3_CR7","DOI":"10.1109\/DEXA.2014.70"},{"doi-asserted-by":"crossref","unstructured":"Thiel, S., Bourimi, M., Gim\u00e9nez, R., Scerri, S., Schuller, A., Valla, M., Wrobel, S., Fr\u00e0, C., Herman, F.: A requirements-driven approach towards decentralized social networks. In: Proceedings of the International Workshop on Social Computing, Network, and Services (2012)","key":"3_CR8","DOI":"10.1007\/978-94-007-4516-2_75"},{"doi-asserted-by":"crossref","unstructured":"Karatas, F., Bourimi, M., Barth, T., Kesdogan, D., Gimenez, R., Schwittek, W., Planaguma, M.: Towards secure and at-runtime tailorable customer-driven public cloud deployment. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 124\u2013130, March 2012","key":"3_CR9","DOI":"10.1109\/PerComW.2012.6197463"},{"doi-asserted-by":"crossref","unstructured":"Krontiris, I., Freiling, F.: Integrating people-centric sensing with social networks: a privacy research agenda. In: 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 620\u2013623, 29 March\u20132 April 2010","key":"3_CR10","DOI":"10.1109\/PERCOMW.2010.5470510"},{"unstructured":"Sacco, O., Passant, A.: A privacy preference ontology (PPO) for linked data. In: Linked Data on the Web Workshop at 20th International World Wide Web Conference. ACM Press (2011)","key":"3_CR11"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1115\/1.1480024","volume":"2","author":"SR Ray","year":"2002","unstructured":"Ray, S.R.: Interoperability standards in the semantic web. J. Comput. Inf. Sci. Eng. ASME 2, 65\u201369 (2002)","journal-title":"J. Comput. Inf. Sci. Eng. ASME"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/978-3-319-03260-3_25","volume-title":"Social Informatics","author":"K Cortis","year":"2013","unstructured":"Cortis, K., Scerri, S., Rivera, I., Handschuh, S.: An ontology-based technique for online profile resolution. In: Jatowt, A., Lim, E.-P., Ding, Y., Miura, A., Tezuka, T., Dias, G., Tanaka, K., Flanagin, A., Dai, B.T. (eds.) SocInfo 2013. LNCS, vol. 8238, pp. 284\u2013298. Springer, Heidelberg (2013)"},{"unstructured":"Monge, A., Elkan, C.: The field matching problem: algorithms and applications. In: Proceedings of Second International Conference on Knowledge Discovery and Data Mining, pp. 267\u2013270 (1996)","key":"3_CR14"},{"unstructured":"Scerri, S., Cortis, K., Rivera, I., Handschuh, S.: Knowledge discovery in distributed social web sharing activities. In: Proceedings of the 2nd Workshop on Making Sense of Microposts (MSM2012), WWW 2012 (2012)","key":"3_CR15"},{"doi-asserted-by":"crossref","unstructured":"Palen, L., Dourish, P.: Unpacking \u201cprivacy\u201d for a networked world. In: CHI \u201903: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129\u2013136. ACM Press, New York (2003)","key":"3_CR16","DOI":"10.1145\/642611.642635"},{"doi-asserted-by":"crossref","unstructured":"Bourimi, M., Ossowski, J., Abou-Tair, D.D., Berlik, S., Abu-Saymeh, D.: Towards usable client-centric privacy advisory for mobile collaborative applications based on BDDs. In: 4th International Confercence on New Technologies, Mobility and Security (NTMS) Conference, pp. 1\u20136 (2011)","key":"3_CR17","DOI":"10.1109\/NTMS.2011.5720654"},{"unstructured":"Kleek, M.V., Smith, D.A., Shadbolt, N., Schraefel, M.C.: A decentralized architecture for consolidating personal information ecosystems: the webbox. In: PIM 2012, January 2012. Event Dates: 11 Feb 2012","key":"3_CR18"},{"doi-asserted-by":"crossref","unstructured":"King, I., Lyu, M.R., Ma, H.: Introduction to social recommendation. In: Proceedings of the 19th International Conference on World Wide Web, WWW \u201910, pp. 1355\u20131356. ACM, New York (2010)","key":"3_CR19","DOI":"10.1145\/1772690.1772927"},{"doi-asserted-by":"crossref","unstructured":"Shen, E., Lieberman, H., Lam, F.: What am i gonna wear? Scenario-oriented recommendation. In: Proceedings of the 12th International Conference on Intelligent User Interfaces, IUI \u201907, pp. 365\u2013368. ACM, New York (2007)","key":"3_CR20","DOI":"10.1145\/1216295.1216368"},{"doi-asserted-by":"crossref","unstructured":"Wartena, C., Slakhorst, W., Wibbels, M.: Selecting keywords for content based recommendation. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM \u201910, pp. 1533\u20131536. ACM, New York (2010)","key":"3_CR21","DOI":"10.1145\/1871437.1871665"},{"doi-asserted-by":"crossref","unstructured":"Papangelis, A., Galatas, G., Makedon, F.: A recommender system for assistive environments. In: Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments, PETRA \u201911, pp. 6:1\u20136:4. ACM, New York (2011)","key":"3_CR22","DOI":"10.1145\/2141622.2141630"},{"unstructured":"Celino, I., Dell\u2019Aglio, D., Valle, E.D., Huang, Y., Lee, T., Park, S., Tresp, V.: Making sense of location based micro-posts using stream reasoning. In: Proceedings of the 1st Workshop on Making Sense of Microposts (#MSM2011) at ESWC, pp. 13\u201318 (2011)","key":"3_CR23"},{"unstructured":"Steiner, T., Brousseau, A., Troncy, R.: A tweet consumers\u2019 look at twitter trends. In: Proceedings of the 1st Workshop on Making Sense of Microposts (#MSM2011) at ESWC (2011)","key":"3_CR24"},{"unstructured":"Cano, A.E., Tucker, S., Ciravegna, F.: Capturing entity-based semantics emerging from personal awareness streams. In: Proceedings of the 1st Workshop on Making Sense of Microposts (#MSM2011) at ESWC, pp. 33\u201344 (2011)","key":"3_CR25"},{"unstructured":"Choudhury, S., Breslin, J.: Extracting semantic entities and events from sports tweets. In: Proceedings of the 1st Workshop on Making Sense of Microposts (#MSM2011) at ESWC, pp. 22\u201332 (2011)","key":"3_CR26"},{"doi-asserted-by":"crossref","unstructured":"Chang, J., Sun, E.: Location: How users share and respond to location-based data on social networking sites. In: Proceedings of the AAAI Conference on Weblogs and Social Media, pp. 74\u201380 (2011)","key":"3_CR27","DOI":"10.1609\/icwsm.v5i1.14141"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-22362-4_1","volume-title":"User Modeling, Adaption and Personalization","author":"F Abel","year":"2011","unstructured":"Abel, F., Gao, Q., Houben, G.-J., Tao, K.: Analyzing user modeling on twitter for personalized news recommendations. In: Konstan, J.A., Conejo, R., Marzo, J.L., Oliver, N. (eds.) UMAP 2011. LNCS, vol. 6787, pp. 1\u201312. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Zoltan, K., Johann, S.: Semantic analysis of microposts for efficient people to people interactions. In: Proceedings of the 10th Roedunet International Conference (RoEduNet), pp. 1\u20134 (2011)","key":"3_CR29","DOI":"10.1109\/RoEduNet.2011.5993688"},{"doi-asserted-by":"crossref","unstructured":"Passant, A., Bojars, U., Breslin, J., Hastrup, T., Stankovic, M., Laublet, P.: An overview of smob 2: open, semantic and distributed microblogging, pp. 303\u2013306 (2010)","key":"3_CR30","DOI":"10.1609\/icwsm.v4i1.14067"},{"unstructured":"Liu, X., Zhang, S., Wei, F., Zhou, M.: Recognizing named entities in tweets. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, HLT \u201911, vol. 1, pp. 359\u2013367. Association for Computational Linguistics, Stroudsburg (2011)","key":"3_CR31"},{"unstructured":"Ritter, A., Clark, S., Mausam, Etzioni, O.: Named entity recognition in tweets: an experimental study. In: EMNLP (2011)","key":"3_CR32"},{"doi-asserted-by":"crossref","unstructured":"Scerri, S., Debattista, J., Attard, J., Rivera, I.: A semantic infrastructure for personalisable context-aware environments. AI Mag. Forthcoming 35 (2014)","key":"3_CR33","DOI":"10.1609\/aimag.v36i2.2586"},{"unstructured":"Scerri, S., Rivera, I., Debattista, J., Thiel, S., Cortis, K., Attard, J., Knecht, C., Schuller, A., Hermann, F.: di.me: A context-aware information system (demo). In: Proceedings of the 11th European Semantic Web Conference on The Semantic Web: Research and Applications, ESWC\u201914 (2014)","key":"3_CR34"}],"container-title":["Lecture Notes in Computer Science","Mining, Modeling, and Recommending 'Things' in Social Media"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14723-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T02:45:34Z","timestamp":1676429134000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14723-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,25]]},"ISBN":["9783319147222","9783319147239"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14723-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014,12,25]]},"assertion":[{"value":"25 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}