{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:17:16Z","timestamp":1765041436395,"version":"3.37.3"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11761-023-00377-5","type":"journal-article","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T08:02:27Z","timestamp":1695283347000},"page":"239-257","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0419-4530","authenticated-orcid":false,"given":"Urvashi Rahul","family":"Saxena","sequence":"first","affiliation":[]},{"given":"Taj","family":"Alam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,21]]},"reference":[{"issue":"3","key":"377_CR1","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/JSYST.2013.2260072","volume":"8","author":"W Tan","year":"2013","unstructured":"Tan W, Sun Y, Li LX, Lu G, Wang T (2013) A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst J 8(3):868\u2013878","journal-title":"IEEE Syst J"},{"issue":"1","key":"377_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1049\/iet-ifs.2012.0232","volume":"7","author":"X Li","year":"2013","unstructured":"Li X, Du J (2013) Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. IET Inf Security 7(1):39\u201350","journal-title":"IET Inf Security"},{"issue":"4","key":"377_CR3","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/CC.2014.6827577","volume":"11","author":"G Lin","year":"2014","unstructured":"Lin G, Wang D, Bie Y, Lei M (2014) MTBAC: A mutual trust-based access control model in cloud computing. China Commun 11(4):154\u2013162","journal-title":"China Commun"},{"key":"377_CR4","doi-asserted-by":"publisher","unstructured":"Saxena UR, Alam T (2022) Role based access control using identity and broadcast based encryption for securing cloud data. J Comput Virol Hack Tech 18:171\u2013182. https:\/\/doi.org\/10.1007\/s11416-021-00402-1","DOI":"10.1007\/s11416-021-00402-1"},{"issue":"4","key":"377_CR5","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1007\/s11036-019-01484-4","volume":"26","author":"J Xu","year":"2021","unstructured":"Xu J, Yu Y, Meng Q, Wu Q, Zhou F (2021) Role-based access control model for cloud storage using identity-based cryptosystem. Mob Netw Appl 26(4):1475\u20131492","journal-title":"Mob Netw Appl"},{"key":"377_CR6","unstructured":"Saxena UR, Alam T (2022) Modified identify and broadcast-based encryption scheme to secure cloud. In: 2022 international conference on computational intelligence and sustainable engineering solutions (CISES). IEEE, pp 289\u2013294"},{"key":"377_CR7","doi-asserted-by":"crossref","unstructured":"Machhi S, Jethava GB (2016) Feedback based trust management for cloud environment. In: Proceedings of the 2nd international conference on information and communication technology for competitive strategies, p 114","DOI":"10.1145\/2905055.2905330"},{"issue":"3","key":"377_CR8","first-page":"289","volume":"16","author":"FZ Filali","year":"2015","unstructured":"Filali FZ, Yagoubi B (2015) Classifying and fltering users by similarity measures for trust management in cloud environment. Scalable Comput 16(3):289\u2013302","journal-title":"Scalable Comput"},{"key":"377_CR9","doi-asserted-by":"crossref","unstructured":"Anakath AS, Rajakumar S, Ambika S (2019) Privacy preserving multi factor authentication using trust management. Cluster Comput 22(Suppl 5):10817\u201310823.","DOI":"10.1007\/s10586-017-1181-0"},{"issue":"11","key":"377_CR10","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.1002\/sec.748","volume":"7","author":"SM Habib","year":"2014","unstructured":"Habib SM, Ries S, M\u00fchlh\u00e4user M, Varikkattu P (2014) Towards a Trust management system for cloud computing marketplaces: using CAIQ as a trust information source. Secur Commun Netw 7(11):2185\u20132200","journal-title":"Secur Commun Netw"},{"key":"377_CR11","doi-asserted-by":"crossref","unstructured":"Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications, pp 933\u2013939","DOI":"10.1109\/TrustCom.2011.129"},{"key":"377_CR12","doi-asserted-by":"crossref","unstructured":"Bhatt S, Sandhu R, Patwa F (2017) An access control framework for cloud-enabled wearable internet of things. In: IEEE 3rd international conference on collaboration and internet computing (CIC), pp 213\u2013233","DOI":"10.1109\/CIC.2017.00050"},{"key":"377_CR13","doi-asserted-by":"crossref","unstructured":"Zhou L, Varadharajan V, Hitchens M (2013) Integrating trust with cryptographic role-based access control for secure cloud data storage. In: 12th IEEE international conference on trust, security and privacy in computing and communications","DOI":"10.1109\/TrustCom.2013.69"},{"issue":"3","key":"377_CR14","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s11761-022-00343-7","volume":"16","author":"H Nabli","year":"2022","unstructured":"Nabli H, Ben Djemaa R, AmorI AB (2022) Description, discovery, and recommendation of Cloud services: a survey. SOCA 16(3):147\u2013166","journal-title":"SOCA"},{"key":"377_CR15","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s11761-019-00277-7","volume":"13","author":"S Faieq","year":"2019","unstructured":"Faieq S, Front A, Saidi R, El Ghazi H, Rahmani MD (2019) A context-aware recommendation-based system for service composition in smart environments. SOCA 13:341\u2013355","journal-title":"SOCA"},{"key":"377_CR16","doi-asserted-by":"crossref","unstructured":"Saxena UR, Alam T (2022) Systematic review on recommendation systems to select trustworthy cloud services and ensure data integrity. In: 2022 2nd international conference on technological advancements in computational sciences (ICTACS). IEEE, pp 134\u2013139","DOI":"10.1109\/ICTACS56270.2022.9987784"},{"key":"377_CR17","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11761-021-00323-3","volume":"15","author":"K Benouaret","year":"2021","unstructured":"Benouaret K, Hung PC, Bellatreche L (2021) Service-enabled systems and applications: current and future trends. SOCA 15:171\u2013173","journal-title":"SOCA"},{"issue":"1","key":"377_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s11761-019-00278-6","volume":"14","author":"A Mahadevan","year":"2020","unstructured":"Mahadevan A, Arock M (2020) Review rating prediction using combined latent topics and associated sentiments: an empirical review. Serv Orient Comput Appl 14(1):19\u201334","journal-title":"Serv Orient Comput Appl"},{"key":"377_CR19","doi-asserted-by":"crossref","unstructured":"Liu J, Dolan P, Pedersen ER (2010) Personalized news recommendations based on click behavior. In: Proceedings of the 15th international conference on intelligent user interfaces. ACM, pp 31\u201340","DOI":"10.1145\/1719970.1719976"},{"issue":"6","key":"377_CR20","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G Adomavicius","year":"2005","unstructured":"Adomavicius G, Tuzhilin A (2005) Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans Knowl Data Eng 17(6):734\u2013749","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"377_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s11761-023-00357-9","volume":"17","author":"J Anthal","year":"2023","unstructured":"Anthal J, Sharma B, Manhas J (2023) Optimization-enabled deep learning for sentiment rating prediction using review data. SOCA 17(1):39\u201358","journal-title":"SOCA"},{"key":"377_CR22","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11761-021-00322-4","volume":"15","author":"B Li","year":"2021","unstructured":"Li B, Ye C, Yu X, Zhou H, Huang C (2021) QoS Prediction based on temporal information and request context. SOCA 15:231\u2013244","journal-title":"SOCA"},{"issue":"2","key":"377_CR23","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TBDATA.2016.2555318","volume":"2","author":"F Xia","year":"2016","unstructured":"Xia F, Liu H, Lee I, Cao L (2016) Scientific article recommendation: exploiting common author relations and historical preferences. IEEE Trans Big Data 2(2):101\u2013112","journal-title":"IEEE Trans Big Data"},{"issue":"8","key":"377_CR24","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.1016\/j.im.2017.03.003","volume":"54","author":"T Song","year":"2017","unstructured":"Song T, Yi C, Huang J (2017) Whose recommendations do you follow? An investigation of tie strength, shopping stage, and deal scarcity. Inf Manag 54(8):1072\u20131083","journal-title":"Inf Manag"},{"key":"377_CR25","doi-asserted-by":"crossref","unstructured":"Schafer JB, Frankowski D, Herlocker J, Sen S (2007) Collaborative filtering recommender systems. In: The adaptive web. Springer, pp 291\u2013324","DOI":"10.1007\/978-3-540-72079-9_9"},{"key":"377_CR26","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-72079-9_10","volume-title":"The adaptive web","author":"M Pazzani","year":"2007","unstructured":"Pazzani M, Billsus D (2007) Content-based recommendation systems. In: Brusilovsky P, Kobsa A, Nejdl W (eds) The adaptive web. Springer, Berlin, Heidelberg, pp 325\u2013341"},{"issue":"4","key":"377_CR27","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1023\/A:1021240730564","volume":"12","author":"R Burke","year":"2002","unstructured":"Burke R (2002) Hybrid recommender systems: survey and experiments. User Model User-Adapt Interact 12(4):331\u2013370","journal-title":"User Model User-Adapt Interact"},{"key":"377_CR28","doi-asserted-by":"crossref","unstructured":"Tsolakidis A, Triperina E, Sgouropoulou C, Christidis N (2016) Research publication recommendation system based on a hybrid approach. In: Proceedings of the 20th Pan-Hellenic conference on informatics, pp 1\u20136","DOI":"10.1145\/3003733.3003805"},{"issue":"2","key":"377_CR29","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TPDS.2015.2408613","volume":"27","author":"TH Noor","year":"2015","unstructured":"Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AHH (2015) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2):367\u2013380","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"377_CR30","unstructured":"Mahajan S, Mahajan S, Jadhav S, Sangita K (2017) Trust management in E-commerce websites. In: International research journal of engineering and technology (IRJET), pp 2934\u20132936"},{"key":"377_CR31","unstructured":"J\u00f8sang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, vol 5, pp 2502\u20132511"},{"key":"377_CR32","doi-asserted-by":"crossref","unstructured":"Chang W, Xu F, Dou J (2012) A trust and unauthorized operation based RBAC (TUORBAC) model. In: International conference on control engineering and communication technology","DOI":"10.1109\/ICCECT.2012.217"},{"key":"377_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113248","volume":"149","author":"S Natarajan","year":"2020","unstructured":"Natarajan S, Vairavasundaram S, Natarajan S, Gandomi AH (2020) Resolving data sparsity and cold start problem in collaborative filtering recommender system using linked open data. Expert Syst Appl 149:113248","journal-title":"Expert Syst Appl"},{"key":"377_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118307","volume":"209","author":"VK Sejwal","year":"2022","unstructured":"Sejwal VK, Abulaish M (2022) A hybrid recommendation technique using topic embedding for rating prediction and to handle cold-start problem. Expert Syst Appl 209:118307","journal-title":"Expert Syst Appl"},{"issue":"5","key":"377_CR35","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1177\/0165551518808191","volume":"45","author":"S Ahmadian","year":"2019","unstructured":"Ahmadian S, Afsharchi M, Meghdadi M (2019) An effective social recommendation method based on user reputation model and rating profile enhancement. J Inf Sci 45(5):607\u2013642","journal-title":"J Inf Sci"},{"issue":"9","key":"377_CR36","doi-asserted-by":"publisher","first-page":"519","DOI":"10.3390\/ijgi9090519","volume":"9","author":"S Ojagh","year":"2020","unstructured":"Ojagh S, Malek MR, Saeedi S (2020) A social\u2013aware recommender system based on user\u2019s personal smart devices. ISPRS Int J Geo Inf 9(9):519","journal-title":"ISPRS Int J Geo Inf"},{"issue":"2","key":"377_CR37","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s10489-018-1289-9","volume":"49","author":"M Ghavipour","year":"2019","unstructured":"Ghavipour M, Meybodi MR (2019) Stochastic trust network enriched by similarity relations to enhance trust-aware recommendations. Appl Intell 49(2):435\u2013448","journal-title":"Appl Intell"},{"key":"377_CR38","doi-asserted-by":"crossref","unstructured":"Behera G, Nain N (2022) Handling data sparsity via item metadata embedding into deep collaborative recommender system. J King Saud Univ Comput Inf Sci 34(10):9953\u20139963","DOI":"10.1016\/j.jksuci.2021.12.021"},{"issue":"1","key":"377_CR39","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1080\/17517575.2021.1889037","volume":"16","author":"RR Kumar","year":"2022","unstructured":"Kumar RR, Shameem M, Kumar C (2022) A computational framework for ranking prediction of cloud services under fuzzy environment. Enterpr Inf Syst 16(1):167\u2013187","journal-title":"Enterpr Inf Syst"},{"key":"377_CR40","doi-asserted-by":"publisher","unstructured":"Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: Proceedings of the 33rd annual Hawaii international conference on system sciences, Maui, HI, USA, vol 1, p 9. https:\/\/doi.org\/10.1109\/HICSS.2000.926814","DOI":"10.1109\/HICSS.2000.926814"},{"key":"377_CR41","doi-asserted-by":"crossref","unstructured":"Massa P, Avesani P (2004) Trust-aware collaborative filtering for recommender systems. In: OTM confederated international conferences \"On the move to meaningful internet systems\". Springer, Berlin, Heidelberg, pp 492\u2013508","DOI":"10.1007\/978-3-540-30468-5_31"},{"issue":"3","key":"377_CR42","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.knosys.2011.09.006","volume":"27","author":"X Luo","year":"2012","unstructured":"Luo X, Xia Y, Zhu Q (2012) Incremental collaborative filtering recommender based on regularized matrix factorization. Knowl-Based Syst 27(3):271\u2013280","journal-title":"Knowl-Based Syst"},{"key":"377_CR43","unstructured":"Bo YY, Lei JL, Li W (2017) Social collaborative filtering by trust. In: IEEE transactions on pattern analysis and machine (intelligence)"},{"key":"377_CR44","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/OJIES.2020.3012627","volume":"1","author":"H Wang","year":"2020","unstructured":"Wang H, Amagata D, Makeawa T, Hara T, Hao N, Yonekawa K, Kurokawa M (2020) A DNN-based cross-domain recommender system for alleviating cold-start problem in e-commerce. IEEE Open J Ind Electron Soc 1:194\u2013206","journal-title":"IEEE Open J Ind Electron Soc"},{"key":"377_CR45","doi-asserted-by":"crossref","unstructured":"Taneja S, Rathi K (2015) A trust evaluation model to recommend a service provider to a customer in cloud environment. Int J Comput Appl 121(2):22\u201329","DOI":"10.5120\/21513-4479"},{"key":"377_CR46","doi-asserted-by":"crossref","unstructured":"Al Hassanieh L, Abou Jaoudeh C, Abdo JB, Demerjian J (2018) Similarity measures for collaborative filtering recommender systems. In: 2018 IEEE middle east and north Africa communications conference (MENACOMM). IEEE, pp 1\u20135","DOI":"10.1109\/MENACOMM.2018.8371003"},{"key":"377_CR47","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.knosys.2017.01.027","volume":"122","author":"G Guo","year":"2017","unstructured":"Guo G, Zhang J, Zhu F, Wang X (2017) Factored similarity models with social trust for top-N item recommendation. Knowl-Based Syst 122:17\u201325","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"377_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJWSR.2016040101","volume":"13","author":"Z Yu","year":"2016","unstructured":"Yu Z, Song WW, Zheng X, Chen D (2016) Combining trust propagation and topic-level user interest expansion in recommender systems. Int J Web Serv Res 13(2):1\u201319","journal-title":"Int J Web Serv Res"},{"key":"377_CR49","doi-asserted-by":"crossref","unstructured":"Vasile F, Smirnova E, Conneau A (2016) Meta-Prod2Vec: product embeddings using side-information for recommendation. In: Proc. 10th ACM conf. recommender syst, pp 225\u2013232","DOI":"10.1145\/2959100.2959160"},{"key":"377_CR50","doi-asserted-by":"crossref","unstructured":"Tang J, Wang S, Hu X, Yin D, Bi Y, Chang Y, Liu H (2016) Recommendation with social dimensions. In: Proc. 30th AAAI conf. artif. intell., pp 251\u2013257","DOI":"10.1609\/aaai.v30i1.9976"},{"issue":"23","key":"377_CR51","first-page":"10003","volume":"10","author":"R Wang","year":"2014","unstructured":"Wang R, Li Y (2014) Merging into social trust personalized friend recommendation algorithm. J Comput Inf Syst 10(23):10003\u201310012","journal-title":"J Comput Inf Syst"},{"issue":"21","key":"377_CR52","doi-asserted-by":"publisher","first-page":"7386","DOI":"10.1016\/j.eswa.2015.05.027","volume":"42","author":"P Moradi","year":"2015","unstructured":"Moradi P, Ahmadian S (2015) A reliability-based recommendation method to improve trust-aware recommender systems. Expert Syst Appl 42(21):7386\u20137398","journal-title":"Expert Syst Appl"},{"key":"377_CR53","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.knosys.2015.12.018","volume":"97","author":"A Hernando","year":"2016","unstructured":"Hernando A, Bobadilla J, Ortega F (2016) A non negative matrix factorization for collaborative filtering recommender systems based on a Bayesian probabilistic model. Knowl-Based Syst 97:188\u2013202","journal-title":"Knowl-Based Syst"},{"key":"377_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1613\/jair.3831","volume":"47","author":"G Wang","year":"2013","unstructured":"Wang G, Song Q, Sun H, Zhang X, Xu B, Zhou Y (2013) A feature subset selection algorithm automatic recommendation method. J Artif Intell Res 47:1\u201334","journal-title":"J Artif Intell Res"},{"issue":"4","key":"377_CR55","doi-asserted-by":"publisher","first-page":"427","DOI":"10.3390\/electronics8040427","volume":"8","author":"A Zahir","year":"2019","unstructured":"Zahir A, Yuan Y, Moniz K (2019) AgreeRelTrust\u2014a simple implicit trust inference model for memory-based collaborative filtering recommendation systems. Electronics 8(4):427","journal-title":"Electronics"},{"issue":"3","key":"377_CR56","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1007\/s13198-014-0329-z","volume":"9","author":"P Suresh Kumar","year":"2018","unstructured":"Suresh Kumar P, Ramachandram S (2018) A study on impact of untrustworthy and older recommendations over T-Grid computational model. Int J Syst Assur Eng Manag 9(3):646\u2013656","journal-title":"Int J Syst Assur Eng Manag"},{"key":"377_CR57","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.measurement.2016.05.058","volume":"91","author":"H Koohi","year":"2016","unstructured":"Koohi H, Kiani K (2016) User based collaborative filtering using fuzzy C-means. Measurement 91:134\u2013139","journal-title":"Measurement"},{"key":"377_CR58","doi-asserted-by":"crossref","unstructured":"Zarghami A, Fazeli S, Dokoohaki N, Matskin M (2009) Social trust-aware recommendation system: a T-index approach. In: Proc. IEEE\/WIC\/ACM int. joint conf. web intell. agent technol., pp 85\u201390","DOI":"10.1109\/WI-IAT.2009.237"},{"key":"377_CR59","doi-asserted-by":"publisher","unstructured":"Zhang P, Zhou M, Kong Y (2019) A double-blind anonymous evaluation based trust model in cloud computing environments. IEEE Trans Syst, Man, Cybern Syst. https:\/\/doi.org\/10.1109\/TSMC.2019.2906310","DOI":"10.1109\/TSMC.2019.2906310"},{"issue":"5","key":"377_CR60","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1007\/s11390-011-0181-4","volume":"26","author":"FG Zhang","year":"2011","unstructured":"Zhang FG (2011) Preventing recommendation attack in trust-based recommender systems. J Comput Sci Technol 26(5):823\u2013828","journal-title":"J Comput Sci Technol"},{"issue":"9","key":"377_CR61","doi-asserted-by":"publisher","first-page":"2167","DOI":"10.1109\/TIFS.2018.2812166","volume":"13","author":"P Zhang","year":"2018","unstructured":"Zhang P, Kong Y, Zhou M (2018) A domain partition-based trust model for unreliable clouds. IEEE Trans Inf Forens Secur 13(9):2167\u20132178","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"377_CR62","doi-asserted-by":"crossref","unstructured":"Ghafoorian M, Abbasinezhad-Mood D, Shakeri H (2018) A thorough trust and reputation based RBAC model for secure data storage in the cloud. IEEE Trans Parallel Distrib Syst 30(4):778\u2013788","DOI":"10.1109\/TPDS.2018.2870652"},{"issue":"2","key":"377_CR63","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1083784.1083791","volume":"34","author":"E Elmacioglu","year":"2005","unstructured":"Elmacioglu E, Lee D (2005) On six degrees of separation in DBLP-DB and more. ACM SIGMOD Rec 34(2):33\u201340","journal-title":"ACM SIGMOD Rec"},{"key":"377_CR64","doi-asserted-by":"publisher","first-page":"98305","DOI":"10.1109\/ACCESS.2020.2997040","volume":"8","author":"Y Li","year":"2020","unstructured":"Li Y, Liu J, Ren J, Chang Y (2020) A novel implicit trust recommendation approach for rating prediction. IEEE Access 8:98305\u201398315","journal-title":"IEEE Access"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-023-00377-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11761-023-00377-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-023-00377-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T07:48:39Z","timestamp":1697528919000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11761-023-00377-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,21]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["377"],"URL":"https:\/\/doi.org\/10.1007\/s11761-023-00377-5","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"type":"print","value":"1863-2386"},{"type":"electronic","value":"1863-2394"}],"subject":[],"published":{"date-parts":[[2023,9,21]]},"assertion":[{"value":"16 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}