{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:22:11Z","timestamp":1743121331727,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811527760"},{"type":"electronic","value":"9789811527777"}],"license":[{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2777-7_51","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T12:02:45Z","timestamp":1579867365000},"page":"621-635","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Blockchain-Based Credible and Privacy-Preserving QoS-Aware Web Service Recommendation"],"prefix":"10.1007","author":[{"given":"Xiaoli","family":"Li","sequence":"first","affiliation":[]},{"given":"Erxin","family":"Du","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,23]]},"reference":[{"issue":"2","key":"51_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/5254.920599","volume":"16","author":"SA McIlraith","year":"2001","unstructured":"McIlraith, S.A., Son, T.C., Zeng, H.: Semantic web services. IEEE Intell. Syst. 16(2), 46\u201353 (2001)","journal-title":"IEEE Intell. Syst."},{"issue":"4","key":"51_CR2","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1109\/TNSM.2012.113012.120310","volume":"9","author":"Q Duan","year":"2012","unstructured":"Duan, Q., Yan, Y., Vasilakos, A.V.: A survey on service-oriented network virtualization toward convergence of networking and cloud computing. IEEE Trans. Netw. Serv. Manag. 9(4), 373\u2013392 (2012)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"5","key":"51_CR3","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/TSE.2004.11","volume":"30","author":"L Zeng","year":"2004","unstructured":"Zeng, L., Benatallah, B., Ngu, A.H., Dumas, M., Kalagnanam, J., Chang, H.: QoS-aware middleware for web services composition. IEEE Trans. Softw. Eng. 30(5), 311\u2013327 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"51_CR4","first-page":"1","volume":"161002527","author":"J Konecn\u00fd","year":"2016","unstructured":"Konecn\u00fd, J., McMahan, H.B., Ramage, D., Richt\u00e1rik, P.: Federated optimization: distributed machine learning for on-device intelligence. CoRR 161002527(5), 1\u201338 (2016)","journal-title":"CoRR"},{"issue":"4","key":"51_CR5","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2018","unstructured":"Castro, M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. (TOCS) 20(4), 398\u2013461 (2018)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"51_CR6","unstructured":"Blanchard, P., Guerraoui, R., Stainer, J.: Machine learning with adversaries: Byzantine tolerant gradient descent. In: Annual Conference on Neural Information Processing Systems 2017, pp. 119\u2013129 (2017)"},{"key":"51_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology\u2014CRYPTO 1991","author":"TP Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129\u2013140. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-46766-1_9"},{"key":"51_CR8","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Zhang, Y., Lyu, M.R.: Distributed QoS evaluation for real-world web services. In: ICWS 2010 Proceedings of the 2010 IEEE International Conference on Web Services, pp. 83\u201390. IEEE (2010)","DOI":"10.1109\/ICWS.2010.10"},{"key":"51_CR9","unstructured":"Breese, J.S., Heckerman, D., Kadie, C.M.: Empirical analysis of predictive algorithms for collaborative filtering. In: 14th Proceedings of Conference on Uncertainty in Artificial Intelligence, pp. 43\u201352. Morgan Kaufmann (1998)"},{"key":"51_CR10","doi-asserted-by":"crossref","unstructured":"Sarwar, B.M., Karypis, G., Konstan, J.A., et al.: Item-based collaborative filtering recommendation algorithms. In 10th Proceedings of the International Conference on World Wide Web, pp. 285\u2013295. ACM (2001)","DOI":"10.1145\/371920.372071"},{"issue":"2","key":"51_CR11","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/TSC.2010.52","volume":"4","author":"Z Zheng","year":"2011","unstructured":"Zheng, Z., Ma, H., Lyu, M.R., King, I.: QoS-aware web service recommendation by collaborative filtering. IEEE Trans. Serv. Comput. 4(2), 140\u2013152 (2011)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Qiu, W., Zheng, Z., Wang, X., Yang, X., Lyu, M.R.: Reputation-aware QoS value prediction of web services. In: SCC 2013 Proceedings of the 2013 IEEE International Conference on Services Computing, pp. 41\u201348. IEEE (2013)","DOI":"10.1109\/SCC.2013.43"},{"issue":"1","key":"51_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TR.2015.2464075","volume":"65","author":"J Xu","year":"2016","unstructured":"Xu, J., Zheng, Z., Lyu, M.R.: Web service personalized quality of service prediction via reputation-based matrix factorization. IEEE Trans. Reliab. 65(1), 28\u201337 (2016)","journal-title":"IEEE Trans. Reliab."},{"key":"51_CR14","doi-asserted-by":"crossref","unstructured":"Chen, L., Feng, Y., Wu, J.: Collaborative QoS prediction via feedback-based trust model. In: Proceedings of the 6th IEEE International Conference on Service-Oriented Computing and Applications (SOCA), pp. 206\u2013213. IEEE (2013)","DOI":"10.1109\/SOCA.2013.50"},{"key":"51_CR15","doi-asserted-by":"crossref","unstructured":"Wu, C., Qiu, W., Zheng, Z., Wang, X., Yang, X.: Qos prediction of web services based on two-phase k-means clustering. In: Proceedings of the 2015 IEEE International Conference on Web Services (ICWS), pp. 161\u2013168. IEEE (2015)","DOI":"10.1109\/ICWS.2015.31"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Zhu, J., He, P., Zheng, Z., Lyu, M.R.: A privacy-preserving QoS prediction framework for web service recommendation. In: Proceedings of the 2015 IEEE International Conference on Web Services (ICWS), pp. 241\u2013248. IEEE (2015)","DOI":"10.1109\/ICWS.2015.41"},{"issue":"4","key":"51_CR17","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10115-004-0173-6","volume":"7","author":"H Kargupta","year":"2005","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: Random-data perturbation techniques and privacy-preserving data mining. Knowl. Inf. Syst. 7(4), 387\u2013414 (2005)","journal-title":"Knowl. Inf. Syst."},{"key":"51_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/978-3-319-68786-5_40","volume-title":"Web Information Systems Engineering \u2013 WISE 2017","author":"S Badsha","year":"2017","unstructured":"Badsha, S., Yi, X., Khalil, I., Liu, D., Nepal, S., Bertino, E.: Privacy preserving location recommendations. In: Bouguettaya, A., et al. (eds.) WISE 2017. LNCS, vol. 10570, pp. 502\u2013516. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68786-5_40"},{"key":"51_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1007\/978-3-319-55753-3_36","volume-title":"Database Systems for Advanced Applications","author":"X Liu","year":"2017","unstructured":"Liu, X., et al.: When differential privacy meets randomized perturbation: a hybrid approach for privacy-preserving recommender system. In: Candan, S., Chen, L., Pedersen, T.B., Chang, L., Hua, W. (eds.) DASFAA 2017. LNCS, vol. 10177, pp. 576\u2013591. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-55753-3_36"},{"key":"51_CR20","unstructured":"Polat, H., Du, W.: Privacy-preserving top-n recommendation on horizontally partitioned data. In: The 2005 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI 2005), pp. 725\u2013731. IEEE (2005)"},{"issue":"4","key":"51_CR21","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TSMCC.2010.2040275","volume":"40","author":"J Zhan","year":"2010","unstructured":"Zhan, J., Hsieh, C.-L., Wang, I.-C., Hsu, T.-S., Liau, C.-J., Wang, D.-W.: Privacy-preserving collaborative recommender systems. IEEE Trans. Syst. Man Cybern. 40(4), 472\u2013476 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"51_CR22","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative filtering with privacy. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 45\u201357. IEEE (2002)","DOI":"10.1145\/564376.564419"}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2777-7_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T16:26:25Z","timestamp":1695659185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-2777-7_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,23]]},"ISBN":["9789811527760","9789811527777"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2777-7_51","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019,12,23]]},"assertion":[{"value":"23 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}