ACKNOWLEDGEMENTS
This work is supported by FEDER Funds through
the “Programa Operacional Factores de Competitivi-
dade - COMPETE” program and by National Funds
through “Fundac¸
˜
ao para a Ci
ˆ
encia e a Tecnologia
(FCT)” under the project Ambient Assisted Living for
All (AAL4ALL - QREN 13852).
REFERENCES
Adomavicius, G. and Alexander, T. (2011). Context-Aware
Recommender Systems. In Ricci, F., Rokach, L.,
Shapira, B., and Kantor, P. B., editors, Media, chap-
ter 7, pages 217–253. Springer US.
Bettencourt, N. and Silva, N. (2010). Recommending Ac-
cess to Web Resources based on User’s Profile and
Traceability. In the Tenth IEEE International Con-
ference on Computer and Information Technology,
CIT’10, pages 1108–1113, Bradford, UK. IEEE.
Convery, S. (2007). Network Authentication, Authoriza-
tion, and Accounting: Part One: Concepts, Ele-
ments and Approaches. The Internet Protocol Jour-
nal, 10(1):2–11.
Ghita, S., Nejdl, W., and Paiu, R. (2005). Semantically
Rich Recommendations in Social Networks for Shar-
ing, Exchanging and Ranking Semantic Context. So-
cial Networks, 3729:293–307.
Linden, G., Smith, B., and York, J. (2003). Amazon.com
recommendations: item-to-item collaborative filter-
ing. IEEE Internet Computing, 7(1):76–80.
MacKinnon, K. A. (2012). User Generated Content vs. Ad-
vertising: Do Consumers Trust the Word of Others
Over Advertisers? The Elon Journal of Undergrad-
uate Research in Communications, 3(1):14–22.
Nair, S. (2013). XACML Reference Architecture.
http://developers.xiomatics.com/blog/index/entry/
xacml-reference-architecture.html. Accessed on May
3, 2015.
Nimmons, S. (2012). Policy Enforcement Point Pattern.
http://stevenimmons.org/2012/02/policy-enforcement-
point-pattern/. Accessed on May 4, 2015.
Owen, S., Anil, R., Dunning, T., and Friedman, E. (2011).
Mahout in Action. Manning.
Parducci, B. and Lockhart, H. (2013). eXtensible Access
Control Markup Language (XACML) Version 3.0.
Technical Report January, OASIS.
Resnick, P., Kuwabara, K., Zeckhauser, R., and Friedman,
E. (2000). Reputation Systems. Communications of
the ACM, 43(12):45–48.
Ruohomaa, S., Kutvonen, L., and Koutrouli, E. (2007).
Reputation Management Survey. In Second Interna-
tional Conference on Availability, Reliability and Se-
curity, ARES’07, Vienna, Austria.
Said, A., Kille, B., De Luca, E. W., and Albayrak, S. (2011).
Personalizing Tags: A Folksonomy-like Approach for
Recommending Movies. In Proceedings of the Second
International Workshop on Information Heterogene-
ity and Fusion in Recommender Systems, HetRec’11,
pages 53–56, Chicago, IL, USA. ACM.
Schafer, J. B., Konstan, J. A., and Riedl, J. (2001).
E-Commerce Recommendation Applications. Data
Mining and Knowledge Discovery, 5(1):115–153.
Shardanand, U. and Maes, P. (1995). Social Informa-
tion Filtering: Algorithms for Automating “Word of
Mouth”. In the Proceedings of the ACM Confer-
ence on Human Factors in Computing Systems, editor,
Katz, I R and Mack, R and Marks, L and Rosson, M B
and Nielsen, J, volume 1 of CHI ’95, pages 210–217.
ACM Press/Addison-Wesley Publishing Co.
Speier, C., Valacich, J. S., and Vessey, I. (1999). The Influ-
ence of Task Interruption on Individual Decision Mak-
ing: An Information Overload Perspective. Decision
Sciences, 30(2):337–360.
Stephen, L., Dettelback, W., and Kaushik, N. (2008). Mod-
ernizing Access Control with Authorization Service.
Oracle - Developers and Identity Services, (Novem-
ber).
Vollbrecht, J. R., Calhoun, P. R., Farrell, S., Gommans, L.,
Gross, G. M., de Bruijn, B., de Laat, C. T., Holdrege,
M., and Spence, D. W. (2000). AAA Authorization
Framework [RFC 2904]. The Internet Society.
Wasserman, S. (2012). The Amazon Effect. http://www.
thenation.com/print/article/168125/amazon-effect.
Accessed on April 27, 2015.
Wasserman, S. and Faust, K. (1994). Social Network Anal-
ysis: Methods and Applications. Structural analysis
in the social sciences. Cambridge University Press, 1
edition.
Westerinen, A. and Schnizlein, J. (2001). Terminology for
Policy-Based Management [RFC 3198]. The Internet
Society.
Yavatkar, R., Pendarakis, D., and Guerin, R. (2000).
A Framework for Policy-based Admission Control
[RFC2753]. The Internet Society.
Recommending Access Policies in Cross-domain Internet
61