{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T04:03:13Z","timestamp":1742097793771,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272592"},{"type":"electronic","value":"9783642272608"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27260-8_6","type":"book-chapter","created":{"date-parts":[[2011,12,8]],"date-time":"2011-12-08T08:53:37Z","timestamp":1323334417000},"page":"73-86","source":"Crossref","is-referenced-by-count":7,"title":["Privacy Aware Obfuscation Middleware for Mobile Jukebox Recommender Services"],"prefix":"10.1007","author":[{"given":"Ahmed M.","family":"Elmisery","sequence":"first","affiliation":[]},{"given":"Dmitri","family":"Botvich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Perik, E., de Ruyter, B., Markopoulos, P., Eggen, B.: The Sensitivities of User Profile Information in Music Recommender Systems. In: Proceedings of Private, Security, Trust (2004)"},{"key":"6_CR2","unstructured":"Perik, E., de Ruyter, B., Markopoulos, P.: Privacy & Personalization: Preliminary Results of an Empirical Study of Disclosure Behavior. In: Proceedings of PEP, Edinburgh, UK (2005)"},{"key":"6_CR3","series-title":"SIST","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1007\/978-3-642-22194-1_81","volume-title":"Intelligent Decision Technologies","author":"A.M. Elmisery","year":"2011","unstructured":"Elmisery, A.M., Botvich, D.: An Agent Based Middleware for Privacy Aware Recommender Systems in IPTV Networks. In: Watada, J., Phillips-Wren, G., Jain, L.C., Howlett, R.J. (eds.) Intelligent Decision Technologies. SIST, vol.\u00a010, pp. 821\u2013832. Springer, Heidelberg (2011)"},{"key":"6_CR4","volume-title":"16th IEEE International Workshop on Computer Aided Modeling, Analysis and Design of Communication Links and Networks","author":"A. Elmisery","year":"2011","unstructured":"Elmisery, A., Botvich, D.: Agent Based Middleware for Private Data Mashup in IPTV Recommender Services. In: 16th IEEE International Workshop on Computer Aided Modeling, Analysis and Design of Communication Links and Networks. IEEE, Kyoto (2011)"},{"key":"6_CR5","volume-title":"3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems","author":"A. Elmisery","year":"2011","unstructured":"Elmisery, A., Botvich, D.: Agent Based Middleware for Maintaining User Privacy in IPTV Recommender Services. In: 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems. ICST, Aalborg (2011)"},{"key":"6_CR6","volume-title":"5th FTRA\/IEEE International Conference on Multimedia and Ubiquitous Engineering","author":"A. Elmisery","year":"2011","unstructured":"Elmisery, A., Botvich, D.: Privacy Aware Recommender Service for IPTV Networks. In: 5th FTRA\/IEEE International Conference on Multimedia and Ubiquitous Engineering. IEEE, Crete (2011)"},{"key":"6_CR7","volume-title":"12th IFIP\/IEEE International Symposium on Integrated Network Management","author":"A. Elmisery","year":"2011","unstructured":"Elmisery, A., Botvich, D.: Private Recommendation Service For IPTV System. In: 12th IFIP\/IEEE International Symposium on Integrated Network Management. IEEE, Dublin (2011)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1145\/1557019.1557090","volume-title":"Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"F. McSherry","year":"2009","unstructured":"McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 627\u2013636. ACM, Paris (2009)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Esma, A.: Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. In: Gilles, B., Jose, M.F., Flavien Serge Mani, O., Zbigniew, R. (eds.), pp. 161\u2013170 (2008)","DOI":"10.1109\/ARES.2008.193"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1145\/564376.564419","volume-title":"Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"J. Canny","year":"2002","unstructured":"Canny, J.: Collaborative filtering with privacy via factor analysis. In: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 238\u2013245. ACM, Tampere (2002)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative Filtering with Privacy. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, p. 45. IEEE Computer Society (2002)","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Polat, H., Du, W.: Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. In: Proceedings of the Third IEEE International Conference on Data Mining, p. 625. IEEE Computer Society (2003)","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1145\/1066677.1066860","volume-title":"Proceedings of the 2005 ACM Symposium on Applied Computing","author":"H. Polat","year":"2005","unstructured":"Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 791\u2013795. ACM, Santa Fe (2005)"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1066157.1066163","volume-title":"Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data","author":"Z. Huang","year":"2005","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 37\u201348. ACM, Baltimore (2005)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the Privacy Preserving Properties of Random Data Perturbation Techniques. In: Proceedings of the Third IEEE International Conference on Data Mining, p. 99. IEEE Computer Society (2003)","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"6_CR16","first-page":"4","volume":"2","author":"R. Parameswaran","year":"2008","unstructured":"Parameswaran, R., Blough, D.M.: Privacy preserving data obfuscation for inherently clustered data. Int. J. Inf. Comput. Secur.\u00a02, 4\u201326 (2008)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"6_CR17","first-page":"21","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium","author":"R. Dingledine","year":"2004","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol.\u00a013, pp. 21\u201321. USENIX Association, San Diego (2004)"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/276698.276876","volume-title":"Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing","author":"P. Indyk","year":"1998","unstructured":"Indyk, P., Motwani, R.: Approximate nearest neighbors: towards removing the curse of dimensionality. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pp. 604\u2013613. ACM, Dallas (1998)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Pingley, A., Yu, W., Zhang, N., Fu, X., Zhao, W.: CAP: A Context-Aware Privacy Protection System for Location-Based Services. In: Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems, pp. 49\u201357. IEEE Computer Society (2009)","DOI":"10.1109\/ICDCS.2009.62"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/978-3-642-02882-3_51","volume-title":"Computing and Combinatorics","author":"M.R. Fellows","year":"2009","unstructured":"Fellows, M.R., Guo, J., Komusiewicz, C., Niedermeier, R., Uhlmann, J.: Graph-Based Data Clustering with Overlaps. In: Ngo, H.Q. (ed.) COCOON 2009. LNCS, vol.\u00a05609, pp. 516\u2013526. Springer, Heidelberg (2009)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Elmisery, A., Huaiguo, F.: Privacy Preserving Distributed Learning Clustering Of HealthCare Data Using Cryptography Protocols. In: 34th IEEE Annual International Computer Software and Applications Workshops, Seoul, South Korea (2010)","DOI":"10.1109\/COMPSACW.2010.33"},{"key":"6_CR22","series-title":"Springer Series in Statistics","volume-title":"Modern Multidimensional Scaling: Theory and Applications","author":"I. Borg","year":"2005","unstructured":"Borg, I., Groenen, P.J.F.: Modern Multidimensional Scaling: Theory and Applications. Springer Series in Statistics. Springer, Heidelberg (2005)"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1145\/1242572.1242623","volume-title":"Proceedings of the 16th International Conference on World Wide Web","author":"G. Ghinita","year":"2007","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th International Conference on World Wide Web, pp. 371\u2013380. ACM, Banff (2007)"},{"key":"6_CR24","unstructured":"Reaz, A., Raouf, B.: A Scalable Peer-to-peer Protocol Enabling Efficient and Flexible Search (2010)"},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/T-C.1973.223640","volume":"22","author":"R.A. Jarvis","year":"1973","unstructured":"Jarvis, R.A., Patrick, E.A.: Clustering Using a Similarity Measure Based on Shared Near Neighbors. IEEE Trans. Comput.\u00a022, 1025\u20131034 (1973)","journal-title":"IEEE Trans. Comput."},{"key":"6_CR26","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/245108.245126","volume":"40","author":"J. Konstan","year":"1997","unstructured":"Konstan, J., Miller, B., Maltz, D., Herlocker, J., Gordon, L., Riedl, J.: GroupLens: Applying Collaborative Filtering to {Usenet} News. Communications of the ACM\u00a040, 77\u201387 (1997)","journal-title":"Communications of the ACM"},{"key":"6_CR27","unstructured":"Lam, S., Herlocker, J.: MovieLens Data Sets. Department of Computer Science and Engineering at the University of Minnesota (2006)"},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/963770.963772","volume":"22","author":"J.L. Herlocker","year":"2004","unstructured":"Herlocker, J.L., Konstan, J.A., Terveen, L.G., Riedl, J.T.: Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst.\u00a022, 5\u201353 (2004)","journal-title":"ACM Trans. Inf. Syst."},{"key":"6_CR29","unstructured":"Kingsford, C.: Information Theory Notes (2009)"}],"container-title":["IFIP Advances in Information and Communication Technology","Building the e-World Ecosystem"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27260-8_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T04:55:58Z","timestamp":1742014558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27260-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272592","9783642272608"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27260-8_6","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}