{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:07:56Z","timestamp":1742933276560,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319326887"},{"type":"electronic","value":"9783319326894"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-32689-4_11","type":"book-chapter","created":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T05:18:24Z","timestamp":1463548704000},"page":"141-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Personal Service Eco-Environment (PSE2): A\u00a0User-Centric Services Computing Paradigm"],"prefix":"10.1007","author":[{"given":"Zhongjie","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dianhui","family":"Chu","sequence":"additional","affiliation":[]},{"given":"Xiaofei","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,19]]},"reference":[{"issue":"1","key":"11_CR1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1360\/112012-460","volume":"43","author":"G Huang","year":"2013","unstructured":"Huang, G., Liu, X.Z., Zhang, Y.: A mobile web application platform with synergy of cloud and client. Scientia Sinica Informationis 43(1), 24\u201344 (2013)","journal-title":"Scientia Sinica Informationis"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Murray-Rust, D., Robertson, D.: LSCitter: Building social machines by augmenting existing social networks with interaction models. In: 23rd International World Wide Web Conference, pp. 875\u2013880(2014)","DOI":"10.1145\/2567948.2578832"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.compind.2014.09.007","volume":"69","author":"F Andriopoulou","year":"2015","unstructured":"Andriopoulou, F., Birkos, K., Lymberopoulos, D.: P2Care: a dynamic peer-to-peer network for collaboration in personalized healthcare service delivery. Comput. Ind. 69, 45\u201360 (2015)","journal-title":"Comput. Ind."},{"issue":"2","key":"11_CR4","first-page":"7","volume":"44","author":"K Crowston","year":"2008","unstructured":"Crowston, K., Wei, K., Howison, J., Wiggins, A.: Free\/Libre open-source software development: what we know and what we do not know. ACM Comput. Surv. 44(2), 7 (2008)","journal-title":"ACM Comput. Surv."},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-30829-1_1","volume-title":"Coordination Models and Languages","author":"V Liptchinsky","year":"2012","unstructured":"Liptchinsky, V., Khazankin, R., Truong, H.-L., Dustdar, S.: Statelets: coordination of social collaboration processes. In: Sirjani, M. (ed.) COORDINATION 2012. LNCS, vol. 7274, pp. 1\u201316. Springer, Heidelberg (2012)"},{"issue":"6","key":"11_CR6","first-page":"1135","volume":"50","author":"Z Xu","year":"2013","unstructured":"Xu, Z., Xie, Y., Hai, M., Li, X., Yuan, Z.: Universal compute account and personal information asset algebra in human-cyber-physical ternary computing. J. Comput. Res. Dev. 50(6), 1135\u20131146 (2013)","journal-title":"J. Comput. Res. Dev."},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/978-3-319-06749-0_11","volume-title":"Privacy Technologies and Policy","author":"S Gnesi","year":"2014","unstructured":"Gnesi, S., Matteucci, I., Moiso, C., Mori, P., Petrocchi, M., Vescovi, M.: My data, your data, our data: managing privacy preferences in multiple subjects personal data. In: Preneel, B., Ikonomou, D. (eds.) APF 2014. LNCS, vol. 8450, pp. 154\u2013171. Springer, Heidelberg (2014)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Wang, J., Wang, Z.: A Survey on Personal Data Cloud. The Scientific World Journal, Article ID 969150 (2014)","DOI":"10.1155\/2014\/969150"},{"key":"11_CR9","unstructured":"Kalapesi, C.: Unlocking the value of personal data: from collection to usage. World Economic Forum Technical Report (2013)"},{"key":"11_CR10","unstructured":"Schwab, K., Marcus, A., Oyola, J., et al.: Personal data: The emergence of a new asset class. An Initiative of the World Economic Forum (2011)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Vescovi, M., Perentis, C., Leonardi, C., Lepri, B., Moiso, C.: My data store: toward user awareness and control on personal data. In: The 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 179\u2013182 (2014)","DOI":"10.1145\/2638728.2638745"},{"issue":"4","key":"11_CR12","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/2580944","volume":"57","author":"D Estrin","year":"2014","unstructured":"Estrin, D.: Small data, where n=me. Commun. ACM 57(4), 32\u201334 (2014)","journal-title":"Commun. ACM"},{"key":"11_CR13","unstructured":"Regalado, A., Tucker, P., Simonite, T., et al.: Big data gets personal, pp. 1\u201329. MIT, Technology Review (2013)"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"4430","DOI":"10.3390\/s150204430","volume":"15","author":"M Rehman","year":"2015","unstructured":"Rehman, M., Liew, C.S., Wah, T.Y., Shuja, J., Daghighi, B.: Mining personal data using smartphones and wearable devices: a survey. Sensors 15(2), 4430\u20134469 (2015)","journal-title":"Sensors"},{"issue":"5","key":"11_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/2670528","volume":"58","author":"S Abiteboul","year":"2015","unstructured":"Abiteboul, S.: Andr B., Kaplan, D.: Managing your digital life. Commun. ACM. 58(5), 32\u201335 (2015)","journal-title":"Commun. ACM."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"de Montjoye, Y.-A., Shmueli, E., Wang, S., Pentland, A.: openPDS: Protecting the privacy of metadata through SafeAnswers. PLoS ONE, 9, 7, e98790 (2014)","DOI":"10.1371\/journal.pone.0098790"},{"issue":"4","key":"11_CR17","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/2523820","volume":"10","author":"MY Mun","year":"2014","unstructured":"Mun, M.Y., Kim, D.H., Shilton, K., Estrin, D., Hansen, M., Govindan, R.: PDVLoc: a personal data vault for controlled location data sharing. ACM Trans. Sens. Netw. 10(4), 58 (2014)","journal-title":"ACM Trans. Sens. Netw."},{"issue":"4","key":"11_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2395123.2395129","volume":"2","author":"J Kay","year":"2012","unstructured":"Kay, J., Kummerfeld, B.: Creating personalized systems that people can scrutinize and control: drivers, principles and experience. ACM Trans. Interact. Intell. Syst. 2(4), 24 (2012)","journal-title":"ACM Trans. Interact. Intell. Syst."},{"key":"11_CR19","unstructured":"Haddadi, H., Ofli, F., Mejova, Y., Weber, I., Srivastava, J.: 360 Quantified Self (2015). arXiv:1508.00375"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Amatriain, X.: Big and personal data: and models behind netflix recommendations. In: The 2nd International Workshop on Big Data, Streams and Heterogeneous Source Mining, pp. 1\u20136 (2013)","DOI":"10.1145\/2501221.2501222"},{"issue":"4","key":"11_CR21","first-page":"779","volume":"52","author":"Y Li","year":"2015","unstructured":"Li, Y., Meng, X., Liu, J., Wang, C.: Study of the long-range evolution of online human-interest based on small data. J. Comput. Res. Dev. 52(4), 779\u2013788 (2015)","journal-title":"J. Comput. Res. Dev."},{"issue":"1","key":"11_CR22","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.indmarman.2011.11.008","volume":"41","author":"L Aarikka-Stenroos","year":"2012","unstructured":"Aarikka-Stenroos, L., Jaakkola, E.: Value co-creation in knowledge intensive business services: a dyadic perspective on the joint problem solving process. Ind. Mark. Manage. 41(1), 15\u201326 (2012)","journal-title":"Ind. Mark. Manage."},{"key":"11_CR23","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1007\/978-3-319-18491-3_20","volume-title":"Trust Management IX","author":"M Vescovi","year":"2015","unstructured":"Vescovi, M., Moiso, C., Pasolli, M., Cordin, L., Antonelli, F.: Building an eco-system of trusted services via user control and transparency on personal data. In: Jensen, C.D., Marsh, S., Dimitrakos, T., Murayama, Y. (eds.) Trust Management IX. IFIP AICT, vol. 454, pp. 240\u2013250. Springer, Heidelberg (2015)"}],"container-title":["Lecture Notes in Business Information Processing","Exploring Services Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-32689-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T16:04:08Z","timestamp":1567872248000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-32689-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319326887","9783319326894"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-32689-4_11","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"19 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}