{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T07:34:01Z","timestamp":1771054441754,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T00:00:00Z","timestamp":1510358400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10586-017-1298-1","type":"journal-article","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T12:20:34Z","timestamp":1510402834000},"page":"1611-1638","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":67,"title":["A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services"],"prefix":"10.1007","volume":"22","author":[{"given":"Ahmed M.","family":"Elmisery","sequence":"first","affiliation":[]},{"given":"Seungmin","family":"Rho","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Aborizka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,11]]},"reference":[{"key":"1298_CR1","unstructured":"Palmer. D.: The first big internet of things security breach is just around the corner. ZDNet (2016) http:\/\/www.zdnet.com\/article\/the-first-big-internet-of-things-security-breach-is-just-around-the-corner\/"},{"key":"1298_CR2","doi-asserted-by":"crossref","unstructured":"Burleson, W., Clark, S.S., Ransford, B., Fu, K.: Design challenges for secure implantable medical devices. In: Proceedings of the 49th Annual Design Automation Conference, pp. 12\u201317 (2012)","DOI":"10.1145\/2228360.2228364"},{"key":"1298_CR3","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2016","unstructured":"Stergiou, C., Psannis, K., Kim, B.G., Gupta, B.B.: Secure integration of internet-of-things and cloud computing. Future Gener. Comput. Syst. 78, 964\u2013975 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"1298_CR4","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29, 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"1298_CR5","doi-asserted-by":"crossref","unstructured":"Botta, A., De Donato, W., Persico, V., Pescap\u00e9, A.: On the integration of cloud computing and internet of things. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud), pp. 23\u201330 (2014)","DOI":"10.1109\/FiCloud.2014.14"},{"key":"1298_CR6","doi-asserted-by":"crossref","unstructured":"Ramalho F., Neto, A.: Virtualization at the network edge: a performance comparison. In: 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20136 (2016)","DOI":"10.1109\/WoWMoM.2016.7523584"},{"key":"1298_CR7","doi-asserted-by":"crossref","unstructured":"Willis, D., Dasgupta, A., Banerjee, S.: ParaDrop: a multi-tenant platform to dynamically install third party services on wireless gateways. In: Proceedings of the 9th ACM workshop on Mobility in the evolving internet architecture, Maui, Hawaii, USA (2014)","DOI":"10.1145\/2645892.2645901"},{"key":"1298_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MCC.2017.28","volume":"4","author":"R Moreno-Vozmediano","year":"2017","unstructured":"Moreno-Vozmediano, R., Montero, R.S., Huedo, E., Llorente, I.M.: Cross-site virtual network in cloud and fog computing. IEEE Cloud Comput. 4, 46\u201353 (2017)","journal-title":"IEEE Cloud Comput."},{"key":"1298_CR9","doi-asserted-by":"crossref","unstructured":"Moreira, M.W., Rodrigues, J.J., Oliveira, A.M., Saleem, K., Neto, A.V.: An inference mechanism using Bayes-based classifiers in pregnancy care. In: 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 1\u20135 (2016)","DOI":"10.1109\/HealthCom.2016.7749475"},{"key":"1298_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.jbi.2015.06.003","volume":"56","author":"BM Silva","year":"2015","unstructured":"Silva, B.M., Rodrigues, J.J., de la Torre D\u00edez, I., L\u00f3pez-Coronado, M., Saleem, K.: Mobile-health: a review of current state in 2015. J. Biomed. Inform. 56, 265\u2013272 (2015)","journal-title":"J. Biomed. Inform."},{"key":"1298_CR11","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.comnet.2015.09.040","volume":"93","author":"MA Marotta","year":"2015","unstructured":"Marotta, M.A., Faganello, L.R., Schimuneck, M.A.K., Granville, L.Z., Rochol, J., Both, C.B.: Managing mobile cloud computing considering objective and subjective perspectives. Comput. Netw. 93, 531\u2013542 (2015)","journal-title":"Comput. Netw."},{"key":"1298_CR12","unstructured":"Adat V., Gupta, B.B.: Security in internet of ihings: issues, challenges, taxonomy, and architecture. Telecommunication Systems, 2017\/06\/13 (2017)"},{"key":"1298_CR13","unstructured":"Topol, E.J.: The future of medicine is in your smartphone. Wall Street J. (2015). https:\/\/www.wsj.com\/articles\/the-future-of-medicine-is-in-your-smartphone-1420828632"},{"key":"1298_CR14","unstructured":"Columbus, L.: 83% of Healthcare Organizations Are Using Cloud-Based Apps Today. Forbes (2014) http:\/\/www.forbes.com\/sites\/louiscolumbus\/2014\/07\/17\/83-of-healthcare-organizations-are-using-cloud-based-apps-today\/#43d6b7b56502"},{"key":"1298_CR15","doi-asserted-by":"crossref","unstructured":"Olson, J.S., Grudin, J., Horvitz, E.: A study of preferences for sharing and privacy. In: CHI \u201905 extended abstracts on Human factors in computing systems. Portland, OR, USA (2005)","DOI":"10.1145\/1056808.1057073"},{"key":"1298_CR16","unstructured":"Martinovic, I., Davies, D., Frank, M., Perito, D., Ros, T., Song, D.: On the feasibility of side-channel attacks with brain-computer interfaces. In: Proceedings of the 21st USENIX conference on Security symposium, Bellevue, WA (2012)"},{"key":"1298_CR17","unstructured":"Storm, D.: MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks. Computerworld. (2015) http:\/\/www.computerworld.com\/article\/2932371\/cybercrime-hacking\/medjack-hackers-hijacking-medical-devices-to-create-backdoors-in-hospital-networks.html"},{"key":"1298_CR18","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s11036-007-0017-1","volume":"12","author":"U Varshney","year":"2007","unstructured":"Varshney, U.: Pervasive healthcare and wireless health monitoring. Mob. Netw. Appl. 12, 113\u2013127 (2007)","journal-title":"Mob. Netw. Appl."},{"key":"1298_CR19","unstructured":"Blum, J., Magill, E.: M-psychiatry: sensor networks for psychiatric health monitoring. In: Proceedings of the 9th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool John Moores University, June 2008, pp. 33\u201337 (2008)"},{"key":"1298_CR20","doi-asserted-by":"crossref","unstructured":"Blumrosen, G., Avisdris, N., Kupfer, R., Rubinsky, B.: C-SMART: efficient seamless cellular phone based patient monitoring system. In: Proceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (2011)","DOI":"10.1109\/WoWMoM.2011.5986191"},{"key":"1298_CR21","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1016\/j.jocs.2014.02.008","volume":"5","author":"B Alghamdi","year":"2014","unstructured":"Alghamdi, B., Fouchal, H.: A mobile wireless body area network platform. J. Comput. Sci. 5, 664\u2013674 (2014)","journal-title":"J. Comput. Sci."},{"key":"1298_CR22","doi-asserted-by":"crossref","unstructured":"Min, C., Yoo, C., Lee, Y., Song, J.: Healthopia: towards your well-being in everyday life. In: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain (2011)","DOI":"10.1145\/2093698.2093806"},{"key":"1298_CR23","unstructured":"Welsh, M., Moulton, S., Fulford-Jones, T., Malan, D.J.: Codeblue: an ad hoc sensor network infrastructure for emergency medical care. (2004)"},{"key":"1298_CR24","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MPRV.2004.18","volume":"3","author":"K Lorincz","year":"2004","unstructured":"Lorincz, K., Malan, D.J., Fulford-Jones, T.R.F., Nawoj, A., Clavel, A., Shnayder, V., et al.: Sensor networks for emergency response: challenges and opportunities. IEEE Pervasive Comput. 3, 16\u201323 (2004)","journal-title":"IEEE Pervasive Comput."},{"key":"1298_CR25","doi-asserted-by":"crossref","unstructured":"Blum J.M., Magill, E.H.: The design and evaluation of personalised ambient mental health monitors. In: Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference, Las Vegas, Nevada, USA (2010)","DOI":"10.1109\/CCNC.2010.5421748"},{"key":"1298_CR26","doi-asserted-by":"crossref","unstructured":"Ganti, R.K., Jayachandran, P., Abdelzaher, T.F., Stankovic, J.A.: SATIRE: a software architecture for smart AtTIRE. In: Proceedings of the 4th International Conference on Mobile Systems, Applications and Services, Uppsala, Sweden (2006)","DOI":"10.1145\/1134680.1134693"},{"key":"1298_CR27","doi-asserted-by":"crossref","unstructured":"Malasri K., Wang, L.: Addressing security in medical sensor networks. In: Proceedings of the 1st ACM SIGMOBILE International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments, San Juan, Puerto Rico (2007)","DOI":"10.1145\/1248054.1248058"},{"key":"1298_CR28","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/TITB.2009.2033055","volume":"13","author":"CC Tan","year":"2009","unstructured":"Tan, C.C., Wang, H., Zhong, S., Li, Q.: IBE-Lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans. Inf. Technol. Biomed. 13, 926\u201332 (2009)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"1298_CR29","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1007\/s10916-011-9774-2","volume":"36","author":"C Huang","year":"2012","unstructured":"Huang, C., Lee, H., Lee, D.H.: A privacy-strengthened scheme for E-Healthcare monitoring system. J. Med. Syst. 36, 2959\u201371 (2012)","journal-title":"J. Med. Syst."},{"key":"1298_CR30","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","volume":"73","author":"A Tewari","year":"2016","unstructured":"Tewari, A., Gupta, B.B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput. 73, 1085\u20131102 (2016)","journal-title":"J. Supercomput."},{"key":"1298_CR31","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative filtering with privacy. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (2002)","DOI":"10.1145\/564376.564419"},{"key":"1298_CR32","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative filtering with privacy via factor analysis. In: Proceedings of the 25th annual international ACM SIGIR Conference on Research and Development in Information Retrieval, Tampere, Finland (2002)","DOI":"10.1145\/564376.564419"},{"key":"1298_CR33","unstructured":"Aimeur, E., Brassard, G., Fernandez, J.M., Onana, F.S.M., Rakowski, Z.: Experimental demonstration of a hybrid privacy-preserving recommender system. In: Third International Conference on Availability, Reliability and Security, 2008 (ARES \u201908), March 2008, pp. 161\u2013170. IEEE (2008)"},{"key":"1298_CR34","unstructured":"Polat H., Du, W.: Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Proceedings of the Third IEEE International Conference on Data Mining (2003)"},{"key":"1298_CR35","doi-asserted-by":"crossref","unstructured":"Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM Symposium on Applied Computing, Santa Fe, New Mexico (2005)","DOI":"10.1145\/1066677.1066860"},{"key":"1298_CR36","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland (2005)","DOI":"10.1145\/1066157.1066163"},{"key":"1298_CR37","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the Third IEEE International Conference on Data Mining (2003)"},{"key":"1298_CR38","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1145\/1010614.1010618","volume":"22","author":"BN Miller","year":"2004","unstructured":"Miller, B.N., Konstan, J.A., Riedl, J.: PocketLens. ACM Trans. Inf. Syst. 22, 437\u2013476 (2004)","journal-title":"ACM Trans. Inf. Syst."},{"key":"1298_CR39","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s11042-012-1067-3","volume":"64","author":"AM Elmisery","year":"2012","unstructured":"Elmisery, A.M., Botvich, D.: Multi-agent based middleware for protecting privacy in IPTV content recommender services. Multimed. Tools Appl. 64, 249\u2013275 (2012). https:\/\/doi.org\/10.1007\/s11042-012-1067-3","journal-title":"Multimed. Tools Appl."},{"key":"1298_CR40","doi-asserted-by":"publisher","first-page":"14927","DOI":"10.1007\/s11042-014-2271-0","volume":"75","author":"AM Elmisery","year":"2014","unstructured":"Elmisery, A.M., Rho, S., Botvich, D.: Collaborative privacy framework for minimizing privacy risks in an IPTV social recommender service. Multimed. Tools Appl. 75, 14927\u201314957 (2014). https:\/\/doi.org\/10.1007\/s11042-014-2271-0","journal-title":"Multimed. Tools Appl."},{"key":"1298_CR41","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1080\/13614568.2014.889222","volume":"20","author":"AM Elmisery","year":"2014","unstructured":"Elmisery, A.M.: Private personalized social recommendations in an IPTV system. N. Rev. Hypermed. Multimed. 20, 145\u2013167 (2014). https:\/\/doi.org\/10.1080\/13614568.2014.889222","journal-title":"N. Rev. Hypermed. Multimed."},{"key":"1298_CR42","doi-asserted-by":"publisher","unstructured":"Elmisery, A.M., Botvich, D.: Privacy aware recommender service for IPTV networks. In: 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE), pp. 160\u2013166 (2011). https:\/\/doi.org\/10.1109\/MUE.2011.70","DOI":"10.1109\/MUE.2011.70"},{"key":"1298_CR43","doi-asserted-by":"crossref","unstructured":"Elmisery, A.M., Botvich, D.: Agent based middleware for maintaining user privacy in IPTV recommender services. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds.), Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17\u201319, 2011, Revised Selected Papers, pp. 64\u201375. Springer, Berlin (2012). https:\/\/doi.org\/10.1007\/978-3-642-30244-2_6","DOI":"10.1007\/978-3-642-30244-2_6"},{"issue":"10","key":"1298_CR44","first-page":"26","volume":"2","author":"AM Elmisery","year":"2011","unstructured":"Elmisery, A.M., Botvich, D.: Enhanced middleware for collaborative privacy in IPTV recommender services. J. Converg. 2(10), 26 (2011)","journal-title":"J. Converg."},{"key":"1298_CR45","doi-asserted-by":"publisher","unstructured":"Elmisery, A.M., Botvich, D.: Agent based middleware for private data mashup in IPTV recommender services. In: 2011 IEEE 16th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 107\u2013111 (2011). https:\/\/doi.org\/10.1109\/CAMAD.2011.5941096","DOI":"10.1109\/CAMAD.2011.5941096"},{"key":"1298_CR46","first-page":"21","volume":"36","author":"A Elmisery","year":"2012","unstructured":"Elmisery, A., Botvich, D.: Privacy aware recommender service using multi-agent middleware-an IPTV network scenario. Informatica 36, 21\u201336 (2012)","journal-title":"Informatica"},{"key":"1298_CR47","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11227-015-1574-x","volume":"72","author":"AM Elmisery","year":"2015","unstructured":"Elmisery, A.M., Rho, S., Botvich, D.: Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups. J. Supercomput. 72, 247\u2013274 (2015). https:\/\/doi.org\/10.1007\/s11227-015-1574-x","journal-title":"J. Supercomput."},{"key":"1298_CR48","doi-asserted-by":"publisher","unstructured":"Elmisery, A.M., Doolin, K., Roussaki, I., Botvich, D.: Enhanced middleware for collaborative privacy in community based recommendations services. In: Yeo, S.-S., Pan, Y., Lee, Y., Chang, B.H. (eds.), Computer Science and its Applications: CSA, pp. 313\u2013328. Springer, Dordrecht (2012). https:\/\/doi.org\/10.1007\/978-94-007-5699-1_32","DOI":"10.1007\/978-94-007-5699-1_32"},{"key":"1298_CR49","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-61499-105-2-519","volume-title":"Privacy Aware Community based Recommender Service for Conferences Attendees","author":"AM Elmisery","year":"2012","unstructured":"Elmisery, A.M., Doolin, K., Botvich, D.: Privacy Aware Community based Recommender Service for Conferences Attendees. IOS Press, Amsterdam (2012). https:\/\/doi.org\/10.3233\/978-1-61499-105-2-519"},{"key":"1298_CR50","doi-asserted-by":"publisher","first-page":"8418","DOI":"10.1109\/ACCESS.2016.2631546","volume":"4","author":"AM Elmisery","year":"2016","unstructured":"Elmisery, A.M., Rho, S., Botvich, D.: A fog based middleware for automated compliance with OECD privacy principles in internet of healthcare things. IEEE Access 4, 8418\u20138441 (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2631546","journal-title":"IEEE Access"},{"key":"1298_CR51","doi-asserted-by":"publisher","unstructured":"Elmisery, A.M., Botvich, D.: Privacy aware obfuscation middleware for mobile jukebox recommender services. In: Skersys, T., Butleris, R., Nemuraite, L., Suomi, R. (eds.), Building the e-World Ecosystem: 11th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2011, Kaunas, Lithuania, October 12\u201314, 2011, Revised Selected Papers, pp. 73\u201386. Springer, Berlin (2011). https:\/\/doi.org\/10.1007\/978-3-642-27260-8_6","DOI":"10.1007\/978-3-642-27260-8_6"},{"key":"1298_CR52","first-page":"4","volume":"2","author":"R Parameswaran","year":"2008","unstructured":"Parameswaran, R., Blough, D.M.: Privacy preserving data obfuscation for inherently clustered data. Int. J. Inf. Comput. Sec. 2, 4 (2008)","journal-title":"Int. J. Inf. Comput. Sec."},{"key":"1298_CR53","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th conference on USENIX Security Symposium, Vol. 13. San Diego, CA (2004)","DOI":"10.21236\/ADA465464"},{"key":"1298_CR54","unstructured":"Kim, H.D.: Applying consistency-based trust definition to collaborative filtering. KSII Trans. Internet Inf. Syst. 3, 366\u2013374 (2009)"},{"key":"1298_CR55","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/959258.959260","volume":"37","author":"D Kelly","year":"2003","unstructured":"Kelly, D., Teevan, J.: Implicit feedback for inferring user preference: a bibliography. SIGIR Forum 37, 18\u201328 (2003)","journal-title":"SIGIR Forum"},{"key":"1298_CR56","doi-asserted-by":"crossref","unstructured":"Nejdl, W., Wolpers, M., Siberski, W., Schmitz, C., Schlosser, M., Brunkhorst I., et al.: Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks. In: Proceedings of the 12th international conference on World Wide Web, Budapest, Hungary (2003)","DOI":"10.2139\/ssrn.3199014"},{"key":"1298_CR57","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1142\/S0218843003000681","volume":"12","author":"J Carbo","year":"2002","unstructured":"Carbo, J., Molina, J., Davila, J.: Trust management through fuzzy reputation. Int. J. Coop. Inf. Syst. 12, 135\u2013155 (2002)","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"1298_CR58","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: EUROCRYPT 1999, International Conference on the Theory and Applications of Cryptographic Techniques, pp 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"1298_CR59","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Jurik, M.: In: Kim, K. (ed.), A generalisation, a simplication and some applications of Paillier\u2019s probabilistic public-key system public key cryptography, vol. 1992, pp. 119\u2013136, Springer, Berlin (2001)","DOI":"10.1007\/3-540-44586-2_9"},{"key":"1298_CR60","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I., Koprowski, M.: In: Pfitzmann, B. (Ed.), Practical threshold RSA signatures without a trusted dealer advances in cryptology\u2014EUROCRYPT 2001, Vol. 2045, pp. 152\u2013165. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44987-6_10"},{"key":"1298_CR61","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: In: Kaliski, B. (Ed.), Efficient generation of shared RSA keys Advances in Cryptology\u2014CRYPTO \u201997, Vol. 1294. Springer, Berlin, pp. 425\u2013439 (1997)","DOI":"10.1007\/BFb0052253"},{"key":"1298_CR62","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457\u2013473 (2005)","DOI":"10.1007\/11426639_27"},{"key":"1298_CR63","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on Computer and Communications Security, pp. 195\u2013203 (2007)","DOI":"10.1145\/1315245.1315270"},{"key":"1298_CR64","doi-asserted-by":"crossref","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, p. 53\u201370 (2011)","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"1298_CR65","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th international conference on World Wide Web, Banff, Alberta, Canada (2007)","DOI":"10.1145\/1242572.1242623"},{"key":"1298_CR66","unstructured":"Ahmed, R., Boutaba, R.: A scalable peer-to-peer protocol enabling efficient and flexible search. Technical Report CS-2006-05, vol. 12, p. 101. David R. Cheriton School of Computer Science, University of Waterloo (2006)"},{"key":"1298_CR67","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/T-C.1973.223640","volume":"22","author":"RA Jarvis","year":"1973","unstructured":"Jarvis, R.A., Patrick, E.A.: Clustering using a similarity measure based on shared near neighbors. IEEE Trans. Comput. 22, 1025\u20131034 (1973)","journal-title":"IEEE Trans. Comput."},{"key":"1298_CR68","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"JA Akinyele","year":"2013","unstructured":"Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M., et al.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3, 111\u2013128 (2013)","journal-title":"J. Cryptogr. Eng."},{"key":"1298_CR69","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/963770.963772","volume":"22","author":"JL Herlocker","year":"2004","unstructured":"Herlocker, J.L., Konstan, J.A., Terveen, L.G., Riedl, J.T.: Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst. 22, 5\u201353 (2004)","journal-title":"ACM Trans. Inf. Syst."},{"key":"1298_CR70","volume-title":"Information Theory Notes","author":"C Kingsford","year":"2009","unstructured":"Kingsford, C.: Information Theory Notes. Springer, Berlin (2009)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1298-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1298-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1298-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T02:40:21Z","timestamp":1659840021000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1298-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,11]]},"references-count":70,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["1298"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1298-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,11]]},"assertion":[{"value":"11 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}