{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:54:19Z","timestamp":1725879259626},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319527574"},{"type":"electronic","value":"9783319527581"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-52758-1_24","type":"book-chapter","created":{"date-parts":[[2017,1,21]],"date-time":"2017-01-21T14:35:25Z","timestamp":1485009325000},"page":"443-469","source":"Crossref","is-referenced-by-count":0,"title":["Semantically Enhancing Recommender Systems"],"prefix":"10.1007","author":[{"given":"Nuno","family":"Bettencourt","sequence":"first","affiliation":[]},{"given":"Nuno","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Barroso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,22]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Adomavicius, G., Alexander, T.: Context-Aware Recommender Systems. In: Ricci, F., Rokach, L., Shapira, B., Kantor, P.B. (eds.) Media, chapp. 7. Springer, US (2011)","DOI":"10.1007\/978-0-387-85820-3_7"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Bettencourt, N., Silva, N.: Recommending access to web resources based on user\u2019s profile and traceability. In: the Tenth IEEE International Conference on Computer and Information Technology, CIT 2010, IEEE, Bradford, UK, June 2010","DOI":"10.1109\/CIT.2010.202"},{"issue":"1","key":"24_CR3","first-page":"2","volume":"10","author":"S Convery","year":"2007","unstructured":"Convery, S.: Network authentication, authorization, and accounting: part one: concepts, elements and approaches. Internet Protoc. J. 10(1), 2\u201311 (2007)","journal-title":"Internet Protoc. J."},{"key":"24_CR4","unstructured":"Duhamel, T., Cooreman, G., De Vuyst, P.: MC DC 2009 - UNITE Report. Technical report, IAB Europe (2009). http:\/\/www.iabeurope.eu\/files\/7513\/6852\/2734\/mc-dc-2009-iab-unite-report.pdf . Accessed 3 May 2015"},{"key":"24_CR5","first-page":"293","volume":"3729","author":"S Ghita","year":"2005","unstructured":"Ghita, S., Nejdl, W., Paiu, R.: Semantically rich recommendations in social networks for sharing, exchanging and ranking semantic context. Soc. Netw. 3729, 293\u2013307 (2005)","journal-title":"Soc. Netw."},{"key":"24_CR6","unstructured":"Kimberley, S.: European Web Users Stop Searching After First 10 Results (2009). http:\/\/www.mediaweek.co.uk\/article\/974179\/european-web-users-stop-searching-first-10-results-report-reveals . Accessed 3 May 2015"},{"issue":"1","key":"24_CR7","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MIC.2003.1167344","volume":"7","author":"G Linden","year":"2003","unstructured":"Linden, G., Smith, B., York, J.: Amazon.com recommendations: item-to-item collaborative filtering. IEEE Internet Comput. 7(1), 76\u201380 (2003)","journal-title":"IEEE Internet Comput."},{"issue":"1","key":"24_CR8","first-page":"14","volume":"3","author":"KA MacKinnon","year":"2012","unstructured":"MacKinnon, K.A.: User generated content vs. advertising: do consumers trust the word of others over advertisers? Elon J. Undergrad. Res. Commun. 3(1), 14\u201322 (2012)","journal-title":"Elon J. Undergrad. Res. Commun."},{"key":"24_CR9","unstructured":"Nair, S.: XACML reference architecture (2013). https:\/\/www.axiomatics.com\/blog\/entry\/xacml-reference-architecture.html . Accessed 3 May 2015"},{"key":"24_CR10","unstructured":"Nimmons, S.: Policy enforcement point pattern (2012). http:\/\/www.stevenimmons.org\/2012\/02\/policy-enforcement-point-pattern\/ . Accessed 4 May 2015"},{"key":"24_CR11","volume-title":"Mahout in Action","author":"S Owen","year":"2011","unstructured":"Owen, S., Anil, R., Dunning, T., Friedman, E.: Mahout in Action. Manning, Manning (2011)"},{"key":"24_CR12","unstructured":"Parducci, B., Lockhart, H.: eXtensible Access Control Markup Language (XACML) version 3.0. Technical report, OASIS, January 2013"},{"issue":"12","key":"24_CR13","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P Resnick","year":"2000","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43(12), 45\u201348 (2000)","journal-title":"Commun. ACM"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Ruohomaa, S., Kutvonen, L., Koutrouli, E.: Reputation management survey. In: Second International Conference on Availability, Reliability and Security, ARES 2007, Vienna, Austria, April 2007","DOI":"10.1109\/ARES.2007.123"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Said, A., Kille, B., De Luca, E.W., Albayrak, S.: Personalizing tags: a folksonomy-like approach for recommending movies. In: Proceedings of the Second International Workshop on Information Heterogeneity and Fusion in Recommender Systems, HetRec 2011, pp. 53\u201356. ACM, Chicago, October 2011","DOI":"10.1145\/2039320.2039328"},{"issue":"1","key":"24_CR16","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1023\/A:1009804230409","volume":"5","author":"JB Schafer","year":"2001","unstructured":"Schafer, J.B., Konstan, J.A., Riedl, J.: E-commerce recommendation applications. Data Min. Knowl. Discov. 5(1), 115\u2013153 (2001)","journal-title":"Data Min. Knowl. Discov."},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Shardanand, U., Maes, P.: Social information filtering: algorithms for automating \u201cWord of Mouth\u201d. In: the Proceedings of the ACM Conference on Human Factors in Computing Systems, CHI 1995, vol. 1. ACM Press\/Addison-Wesley Publishing Co. (1995)","DOI":"10.1145\/223904.223931"},{"issue":"2","key":"24_CR18","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1111\/j.1540-5915.1999.tb01613.x","volume":"30","author":"C Speier","year":"1999","unstructured":"Speier, C., Valacich, J.S., Vessey, I.: The influence of task interruption on individual decision making: an information overload perspective. Decis. Sci. 30(2), 337\u2013360 (1999)","journal-title":"Decis. Sci."},{"key":"24_CR19","unstructured":"Stephen, L., Dettelback, W., Kaushik, N.: Modernizing Access Control with Authorization Service. Oracle - Developers and Identity Services, November 2008"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Vollbrecht, J.R., Calhoun, P.R., Farrell, S., Gommans, L., Gross, G.M., de Bruijn, B., de Laat, C.T., Holdrege, M., Spence, D.W.: AAA Authorization Framework [RFC 2904], the Internet Society (2000)","DOI":"10.17487\/rfc2904"},{"key":"24_CR21","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications, Structural Analysis in the Social Sciences","author":"S Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications, Structural Analysis in the Social Sciences, 1st edn. Cambridge University Press, Cambridge (1994)","edition":"1"},{"key":"24_CR22","unstructured":"Wasserman, S.: The amazon effect, May 2012. http:\/\/www.thenation.com\/print\/article\/168125\/amazon-effect . Accessed 27 Apr 2015"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Westerinen, A., Schnizlein, J.: Terminology for policy-based management [RFC 3198], the Internet Society (2001)","DOI":"10.17487\/rfc3198"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Yavatkar, R., Pendarakis, D., Guerin, R.: A Framework for Policy-based Admission Control [RFC2753], the Internet Society (2000)","DOI":"10.17487\/rfc2753"}],"container-title":["Communications in Computer and Information Science","Knowledge Discovery, Knowledge Engineering and Knowledge Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52758-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T21:09:01Z","timestamp":1568754541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52758-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319527574","9783319527581"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52758-1_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}