{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:18:28Z","timestamp":1760955508426,"version":"3.40.4"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2014,9,21]],"date-time":"2014-09-21T00:00:00Z","timestamp":1411257600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11042-014-2271-0","type":"journal-article","created":{"date-parts":[[2014,9,20]],"date-time":"2014-09-20T02:39:14Z","timestamp":1411180754000},"page":"14927-14957","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Collaborative privacy framework for minimizing privacy risks in an IPTV social recommender service"],"prefix":"10.1007","volume":"75","author":[{"given":"Ahmed M.","family":"Elmisery","sequence":"first","affiliation":[]},{"given":"Seungmin","family":"Rho","sequence":"additional","affiliation":[]},{"given":"Dmitri","family":"Botvich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,21]]},"reference":[{"key":"2271_CR1","series-title":"Human-Computer Interaction Series","volume-title":"Personalized digital television: targeting programs to individual viewers","author":"L Ardissono","year":"2004","unstructured":"Ardissono L, Kobsa A, Maybury M (2004) Personalized digital television: targeting programs to individual viewers, vol 6, Human-Computer Interaction Series. Kluwer Academic Publishers, Boston"},{"key":"2271_CR2","unstructured":"Beimel A, Nissim K, Omri E (2011) Distributed private data analysis: on simultaneously solving How and What. arXiv preprint arXiv:1103.2626"},{"key":"2271_CR3","doi-asserted-by":"crossref","unstructured":"Blum A, Dwork C, McSherry F, Nissim K (2005) Practical privacy: the SuLQ framework. Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. ACM, 128\u2013138","DOI":"10.1145\/1065167.1065184"},{"key":"2271_CR4","first-page":"238","volume-title":"Collaborative filtering with privacy via factor analysis. Proceedings of the 25th annual international ACM SIGIR conference on research and development in information retrieval","author":"J Canny","year":"2002","unstructured":"Canny J (2002) Collaborative filtering with privacy via factor analysis. Proceedings of the 25th annual international ACM SIGIR conference on research and development in information retrieval. ACM, Tampere, pp 238\u2013245"},{"key":"2271_CR5","doi-asserted-by":"crossref","unstructured":"Canny J (2002) Collaborative filtering with privacy. Proceedings of the 2002 I.E. symposium on security and privacy. IEEE Computer Society 45","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"2271_CR6","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1142\/S0218843003000681","volume":"12","author":"J Carbo","year":"2002","unstructured":"Carbo J, Molina J, Davila J (2002) Trust management through fuzzy reputation. Int J Coop Inf Syst 12:135\u2013155","journal-title":"Int J Coop Inf Syst"},{"key":"2271_CR7","unstructured":"Commission E (2002) Directive 2002\/58\/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector. Official Journal L 201: 07"},{"key":"2271_CR8","volume-title":"\u2018I didn\u2019t buy it for myself\u2019 privacy and ecommerce personalization. Proceedings of the 2003 ACM workshop on privacy in the electronic society","author":"LF Cranor","year":"2003","unstructured":"Cranor LF (2003) \u2018I didn\u2019t buy it for myself\u2019 privacy and ecommerce personalization. Proceedings of the 2003 ACM workshop on privacy in the electronic society. ACM, Washington"},{"key":"2271_CR9","unstructured":"Directive E (1995) 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the EC 23: 6"},{"key":"2271_CR10","doi-asserted-by":"crossref","first-page":"2353","DOI":"10.1007\/978-0-387-39940-9_1504","volume-title":"Encyclopedia of database systems","author":"J Domingo-Ferrer","year":"2009","unstructured":"Domingo-Ferrer J (2009) Record linkage. In: Liu L, \u00d6zsu MT (eds) Encyclopedia of database systems. Springer, US, pp 2353\u20132354"},{"key":"2271_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Differential privacy. Automata, languages and programming","author":"C Dwork","year":"2006","unstructured":"Dwork C (2006) Differential privacy. Automata, languages and programming. Springer, New York, pp 1\u201312"},{"key":"2271_CR12","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/0378-3758(83)90002-2","volume":"7","author":"BH Eichhorn","year":"1983","unstructured":"Eichhorn BH, Hayre LS (1983) Scrambled randomized response methods for obtaining sensitive quantitative data. J Stat Plan Infer 7:307\u2013316","journal-title":"J Stat Plan Infer"},{"key":"2271_CR13","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1007\/978-3-642-22194-1_81","volume-title":"Intelligent decision technologies","author":"AM Elmisery","year":"2011","unstructured":"Elmisery AM, Botvich D (2011) An agent based middleware for privacy aware recommender systems in IPTV networks. In: Watada J, Phillips-Wren G, Jain LC, Howlett RJ (eds) Intelligent decision technologies, vol 10. Springer, Berlin, pp 821\u2013832"},{"key":"2271_CR14","volume-title":"Private recommendation service for IPTV system. 12th IFIP\/IEEE international symposium on integrated network management","author":"A Elmisery","year":"2011","unstructured":"Elmisery A, Botvich D (2011) Private recommendation service for IPTV system. 12th IFIP\/IEEE international symposium on integrated network management. IEEE, Dublin"},{"key":"2271_CR15","volume-title":"Agent based middleware for maintaining user privacy in IPTV recommender services. 3rd international ICST conference on security and privacy in mobile information and communication systems","author":"A Elmisery","year":"2011","unstructured":"Elmisery A, Botvich D (2011) Agent based middleware for maintaining user privacy in IPTV recommender services. 3rd international ICST conference on security and privacy in mobile information and communication systems. ICST, Aalborg"},{"key":"2271_CR16","volume-title":"Privacy aware obfuscation middleware for mobile jukebox recommender services. The 11th IFIP conference on e-Business, e-Service, e-Society","author":"A Elmisery","year":"2011","unstructured":"Elmisery A, Botvich D (2011) Privacy aware obfuscation middleware for mobile jukebox recommender services. The 11th IFIP conference on e-Business, e-Service, e-Society. IFIP, Kaunas"},{"key":"2271_CR17","volume-title":"Privacy aware recommender service for IPTV networks. 5th FTRA\/IEEE international conference on multimedia and ubiquitous engineering","author":"A Elmisery","year":"2011","unstructured":"Elmisery A, Botvich D (2011) Privacy aware recommender service for IPTV networks. 5th FTRA\/IEEE international conference on multimedia and ubiquitous engineering. IEEE, Crete"},{"key":"2271_CR18","volume-title":"Agent based middleware for private data mashup in IPTV recommender services. 16th IEEE international workshop on computer aided modeling, analysis and design of communication links and networks","author":"A Elmisery","year":"2011","unstructured":"Elmisery A, Botvich D (2011) Agent based middleware for private data mashup in IPTV recommender services. 16th IEEE international workshop on computer aided modeling, analysis and design of communication links and networks. IEEE, Kyoto"},{"key":"2271_CR19","first-page":"519","volume-title":"Privacy aware community based recommender service for conferences attendees. 16th international conference on knowledge-based and intelligent information & engineering systems","author":"AM Elmisery","year":"2012","unstructured":"Elmisery AM, Doolin K, Botvich D (2012) Privacy aware community based recommender service for conferences attendees. 16th international conference on knowledge-based and intelligent information & engineering systems, vol 243. Ios Press, San Sebastian, pp 519\u2013531"},{"key":"2271_CR20","unstructured":"Esma A (2008) Experimental demonstration of a hybrid privacy-preserving recommender system. In: Gilles B, Jose MF, Flavien Serge Mani O, Zbigniew R (eds.) Vol. 0 161\u2013170"},{"key":"2271_CR21","volume-title":"Preference learning in recommender systems. European conference on machine learning and principles and practice of knowledge discovery in databases (ECML\/PKDD)","author":"MD Gemmis","year":"2009","unstructured":"Gemmis MD, Iaquinta L, Lops P, Musto C, Narducci F, Semeraro G (2009) Preference learning in recommender systems. European conference on machine learning and principles and practice of knowledge discovery in databases (ECML\/PKDD). ACM, Slovenia"},{"key":"2271_CR22","unstructured":"Golbeck J, Hendler J (2006) FilmTrust: movie recommendations using trust in web-based social networks. Consumer communications and networking conference, 2006. CCNC 2006. 3rd IEEE, Vol. 1 282\u2013286"},{"key":"2271_CR23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/963770.963772","volume":"22","author":"JL Herlocker","year":"2004","unstructured":"Herlocker JL, Konstan JA, Terveen LG, Riedl JT (2004) Evaluating collaborative filtering recommender systems. ACM Trans Inf Syst 22:5\u201353","journal-title":"ACM Trans Inf Syst"},{"key":"2271_CR24","unstructured":"Hong T, Tsamis D (2006) Use of knn for the netflix prize. http:\/\/www.stanford.edu\/class\/cs229\/proj2006\/HongTsamis-KNNForNetflix.pdf"},{"key":"2271_CR25","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1145\/963770.963775","volume":"22","author":"Z Huang","year":"2004","unstructured":"Huang Z, Chen H, Zeng D (2004) Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering. ACM Trans Inf Syst 22:116\u2013142","journal-title":"ACM Trans Inf Syst"},{"key":"2271_CR26","first-page":"37","volume-title":"Deriving private information from randomized data. Proceedings of the 2005 ACM SIGMOD international conference on management of data","author":"Z Huang","year":"2005","unstructured":"Huang Z, Du W, Chen B (2005) Deriving private information from randomized data. Proceedings of the 2005 ACM SIGMOD international conference on management of data. ACM, Baltimore, pp 37\u201348"},{"key":"2271_CR27","first-page":"604","volume-title":"Approximate nearest neighbors: towards removing the curse of dimensionality. Proceedings of the thirtieth annual ACM symposium on theory of computing","author":"P Indyk","year":"1998","unstructured":"Indyk P, Motwani R (1998) Approximate nearest neighbors: towards removing the curse of dimensionality. Proceedings of the thirtieth annual ACM symposium on theory of computing. ACM, Dallas, pp 604\u2013613"},{"key":"2271_CR28","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511763113","volume-title":"Recommender systems: an introduction","author":"D Jannach","year":"2010","unstructured":"Jannach D, Zanker M, Felfernig A, Friedrich G (2010) Recommender systems: an introduction. Cambridge University Press, Cambridge"},{"key":"2271_CR29","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/978-1-4471-4555-4_12","volume-title":"Privacy in recommender systems. Social media retrieval","author":"AJ Jeckmans","year":"2013","unstructured":"Jeckmans AJ, Beye M, Erkin Z, Hartel P, Lagendijk RL, Tang Q (2013) Privacy in recommender systems. Social media retrieval. Springer, New York, pp 263\u2013281"},{"key":"2271_CR30","doi-asserted-by":"crossref","unstructured":"Kargupta H, Datta S, Wang Q, Sivakumar K (2003) On the privacy preserving properties of random data perturbation techniques. Proceedings of the third IEEE international conference on data mining. IEEE Computer Society 99","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"2271_CR31","doi-asserted-by":"crossref","unstructured":"Kawazoe K, Kakinuma R, Haneda Y, Minoura D, Minamoto S, Ishimoto H (2007) Platform application technology using the next generation network. Technical Review. NTT","DOI":"10.53829\/ntr200706sf3"},{"key":"2271_CR32","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/959258.959260","volume":"37","author":"D Kelly","year":"2003","unstructured":"Kelly D, Teevan J (2003) Implicit feedback for inferring user preference: a bibliography. SIGIR Forum 37:18\u201328","journal-title":"SIGIR Forum"},{"key":"2271_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/963770.963771","volume":"22","author":"JA Konstan","year":"2004","unstructured":"Konstan JA (2004) Introduction to recommender systems: algorithms and evaluation. ACM Trans Inf Syst (TOIS) 22:1\u20134","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"2271_CR34","unstructured":"Lam S, Herlocker J (2006) MovieLens data sets. Department of Computer Science and Engineering at the University of Minnesota"},{"key":"2271_CR35","first-page":"4","volume-title":"Naive (Bayes) at forty: the independence assumption in information retrieval. proceedings of the 10th European conference on machine learning","author":"DD Lewis","year":"1998","unstructured":"Lewis DD (1998) Naive (Bayes) at forty: the independence assumption in information retrieval. proceedings of the 10th European conference on machine learning. Springer, New York, pp 4\u201315"},{"key":"2271_CR36","doi-asserted-by":"crossref","first-page":"5711","DOI":"10.1016\/j.eswa.2008.06.052","volume":"36","author":"J-L Lin","year":"2009","unstructured":"Lin J-L, Cheng Y-W (2009) Privacy preserving itemset mining through noisy items. Expert Syst Appl 36:5711\u20135717","journal-title":"Expert Syst Appl"},{"key":"2271_CR37","first-page":"375","volume-title":"Privacy preserving itemset mining through fake transactions. Proceedings of the 2007 ACM symposium on applied computing","author":"J-L Lin","year":"2007","unstructured":"Lin J-L, Liu JY-C (2007) Privacy preserving itemset mining through fake transactions. Proceedings of the 2007 ACM symposium on applied computing. ACM, Seoul, pp 375\u2013379"},{"key":"2271_CR38","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1111\/1540-4560.00071","volume":"59","author":"ST Margulis","year":"2003","unstructured":"Margulis ST (2003) On the status and contribution of westin\u2019s and altman\u2019s theories of privacy. J Soc Issues 59:411\u2013429","journal-title":"J Soc Issues"},{"key":"2271_CR39","first-page":"627","volume-title":"Differentially private recommender systems: building privacy into the net. Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining","author":"F McSherry","year":"2009","unstructured":"McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the net. Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, Paris, pp 627\u2013636"},{"key":"2271_CR40","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1145\/1010614.1010618","volume":"22","author":"BN Miller","year":"2004","unstructured":"Miller BN, Konstan JA, Riedl J (2004) PocketLens: toward a personal recommender system. ACM Trans Inf Syst 22:437\u2013476","journal-title":"ACM Trans Inf Syst"},{"key":"2271_CR41","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V (2008) Robust De-anonymization of large sparse datasets. Proceedings of the 2008 I.E. symposium on security and privacy. IEEE Computer Society","DOI":"10.1109\/SP.2008.33"},{"key":"2271_CR42","first-page":"536","volume-title":"Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks. Proceedings of the 12th international conference on World Wide Web","author":"W Nejdl","year":"2003","unstructured":"Nejdl W, Wolpers M, Siberski W, Schmitz C, Schlosser M, Brunkhorst I (2003) Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks. Proceedings of the 12th international conference on World Wide Web. ACM, Budapest, pp 536\u2013543"},{"key":"2271_CR43","doi-asserted-by":"crossref","unstructured":"Nissim K, Raskhodnikova S, Smith A (2007) Smooth sensitivity and sampling in private data analysis. Proceedings of the thirty-ninth annual ACM symposium on theory of computing. ACM, 75\u201384","DOI":"10.1145\/1250790.1250803"},{"key":"2271_CR44","first-page":"4","volume":"2","author":"R Parameswaran","year":"2008","unstructured":"Parameswaran R, Blough DM (2008) Privacy preserving data obfuscation for inherently clustered data. Int J Inf Comput Secur 2:4\u201326","journal-title":"Int J Inf Comput Secur"},{"key":"2271_CR45","doi-asserted-by":"crossref","unstructured":"Polat H, Du W (2003) Privacy-preserving collaborative filtering using randomized perturbation techniques. Proceedings of the third IEEE international conference on data mining. IEEE Computer Society625","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"2271_CR46","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1145\/1066677.1066860","volume-title":"SVD-based collaborative filtering with privacy. Proceedings of the 2005 ACM symposium on applied computing","author":"H Polat","year":"2005","unstructured":"Polat H, Du W (2005) SVD-based collaborative filtering with privacy. Proceedings of the 2005 ACM symposium on applied computing. ACM, Santa Fe, pp 791\u2013795"},{"key":"2271_CR47","first-page":"1","volume-title":"Introduction to recommender systems handbook. Recommender systems handbook","author":"F Ricci","year":"2011","unstructured":"Ricci F, Rokach L, Shapira B (2011) Introduction to recommender systems handbook. Recommender systems handbook. Springer, New York, pp 1\u201335"},{"key":"2271_CR48","doi-asserted-by":"crossref","unstructured":"Shokri R, Pedarsani P, Theodorakopoulos G, Hubaux J-P (2009) Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. Proceedings of the third ACM conference on recommender systems. ACM, 157\u2013164","DOI":"10.1145\/1639714.1639741"},{"key":"2271_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/772862.772863","volume":"4","author":"B Thuraisingham","year":"2002","unstructured":"Thuraisingham B (2002) Data mining, national security, privacy and civil liberties. SIGKDD. Explor Newsl 4:1\u20135","journal-title":"Explor Newsl"},{"key":"2271_CR50","first-page":"22","volume-title":"Improving recommendation lists through topic diversification. Proceedings of the 14th international conference on World Wide Web","author":"C-N Ziegler","year":"2005","unstructured":"Ziegler C-N, McNee SM, Konstan JA, Lausen G (2005) Improving recommendation lists through topic diversification. Proceedings of the 14th international conference on World Wide Web. ACM, Chiba, pp 22\u201332"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2271-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-2271-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2271-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2271-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T18:50:45Z","timestamp":1746384645000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-2271-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,21]]},"references-count":50,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["2271"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-2271-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2014,9,21]]}}}