{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:24Z","timestamp":1750307244473,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,26]],"date-time":"2012-03-26T00:00:00Z","timestamp":1332720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["257115"],"award-info":[{"award-number":["257115"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0746943"],"award-info":[{"award-number":["CNS-0746943"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,26]]},"DOI":"10.1145\/2245276.2245362","type":"proceedings-article","created":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T13:03:31Z","timestamp":1339419811000},"page":"447-452","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine"],"prefix":"10.1145","author":[{"given":"Anirban","family":"Basu","sequence":"first","affiliation":[{"name":"Tokai University, Takanawa, Minato-ku, Tokyo, Japan"}]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"The State University of New Jersey, Newark, New Jersey"}]},{"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[{"name":"British Telecom, Martlesham Heath, Ipswitch, UK"}]},{"given":"Hiroaki","family":"Kikuchi","sequence":"additional","affiliation":[{"name":"Tokai University, Kanagawa, Japan, Kanagawa, Japan"}]}],"member":"320","published-online":{"date-parts":[[2012,3,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Above the clouds: A berkeley view of cloud computing. EECS Department","author":"Armbrust M.","year":"2009","unstructured":"M. Armbrust , A. Fox , R. Griffith , A. Joseph , R. Katz , A. Konwinski , G. Lee , D. Patterson , A. Rabkin , I. Stoica , and Others. Above the clouds: A berkeley view of cloud computing. EECS Department , University of California , Berkeley, Tech . Rep. UCB\/EECS- 2009 -28, 2009. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and Others. Above the clouds: A berkeley view of cloud computing. EECS Department, University of California, Berkeley, Tech. Rep. UCB\/EECS-2009-28, 2009."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the international workshop on Trust and Privacy in Distributed Information Processing (workshop at the IFIPTM 2011","author":"Basu A.","year":"2011","unstructured":"A. Basu , H. Kikuchi , and J. Vaidya . Privacy-preserving weighted Slope One predictor for Item-based Collaborative Filtering . In Proceedings of the international workshop on Trust and Privacy in Distributed Information Processing (workshop at the IFIPTM 2011 ), Copenhagen, Denmark , 2011 . A. Basu, H. Kikuchi, and J. Vaidya. Privacy-preserving weighted Slope One predictor for Item-based Collaborative Filtering. In Proceedings of the international workshop on Trust and Privacy in Distributed Information Processing (workshop at the IFIPTM 2011), Copenhagen, Denmark, 2011."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/648118.746742"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.43"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22200-9_11"},{"key":"e_1_3_2_1_10_1","first-page":"20","volume-title":"Proceedings of the 7th USENIX conference on Networked systems design and implementation","author":"Roy I.","year":"2010","unstructured":"I. Roy , S. Setty , A. Kilzer , V. Shmatikov , and E. Witchel . Airavat: Security and privacy for mapreduce . In Proceedings of the 7th USENIX conference on Networked systems design and implementation , pages 20 -- 20 . USENIX Association , 2010 . I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for mapreduce. In Proceedings of the 7th USENIX conference on Networked systems design and implementation, pages 20--20. USENIX Association, 2010."},{"key":"e_1_3_2_1_11_1","volume-title":"Multi-dimensional range query over encrypted data","author":"Shi E.","year":"2007","unstructured":"E. Shi , J. Bethencourt , T. Chan , D. Song , and A. Perrig . Multi-dimensional range query over encrypted data . 2007 . E. Shi, J. Bethencourt, T. Chan, D. Song, and A. Perrig. Multi-dimensional range query over encrypted data. 2007."}],"event":{"name":"SAC 2012: ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Trento Italy","acronym":"SAC 2012"},"container-title":["Proceedings of the 27th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2245276.2245362","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2245276.2245362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:01Z","timestamp":1750243921000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2245276.2245362"}},"subtitle":["a performance case study"],"short-title":[],"issued":{"date-parts":[[2012,3,26]]},"references-count":10,"alternative-id":["10.1145\/2245276.2245362","10.1145\/2245276"],"URL":"https:\/\/doi.org\/10.1145\/2245276.2245362","relation":{},"subject":[],"published":{"date-parts":[[2012,3,26]]},"assertion":[{"value":"2012-03-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}