Abstract
As the amount of content and the number of users in social relationships is continually growing in the Internet, resource sharing and access policy management is difficult, time-consuming and error-prone. Cross-domain recommendation of private or protected resources managed and secured by each domain’s specific access rules is impracticable due to private security policies and poor sharing mechanisms. This work focus on exploiting resource’s content, user’s preferences, users’ social networks and semantic information to cross-relate different resources through their meta information using recommendation techniques that combine collaborative-filtering techniques with semantics annotations, by generating associations between resources. The semantic similarities established between resources are used on a hybrid recommendation engine that interprets user and resources’ semantic information. The recommendation engine allows the promotion and discovery of unknown-unknown resources to users that could not even know about the existence of those resources thus providing means to solve the cross-domain recommendation of private or protected resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adomavicius, G., Alexander, T.: Context-Aware Recommender Systems. In: Ricci, F., Rokach, L., Shapira, B., Kantor, P.B. (eds.) Media, chapp. 7. Springer, US (2011)
Bettencourt, N., Silva, N.: Recommending access to web resources based on user’s profile and traceability. In: the Tenth IEEE International Conference on Computer and Information Technology, CIT 2010, IEEE, Bradford, UK, June 2010
Convery, S.: Network authentication, authorization, and accounting: part one: concepts, elements and approaches. Internet Protoc. J. 10(1), 2–11 (2007)
Duhamel, T., Cooreman, G., De Vuyst, P.: MC DC 2009 - UNITE Report. Technical report, IAB Europe (2009). http://www.iabeurope.eu/files/7513/6852/2734/mc-dc-2009-iab-unite-report.pdf. Accessed 3 May 2015
Ghita, S., Nejdl, W., Paiu, R.: Semantically rich recommendations in social networks for sharing, exchanging and ranking semantic context. Soc. Netw. 3729, 293–307 (2005)
Kimberley, S.: European Web Users Stop Searching After First 10 Results (2009). http://www.mediaweek.co.uk/article/974179/european-web-users-stop-searching-first-10-results-report-reveals. Accessed 3 May 2015
Linden, G., Smith, B., York, J.: Amazon.com recommendations: item-to-item collaborative filtering. IEEE Internet Comput. 7(1), 76–80 (2003)
MacKinnon, K.A.: User generated content vs. advertising: do consumers trust the word of others over advertisers? Elon J. Undergrad. Res. Commun. 3(1), 14–22 (2012)
Nair, S.: XACML reference architecture (2013). https://www.axiomatics.com/blog/entry/xacml-reference-architecture.html. Accessed 3 May 2015
Nimmons, S.: Policy enforcement point pattern (2012). http://www.stevenimmons.org/2012/02/policy-enforcement-point-pattern/. Accessed 4 May 2015
Owen, S., Anil, R., Dunning, T., Friedman, E.: Mahout in Action. Manning, Manning (2011)
Parducci, B., Lockhart, H.: eXtensible Access Control Markup Language (XACML) version 3.0. Technical report, OASIS, January 2013
Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43(12), 45–48 (2000)
Ruohomaa, S., Kutvonen, L., Koutrouli, E.: Reputation management survey. In: Second International Conference on Availability, Reliability and Security, ARES 2007, Vienna, Austria, April 2007
Said, A., Kille, B., De Luca, E.W., Albayrak, S.: Personalizing tags: a folksonomy-like approach for recommending movies. In: Proceedings of the Second International Workshop on Information Heterogeneity and Fusion in Recommender Systems, HetRec 2011, pp. 53–56. ACM, Chicago, October 2011
Schafer, J.B., Konstan, J.A., Riedl, J.: E-commerce recommendation applications. Data Min. Knowl. Discov. 5(1), 115–153 (2001)
Shardanand, U., Maes, P.: Social information filtering: algorithms for automating “Word of Mouth”. In: the Proceedings of the ACM Conference on Human Factors in Computing Systems, CHI 1995, vol. 1. ACM Press/Addison-Wesley Publishing Co. (1995)
Speier, C., Valacich, J.S., Vessey, I.: The influence of task interruption on individual decision making: an information overload perspective. Decis. Sci. 30(2), 337–360 (1999)
Stephen, L., Dettelback, W., Kaushik, N.: Modernizing Access Control with Authorization Service. Oracle - Developers and Identity Services, November 2008
Vollbrecht, J.R., Calhoun, P.R., Farrell, S., Gommans, L., Gross, G.M., de Bruijn, B., de Laat, C.T., Holdrege, M., Spence, D.W.: AAA Authorization Framework [RFC 2904], the Internet Society (2000)
Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications, Structural Analysis in the Social Sciences, 1st edn. Cambridge University Press, Cambridge (1994)
Wasserman, S.: The amazon effect, May 2012. http://www.thenation.com/print/article/168125/amazon-effect. Accessed 27 Apr 2015
Westerinen, A., Schnizlein, J.: Terminology for policy-based management [RFC 3198], the Internet Society (2001)
Yavatkar, R., Pendarakis, D., Guerin, R.: A Framework for Policy-based Admission Control [RFC2753], the Internet Society (2000)
Acknowledgements
This work is supported through FEDER Funds, by “Programa Operacional Factores de Competitividade - COMPETE” program and by National Funds through “Fundaçãopara a Ciência e a Tecnologia (FCT)” under the project Ambient Assisted Living for All (AAL4ALL – QREN 13852).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Bettencourt, N., Silva, N., Barroso, J. (2016). Semantically Enhancing Recommender Systems. In: Fred, A., Dietz, J., Aveiro, D., Liu, K., Filipe, J. (eds) Knowledge Discovery, Knowledge Engineering and Knowledge Management. IC3K 2015. Communications in Computer and Information Science, vol 631. Springer, Cham. https://doi.org/10.1007/978-3-319-52758-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-52758-1_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-52757-4
Online ISBN: 978-3-319-52758-1
eBook Packages: Computer ScienceComputer Science (R0)