{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:54Z","timestamp":1740098994007,"version":"3.37.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723884"},{"type":"electronic","value":"9783319723891"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72389-1_25","type":"book-chapter","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T09:53:21Z","timestamp":1512554001000},"page":"308-320","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Service Selection Based on User Privacy Risk Evaluation"],"prefix":"10.1007","author":[{"given":"Mingdong","family":"Tang","sequence":"first","affiliation":[]},{"given":"Sumeng","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Jianxun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Buqing","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"issue":"3","key":"25_CR1","doi-asserted-by":"crossref","first-page":"5411","DOI":"10.1016\/j.eswa.2008.06.087","volume":"36","author":"B Jeong","year":"2009","unstructured":"Jeong, B., Cho, H., Lee, C.: On the functional quality of service (FQoS) to discover and compose interoperable web services. Expert Syst. Appl. 36(3), 5411\u20135418 (2009)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"25_CR2","doi-asserted-by":"crossref","first-page":"4460","DOI":"10.1016\/j.eswa.2008.05.007","volume":"369","author":"P Wang","year":"2009","unstructured":"Wang, P.: QoS-aware web services selection with intuitionistic fuzzy set under consumer\u2019s vague perception. Expert Syst. Appl. Part 1 369(3), 4460\u20134466 (2009)","journal-title":"Expert Syst. Appl. Part 1"},{"issue":"1","key":"25_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2697389","volume":"9","author":"KK Fletcher","year":"2015","unstructured":"Fletcher, K.K., Liu, X.F., Tang, M.: Elastic personalized non-functional attribute preference and trade-off based service selection. ACM Trans. Web (TWEB) 9(1), 1\u201327 (2015)","journal-title":"ACM Trans. Web (TWEB)"},{"issue":"2","key":"25_CR4","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/s11633-014-0840-3","volume":"12","author":"W Fan","year":"2015","unstructured":"Fan, W., Yang, S., Perros, H., et al.: A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach. Int. J. Autom. Comput. 12(2), 208\u2013219 (2015)","journal-title":"Int. J. Autom. Comput."},{"issue":"3","key":"25_CR5","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1108\/08876041011040622","volume":"24","author":"MS Featherman","year":"2010","unstructured":"Featherman, M.S., Miyazaki, A.D., Sprott, D.E.: Reducing online privacy risk to facilitate e-service adoption: the influence of perceived ease of use and corporate credibility. J. Serv. Mark. 24(3), 219\u2013229 (2010)","journal-title":"J. Serv. Mark."},{"issue":"5","key":"25_CR6","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl.-Based Syst."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Ammar, N., Malik, Z., Medjahed, B., et al.: K-anonymity based approach for privacy-preserving web service selection. In: 2015 IEEE International Conference on Web Services (ICWS), pp. 281\u2013288. IEEE (2015)","DOI":"10.1109\/ICWS.2015.46"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Li, X., Jung, T.: Search me if you can: privacy-preserving location query service. In: IEEE INFOCOM 2013, Turin, Italy, 14\u201319 April 2013, pp. 2760\u20132768 (2013)","DOI":"10.1109\/INFCOM.2013.6567085"},{"issue":"3","key":"25_CR9","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1504\/IJBDI.2016.078411","volume":"3","author":"L Lin","year":"2016","unstructured":"Lin, L., Liu, T., Hu, J., Ni, J.: PQsel: combining privacy with quality of service in cloud service selection. Int. J. Big Data Intell. 3(3), 202\u2013214 (2016)","journal-title":"Int. J. Big Data Intell."},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Kapitsaki, G.M.: Reflecting user privacy preferences in context-aware web services. In: IEEE 20th International Conference on Web Services (ICWS), pp. 123\u2013130. IEEE (2013)","DOI":"10.1109\/ICWS.2013.26"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Squicciarini, A., Carminati, B., Karumanchi, S.: A privacy-preserving approach for web service selection and provisioning. In: 2011 IEEE International Conference on Web Services (ICWS), pp. 33\u201340. IEEE (2011)","DOI":"10.1109\/ICWS.2011.120"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Lin, L., Liu, T., Hu, J., Zhang, J.: A privacy-aware cloud service selection method toward data life-cycle. In: 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Hsinchu, Taiwan, pp. 752\u2013759, 16\u201319 December 2014","DOI":"10.1109\/PADSW.2014.7097878"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Costante, E., Paci, F., Zannone, N.: Privacy-aware web service composition and ranking. In: 2013 IEEE 20th International Conference on Web Services (ICWS), pp. 131\u2013138. IEEE (2013)","DOI":"10.1109\/ICWS.2013.27"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Tran, N.H.: A privacy-preserving framework for constrained choreographed service composition. In: 2015 IEEE International Conference on Web Services (ICWS), 297\u2013304. IEEE (2015)","DOI":"10.1109\/ICWS.2015.48"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Squicciarini, A.C., Carminati, B., Karumanc, S.: Privacy aware service selection of composite web services. In: 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), pp. 260\u2013268. IEEE (2013)","DOI":"10.4108\/icst.collaboratecom.2013.254264"},{"issue":"2","key":"25_CR16","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TSC.2013.18","volume":"7","author":"S-E Tbahriti","year":"2014","unstructured":"Tbahriti, S.-E., Ghedira, C., Medjahed, B., Mrissa, M.: Privacy-enhanced web service composition. IEEE Trans. Serv. Comput. 7(2), 210\u2013222 (2014)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/978-3-540-24655-8_72","volume-title":"Advanced Web Technologies and Applications","author":"A Sajjanhar","year":"2004","unstructured":"Sajjanhar, A., Hou, J., Zhang, Y.: Algorithm for web services matching. In: Yu, J.X., Lin, X., Lu, H., Zhang, Y. (eds.) APWeb 2004. LNCS, vol. 3007, pp. 665\u2013670. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24655-8_72"},{"issue":"5","key":"25_CR18","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1142\/S0218488503002387","volume":"11","author":"S Opricovic","year":"2003","unstructured":"Opricovic, S., Tzeng, G.H.: Defuzzification within a multicriteria decision model. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 11(5), 635\u2013652 (2003)","journal-title":"Int. J. Uncertainty Fuzziness Knowl.-Based Syst."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72389-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T10:04:00Z","timestamp":1512554640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72389-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723884","9783319723891"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72389-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}