{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:31:59Z","timestamp":1720114319542},"reference-count":46,"publisher":"Elsevier BV","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1016\/j.ins.2013.04.007","type":"journal-article","created":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T17:57:23Z","timestamp":1366221443000},"page":"387-402","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":17,"special_numbering":"C","title":["DocCloud: A document recommender system on cloud computing with plausible deniability"],"prefix":"10.1016","volume":"258","author":[{"given":"Juan","family":"Vera-del-Campo","sequence":"first","affiliation":[]},{"given":"Josep","family":"Pegueroles","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Hern\u00e1ndez-Serrano","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Soriano","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2013.04.007_b0005","doi-asserted-by":"crossref","DOI":"10.1016\/S0022-0000(03)00025-4","article-title":"Database-friendly random projections: Johnson\u2013Lindenstrauss with binary coins","author":"Achlioptas","year":"2003","journal-title":"Journal of Computer and System Sciences"},{"key":"10.1016\/j.ins.2013.04.007_b0010","series-title":"RecSys \u201907: Proceedings of the 2007 ACM Conference on Recommender Systems","first-page":"41","article-title":"Complex-network theoretic clustering for identifying groups of similar listeners in p2p systems","author":"Anglade","year":"2007"},{"key":"10.1016\/j.ins.2013.04.007_b0015","unstructured":"S.K. Belle, M. Waldvogel, Consistent deniable lying: privacy in mobile social networks, in: Workshop on Security and Privacy Issues in Mobile Phone Use."},{"key":"10.1016\/j.ins.2013.04.007_b0020","unstructured":"O. Berthold, H. Langos, Dummy traffic against long term intersection attacks, in: Privacy Enhancing Technologies."},{"key":"10.1016\/j.ins.2013.04.007_b0025","doi-asserted-by":"crossref","unstructured":"J. Bian, Jigdfs: A secure distributed file system, in: IEEE Symposium on Computational Intelligence in Cyber Security.","DOI":"10.1109\/CICYBS.2009.4925093"},{"key":"10.1016\/j.ins.2013.04.007_b0030","doi-asserted-by":"crossref","unstructured":"J. Canny, Collaborative filtering with privacy, in: Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002, pp. 45\u201357.","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"10.1016\/j.ins.2013.04.007_b0035","doi-asserted-by":"crossref","unstructured":"K. Chard, S. Caton, O. Rana, K. Bubendorfer, Social cloud: cloud computing in social networks, in: Proceedings of the 3rd International Conference on Cloud Computing IEEE Cloud, 2010.","DOI":"10.1109\/CLOUD.2010.28"},{"key":"10.1016\/j.ins.2013.04.007_b0040","doi-asserted-by":"crossref","unstructured":"C.W. Clifton, M. Murugesan, Providing Privacy Through Plausibly Deniable Search, 2009.","DOI":"10.1137\/1.9781611972795.66"},{"key":"10.1016\/j.ins.2013.04.007_b0045","unstructured":"enigmax, Cyberlocker Ecosystem Shocked as Big Players Take Drastic Action, 2012. ."},{"key":"10.1016\/j.ins.2013.04.007_b0050","first-page":"60","article-title":"From epidemics to distributed computing","volume":"37","author":"Euster","year":"2004","journal-title":"IEEE Computer"},{"key":"10.1016\/j.ins.2013.04.007_b0055","unstructured":"C. Gentry, Z. Ramzan, Single-database private information retrieval with constant communication rate, in: Automata, Languages and Programming, vol. 3580\/2005 of Lecture Notes in Computer Science, pp. 803\u2013815."},{"key":"10.1016\/j.ins.2013.04.007_b0060","series-title":"Handbook of Peer-to-Peer Networking","first-page":"47","article-title":"The social impact of p2p systems","author":"Glorioso","year":"2010"},{"key":"10.1016\/j.ins.2013.04.007_b0065","doi-asserted-by":"crossref","unstructured":"O. Hermoni, N. Gilboa, E. Felstaine, S. Shitrit, Deniability\u2014an alibi for users in p2p networks, in: 3rd International Conference on Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008, pp. 310\u2013317.","DOI":"10.1109\/COMSWA.2008.4554432"},{"key":"10.1016\/j.ins.2013.04.007_b0070","first-page":"1","article-title":"Low-cost group rekeying for unattended wireless sensor networks","author":"Hern\u00e1ndez-Serrano","year":"2012","journal-title":"Wireless Networks"},{"key":"10.1016\/j.ins.2013.04.007_b0075","doi-asserted-by":"crossref","unstructured":"W. Hu, T. Yang, J.N. Matthews, The good, the bad and the ugly of costumer cloud storage, in: ACM SIGOPS Operating Systems Review, vol. 44, pp. 110\u2013115.","DOI":"10.1145\/1842733.1842751"},{"key":"10.1016\/j.ins.2013.04.007_b0080","series-title":"Probability Theory: The Logic of Science: Principles and Elementary Applications","author":"Jaynes","year":"2003"},{"key":"10.1016\/j.ins.2013.04.007_b0085","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1109\/TCE.2010.5506036","article-title":"Personalized DTV program recommendation system under a cloud computing environment","volume":"56","author":"Lee","year":"2010","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10.1016\/j.ins.2013.04.007_b0090","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TKDE.2006.14","article-title":"Random projection-based multiplicative data perturbation for privacy preserving distributed data mining","volume":"18","author":"Liu","year":"2006","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/j.ins.2013.04.007_b0095","series-title":"Proceedings of the third ACM Conference on Recommender Systems, RecSys \u201909","first-page":"189","article-title":"Learning to recommend with trust and distrust relationships","author":"Ma","year":"2009"},{"key":"10.1016\/j.ins.2013.04.007_b0100","unstructured":"A. Machanavajjhala, A. Korolova, A.D. Sarma, On the (Im)possibility of Preserving Utility and Privacy in Personalized Social Recommendations, Technical Report arXiv:1004.5600, 2010."},{"key":"10.1016\/j.ins.2013.04.007_b0105","series-title":"An Introduction to Information Retrieval","author":"Manning","year":"2009"},{"key":"10.1016\/j.ins.2013.04.007_b0110","unstructured":"M. Mao, Ontology mapping: An information retrieval and interactive activation network based approach, in: The Semantic Web, vol. 4825 of Lecture Notes in Computer Science, pp. 931\u2013935."},{"key":"10.1016\/j.ins.2013.04.007_b0115","unstructured":"B. Markines, C. Cattuto, F. Menczer, D. Benz, Andreas, Evaluating similarity measures for emergent semantics of social tagging, in: 18th International Conference on World Wide Web, pp. 641\u2013650."},{"key":"10.1016\/j.ins.2013.04.007_b0120","unstructured":"D. Meyer, Acta rejected by Europe, leaving copyright treaty near dead 2012. ."},{"key":"10.1016\/j.ins.2013.04.007_b0125","unstructured":"R. Mortier, A. Madhavapeddy, T.W. Hong, D. Murray, M. Schwartzkopf, Using Dust Clouds to Enhance Anonymous Communication."},{"key":"10.1016\/j.ins.2013.04.007_b0130","series-title":"Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC\u201907","first-page":"393","article-title":"A survey of single-database private information retrieval: techniques and applications","author":"Ostrovsky","year":"2007"},{"key":"10.1016\/j.ins.2013.04.007_b0135","doi-asserted-by":"crossref","unstructured":"P. Paillier, Public-key cryptosystems Based on Composite Degree residuosity classes, in: EUROCRYPT.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"10.1016\/j.ins.2013.04.007_b0140","doi-asserted-by":"crossref","unstructured":"S. Pearson, Y. Shen, M. Mowbray, A privacy manager for cloud computing, in: CloudComp 2009, Number 5931 in Lecture Notes in Computer Science, pp. 90\u2013106.","DOI":"10.1007\/978-3-642-10665-1_9"},{"key":"10.1016\/j.ins.2013.04.007_b0145","unstructured":"J. Pouwelse, J. Yang, M. Meulpolder, D. Epema, H. Sips, Buddycast: an operational peer-to-peer epidemoc protocol stack, in: Fourteenth Annual Conference of the Advanced School for Computing and Imaging."},{"key":"10.1016\/j.ins.2013.04.007_b0150","doi-asserted-by":"crossref","unstructured":"D. Rebollo, J. Forn\u00e9, Optimized query forgery for private information retrieval, in: IEEE Trans. Inform. Theory, vol. 56. pp. 4631\u20134642.","DOI":"10.1109\/TIT.2010.2054471"},{"key":"10.1016\/j.ins.2013.04.007_b0155","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.ins.2012.08.022","article-title":"A modification of the Lloyd algorithm for k-anonymous quantization","volume":"222","author":"Rebollo-Monedero","year":"2013","journal-title":"Elsevier Information Science"},{"key":"10.1016\/j.ins.2013.04.007_b0160","unstructured":"M. Reiter, A. Rubin, Crowds: anonymity for web transactions, in: ACM Transactions on Information and System Security."},{"key":"10.1016\/j.ins.2013.04.007_b0165","series-title":"Conference on Computer supported Cooperative Work","first-page":"175","article-title":"Grouplens: an open architecture for collaborative filtering of netnews","author":"Resnick","year":"1994"},{"key":"10.1016\/j.ins.2013.04.007_b0170","series-title":"ACM Conference on Recommender systems","first-page":"27","article-title":"Mobhinter: epidemic collaborative filtering and self-organization in mobile ad-hoc networks","author":"Schifanella","year":"2008"},{"key":"10.1016\/j.ins.2013.04.007_b0175","unstructured":"C. Sosa, B.C. Sutton, H.H. Huang, Picfs: the privacy-enhancing image-based collaborative file system."},{"key":"10.1016\/j.ins.2013.04.007_b0180","unstructured":"Stockholm District Court, Verdict b 13301-06, 17 April 2009, 2009."},{"key":"10.1016\/j.ins.2013.04.007_b0185","unstructured":"R. Thiagarajan, G. Manjunath, M. Stumptner, Finding experts by semantic matching of user profiles, in: 3rd Expert Finder Workshop on Personal Identification and Collaborations: Knowledge Mediation and Extraction."},{"key":"10.1016\/j.ins.2013.04.007_b0190","unstructured":"Trade European Commission, The anti-counterfeiting trade agreement (acta), 2010. ."},{"key":"10.1016\/j.ins.2013.04.007_b0195","unstructured":"D.T. Tran, S. Bloehdorn, P. Cimiano, P. Haase, Expressive resource descriptions for ontology-based information retrieval, in: Proceedings of the 1st International Conference on the Theory of Information Retrieval (ICTIR\u201907), 18\u201320th October 2007, Budapest, Hungary, pp. 55\u201368."},{"key":"10.1016\/j.ins.2013.04.007_b0200","unstructured":"US Department of Justice, Justice Department Charges Leaders of Megaupload with Widespread Online Copyright Infringement, 2012. http:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/justice-department-charges-leaders-of-megaupload-with-widespread-online-copyright-infringement."},{"key":"10.1016\/j.ins.2013.04.007_b0205","unstructured":"USLegal, Plausible deniability law & legal definition, 2011. http:\/\/definitions.uslegal.com\/p\/plausable-deniability\/."},{"key":"10.1016\/j.ins.2013.04.007_b0210","unstructured":"J. Vera-del-Campo, J. Hern\u00e1ndez-Serrano, J. Pegueroles, Scfs: Design and Implementation of a Secure Distributed Filesystem, SECRYPT, 2008."},{"key":"10.1016\/j.ins.2013.04.007_b0215","unstructured":"J. Vera-del-Campo, J. Hern\u00e1ndez-Serrano, J. Pegueroles, Profile-based searches on p2p social networks, in: The Ninth International Conference on Networks, ICN."},{"key":"10.1016\/j.ins.2013.04.007_b0220","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.comcom.2012.07.018","article-title":"Design of a p2p content recommendation system using affinity networks","volume":"36","author":"Vera-del-Campo","year":"2012","journal-title":"Computer Communications"},{"key":"10.1016\/j.ins.2013.04.007_b0225","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1109\/TSMCC.2010.2040275","article-title":"Privacy-preserving collaborative recommender systems","volume":"40","author":"Zhan","year":"2010","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"10.1016\/j.ins.2013.04.007_b0230","first-page":"3013","article-title":"Cross-system privacy preserving recommendation algorithm based on secure multi-party computation","volume":"6","author":"Zhang","year":"2010","journal-title":"Journal of Computational Information Systems"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025513002958?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025513002958?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T19:18:59Z","timestamp":1562959139000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025513002958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":46,"alternative-id":["S0020025513002958"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2013.04.007","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2014,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"DocCloud: A document recommender system on cloud computing with plausible deniability","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2013.04.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}