{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:01:36Z","timestamp":1730203296484,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ccis.2012.6664610","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T21:48:02Z","timestamp":1385588882000},"page":"1372-1376","source":"Crossref","is-referenced-by-count":1,"title":["A trusted information sharing skeleton for privacy preservation"],"prefix":"10.1109","author":[{"given":"Chao","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zichun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"707","article-title":"Binary Codes capable of correcting deletions, insertions, and reversals[J]","volume":"10","author":"levenshtein","year":"1966","journal-title":"Cybernetics and Control Theory"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/ICDE.2006.1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/ICDM.2004.10110"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1142\/S0218488502001648"},{"key":"7","article-title":"A tool for mapping between two ontologies using explicit information[C]","author":"prasad","year":"2002","journal-title":"Proceedings of aamas 2002 Workshop on Ontologies and Agent Systems"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1007\/3-7908-1624-8_71"},{"key":"5","article-title":"Using WordNet as knowledge base for measuring semantic similarity between words[R]","author":"richardson","year":"1994","journal-title":"Technical Report CA-1294 Dublin City University School of Computer Applications"},{"key":"4","first-page":"251","author":"maedche","year":"2002","journal-title":"Measuring Similarity between Ontologies [C]"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICDE.2005.143"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/1142473.1142500"}],"event":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2012,10,30]]},"location":"Hangzhou, China","end":{"date-parts":[[2012,11,1]]}},"container-title":["2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637132\/6664530\/06664610.pdf?arnumber=6664610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T02:10:24Z","timestamp":1490235024000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6664610\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ccis.2012.6664610","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}