메뉴 건너뛰기




Volumn , Issue , 2012, Pages 75-84

Negotiation-based privacy preservation scheme in internet of things platform

Author keywords

Anonymization; Internet of things; Masking; Privacy; Utility and negotiation

Indexed keywords

ANONYMIZATION; DIVERSE DOMAINS; HETEROGENEOUS DEVICES; INTERNET OF THINGS (IOT); MULTIPLE DATA SOURCES; PRIVACY PRESERVATION; PRIVACY PROBLEMS; UTILITY AND NEGOTIATION;

EID: 84879805810     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2490428.2490439     Document Type: Conference Paper
Times cited : (28)

References (19)
  • 4
    • 84859221764 scopus 로고    scopus 로고
    • Small domain randomization: Same privacy, more utility
    • September
    • R. Chaytor and K.Wang, "Small domain randomization: same privacy, more utility", Proceedings of the VLDB Endowment, vol: 3, Issue: 1-2, September 2010.
    • (2010) Proceedings of the VLDB Endowment , vol.3 , Issue.1-2
    • Chaytor, R.1    Wang, K.2
  • 7
    • 84879805106 scopus 로고    scopus 로고
    • Available from Cisco at, (accessed on 10 May, 2012
    • Cisco Satellite Solutions (IRIS), Available from Cisco at http://www.cisco.com/web/strategy/government/space-routing.html (accessed on 10 May, 2012).
    • Cisco Satellite Solutions (IRIS)
  • 8
    • 84969931080 scopus 로고    scopus 로고
    • On the impossibility of cryptography alone for privacy-preserving cloud computing
    • M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing", USENIX conference on Hot topics in security, 2010.
    • (2010) USENIX Conference on Hot Topics in Security
    • Dijk, M.V.1    Juels, A.2
  • 9
    • 84877727033 scopus 로고    scopus 로고
    • The internet of things: How the next evolution of the internet is changing everything
    • April
    • D. Evans, "The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, " CISCO Whitepaper, April, 2011.
    • (2011) CISCO Whitepaper
    • Evans, D.1
  • 11
    • 84879832519 scopus 로고    scopus 로고
    • Available from IBM at, (accessed on 10 May, 2012
    • IBM Smarter Planet, Available from IBM at http://www.ibm.com/ smarterplanet/us/en/(accessed on 10 May, 2012).
    • IBM Smarter Planet
  • 12
    • 34250673244 scopus 로고    scopus 로고
    • Injecting utility into anonymized datasets
    • D. Kifer and Jo. Gehrke, "Injecting utility into anonymized datasets, " ACM SIGMOD, pp. 217 - 228, 2006.
    • (2006) ACM SIGMOD , pp. 217-228
    • Kifer, D.1    Gehrke, Jo.2
  • 14
    • 84861611480 scopus 로고    scopus 로고
    • Security and privacy challenges in the internet of things
    • Kassel, Germany, March
    • C. Mayer, "Security and Privacy Challenges in the Internet of Things, " KiVS Workshop on Global Sensor Networks (GSN09), Kassel, Germany, March 2009.
    • (2009) KiVS Workshop on Global Sensor Networks (GSN09)
    • Mayer, C.1
  • 16
    • 84879834003 scopus 로고    scopus 로고
    • Available from the Wikipedia at, (accessed on 10 May, 2012
    • Wikipedia, AlertMe, Available from the Wikipedia at http://en.wikipedia. org/wiki/AlertMe (accessed on 10 May, 2012).
    • AlertMe
  • 17
    • 33749582207 scopus 로고    scopus 로고
    • Utility-based anonymization using local recoding
    • J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. Wai-Chee Fu. "Utility-based anonymization using local recoding, " ACM SIGKDD, pp. 785 - 790, 2006.
    • (2006) ACM SIGKDD , pp. 785-790
    • Xu, J.1    Wang, W.2    Pei, J.3    Wang, X.4    Shi, B.5    Fu, A.W.-C.6
  • 19
    • 83755197918 scopus 로고    scopus 로고
    • Embedded security for Internet of things
    • A. Ukil, J. Sen, and S. Koilakonda, "Embedded security for Internet of things, " IEEE NCETACS, pp. 1- 6, 2011.
    • (2011) IEEE NCETACS , pp. 1-6
    • Ukil, A.1    Sen, J.2    Koilakonda, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.