메뉴 건너뛰기




Volumn 51, Issue 6, 2013, Pages 136-141

The pursuit of citizens' privacy: A privacy-aware smart city is possible

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION AND COMMUNICATION TECHNOLOGIES; LOCAL PROBLEMS; LOCATION PRIVACY; PRIVACY BREACHES; PRIVACY ENHANCING TECHNOLOGIES; PRIVACY MODELS; PRIVACY-AWARE; QUALITY OF LIFE;

EID: 84879098109     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2013.6525606     Document Type: Article
Times cited : (268)

References (16)
  • 2
    • 84897703904 scopus 로고    scopus 로고
    • http://www. fastcoexist. com/1679127/ the-top-10-smart-cities-on- theplanet
    • B. Cohen, "The top 10 Smart Cities on the Planet, " http: //www. fastcompany. com, 2012; http://www. fastcoexist. com/1679127/ the-top-10-smart-cities-on-theplanet.
    • (2012) The top 10 Smart Cities on the Planet
    • Cohen, B.1
  • 3
    • 84879079254 scopus 로고    scopus 로고
    • EC
    • EC, "Protection of Personal Data, " http: //ec. europa. eu/justice/data-protection/index en. htm, 2013.
    • (2013) Protection of Personal Data
  • 4
    • 38049048780 scopus 로고    scopus 로고
    • A three-dimensional conceptual framework for database privacy
    • W. Jonker and M. Petkovic, Eds., Springer
    • J. Domingo-Ferrer, "A Three-Dimensional Conceptual Framework for Database Privacy, " W. Jonker and M. Petkovic, Eds., Secure Data Management, Lecture Notes in Computer Science, vol. 4721, Springer, 2007, pp. 193-202.
    • (2007) Secure Data Management, Lecture Notes in Computer Science , vol.4721 , pp. 193-202
    • Domingo-Ferrer, J.1
  • 6
    • 36549043405 scopus 로고    scopus 로고
    • Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
    • Jan.
    • B. Gedik and L. Liu, "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms, " IEEE Trans. Mobile Computing, vol. 7, Jan. 2008, pp. 1-18.
    • (2008) IEEE Trans. Mobile Computing , vol.7 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 8
    • 84879113772 scopus 로고    scopus 로고
    • IBM, Integrated Fare Management for Transportation
    • IBM, Integrated Fare Management for Transportation, , 2011, http://www. ibm. com/smarterplanet/us/en/traffic/ congestion/nextsteps/solution/ G080151O85496M88. html.
    • (2011)
  • 9
    • 85009123390 scopus 로고    scopus 로고
    • Liander and AIM
    • Liander and AIM, "Amsterdam Smart City, " 2012, http://www. amsterdamsmartcity. nl/#/en.
    • (2012) Amsterdam smart city
  • 10
    • 84861541273 scopus 로고    scopus 로고
    • Towards a trustworthy privacy in pervasive video surveillance systems
    • A. Martínez-Ballesté et al., "Towards A Trustworthy Privacy in Pervasive Video Surveillance Systems, " IEEE PerCom Wksps., 2012, pp. 914-19.
    • (2012) IEEE PerCom Wksps. , pp. 914-919
    • Martínez-Ballesté, A.1
  • 13
    • 34247465966 scopus 로고    scopus 로고
    • A distributed architecture for scalable private rfid tag identification
    • A. Solanas et al., "A Distributed Architecture for Scalable Private RFID Tag Identification, " Computer Networks, vol. 51, no. 9, 2007, pp. 2268-79.
    • (2007) Computer Networks , vol.51 , Issue.9 , pp. 2268-2279
    • Solanas, A.1
  • 14
    • 40949126919 scopus 로고    scopus 로고
    • A TTP-free protocol for location privacy in location-based services
    • A. Solanas and A. Martínez-Ballesté, "A TTP-Free Protocol for Location Privacy in Location-Based Services, " Computer Commun., vol. 31, no. 6, 2008, pp. 1181-91.
    • (2008) Computer Commun. , vol.31 , Issue.6 , pp. 1181-1191
    • Solanas, A.1    Martínez-Ballesté, A.2
  • 15
    • 10944270172 scopus 로고    scopus 로고
    • Privacy-preserving data mining: Why, how, and when
    • Nov.-Dec.
    • J. Vaidya and C. Clifton, "Privacy-Preserving Data Mining: Why, How, and When, " IEEE Security Privacy, vol. 2, no. 6, Nov.-Dec. 2004, pp. 19-27.
    • (2004) IEEE Security Privacy , vol.2 , Issue.6 , pp. 19-27
    • Vaidya, J.1    Clifton, C.2
  • 16
    • 84879088959 scopus 로고    scopus 로고
    • Single-Database Private Information Retrieval from fully Homomorphic Encryption
    • X. Yi et al., "Single-Database Private Information Retrieval from fully Homomorphic Encryption, " IEEE Trans. Knowledge and Data Engineering, vol. PP, no. 99, 2012, p. 1.
    • (2012) IEEE Trans. Knowledge and Data Engineering , vol.99 , pp. 1
    • Yi, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.