{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:25:28Z","timestamp":1762352728731,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2871447","type":"journal-article","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T19:09:54Z","timestamp":1538766594000},"page":"56647-56657","source":"Crossref","is-referenced-by-count":20,"title":["Privacy Preserving User Based Web Service Recommendations"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5289-4833","authenticated-orcid":false,"given":"Shahriar","family":"Badsha","sequence":"first","affiliation":[]},{"given":"Xun","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[]},{"given":"Dongxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2010.10"},{"key":"ref32","article-title":"Privacy-preserving task recommendation services for crowdsourcing","author":"shu","year":"2018","journal-title":"IEEE Trans Services Comput"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2514338"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2590944"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.59"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2013.15"},{"key":"ref12","first-page":"71","article-title":"Privacy-preserving content-based recommendations through homomorphic encryption","author":"erkin","year":"2012","journal-title":"Proc Inf Theory Benelux 2nd Joint WIC\/IEEE Symp Inf Theory Signal Process Benelux"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-016-0020-2"},{"key":"ref14","first-page":"35","article-title":"Privacy enhanced recommender system","author":"erkin","year":"2010","journal-title":"Proc of 31st Symp Inf Theory in the Benelux"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.148"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.248"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2006.4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2011.120"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/978-3-642-23088-2_14","article-title":"Privacy-aware DaaS services composition","author":"tbahriti","year":"2011","journal-title":"Proc 22nd Int Conf Database Expert Syst Appl (DEXA)"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-12229-8","author":"yi","year":"2014","journal-title":"Homomorphic Encryption and Applications"},{"key":"ref4","first-page":"280","article-title":"Multiparty computation from threshold homomorphic encryption","author":"cramer","year":"2001","journal-title":"Proc Int Conf Theory Appl Cryptograph Techn Adv Cryptol (EUROCRYPT)"},{"key":"ref27","first-page":"32","article-title":"Efficient cryptographic protocol design based on distributed El Gamal encryption","author":"brandt","year":"2005","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190726"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2516633.2516639"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"ref5","first-page":"186","article-title":"AWSR: Active Web service recommendation based on usage history","author":"kang","year":"2012","journal-title":"Proc of the IEEE International Conf on Web services (ICWS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2007.140"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68786-5_40"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.52"},{"journal-title":"Services Computing","year":"2007","author":"zhang","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.18"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2839587"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2015.41"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760458"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863050"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref25","first-page":"163","article-title":"Private recommendations generation for vertically partitioned datasets","author":"badsha","year":"2017","journal-title":"Proc Pacific Asia Conf Inf Syst (PACIS)"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08482447.pdf?arnumber=8482447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T17:37:30Z","timestamp":1693935450000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8482447\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2871447","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}