-
6
-
-
77956877124
-
The Internet of Things: A survey
-
10.1016/j.comnet.2010.05.010 1208.68071
-
Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw 54(15):2787-2805
-
(2010)
Comput Netw
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
7
-
-
84885884531
-
Context-aware usage control for android
-
Springer New York 10.1007/978-3-642-16161-2-19
-
Bai G, Gu L, Feng T, Guo Y, Chen X (2010) Context-aware usage control for android. In: Security and privacy in communication networks, Springer, New York, pp 326-343
-
(2010)
Security and Privacy in Communication Networks
, pp. 326-343
-
-
Bai, G.1
Gu, L.2
Feng, T.3
Guo, Y.4
Chen, X.5
-
9
-
-
84866512143
-
A survey of context data distribution for mobile ubiquitous systems
-
Bellavista P, Corradi A, Fanelli M, Foschini L (2012) A survey of context data distribution for mobile ubiquitous systems. ACM Comput Surv 44(24):24:1-24:45
-
(2012)
ACM Comput Surv
, vol.44
, Issue.24
, pp. 241-2445
-
-
Bellavista, P.1
Corradi, A.2
Fanelli, M.3
Foschini, L.4
-
10
-
-
77950189737
-
A survey of context modelling and reasoning techniques
-
10.1016/j.pmcj.2009.06.002
-
Bettini C, Brdiczka O, Henricksen K, Indulska J, et al (2010) A survey of context modelling and reasoning techniques. Pervasive Mob Comp 6(2):161-180
-
(2010)
Pervasive Mob Comp
, vol.6
, Issue.2
, pp. 161-180
-
-
Bettini, C.1
Brdiczka, O.2
Henricksen, K.3
Indulska, J.4
-
11
-
-
84861557323
-
Trust and obfuscation principles for quality of information in emerging pervasive environments
-
Bisdikian C, Sensoy M, Norman TJ, Srivastava MB (2012) Trust and obfuscation principles for quality of information in emerging pervasive environments. In: IEEE international conference on pervasive computing and communications, PerCom 2012, 19-23 March 2012, Lugano, workshop proceedings, pp 44-49
-
(2012)
IEEE International Conference on Pervasive Computing and Communications, PerCom 2012, 19-23 March 2012, Lugano, Workshop Proceedings
, pp. 44-49
-
-
Bisdikian, C.1
Sensoy, M.2
Norman, T.J.3
Srivastava, M.B.4
-
12
-
-
84865458860
-
Privacy 3.0:= data minimization + user control + contextual integrity
-
Borcea-Pfitzmann K, Pfitzmann A, Berg M (2011) Privacy 3.0:= data minimization + user control contextual integrity. Inf Technol 53(1):34-40
-
(2011)
Inf Technol
, vol.53
, Issue.1
, pp. 34-40
-
-
Borcea-Pfitzmann, K.1
Pfitzmann, A.2
Berg, M.3
-
13
-
-
77950577596
-
Measuring the probability of correctness of contextual information in context aware systems
-
autonomic and secure computing, Washington
-
Brgulja N, Kusber R, David K, Baumgarten M (2009) Measuring the probability of correctness of contextual information in context aware systems. In: 8th IEEE international conference on dependable, autonomic and secure computing, Washington
-
(2009)
8th IEEE International Conference on Dependable
-
-
Brgulja, N.1
Kusber, R.2
David, K.3
Baumgarten, M.4
-
14
-
-
34250714819
-
Managing quality of context in pervasive computing
-
QSIC 2006
-
Bu Y, Gu T, Tao X, Li J, Chen S, Lu J (2006) Managing quality of context in pervasive computing. In: Sixth international conference on quality software, QSIC 2006
-
(2006)
Sixth International Conference on Quality Software
-
-
Bu, Y.1
Gu, T.2
Tao, X.3
Li, J.4
Chen, S.5
Lu, J.6
-
16
-
-
84895061686
-
-
Canadian and Dutch Protection Authorities pdf Accessed 15 Feb 2013
-
Canadian and Dutch Protection Authorities (1995) Privacy-enhancing technologies: the path to anonymity. http://www.ontla.on.ca/library/repository/ mon/10000/184530.pdf Accessed 15 Feb 2013
-
(1995)
Privacy-enhancing Technologies: The Path to Anonymity
-
-
-
17
-
-
0036993076
-
Collaborative filtering with privacy via factor analysis
-
Canny J (2002) Collaborative filtering with privacy via factor analysis. In: 25th ACM SIGIR
-
(2002)
25th ACM SIGIR
-
-
Canny, J.1
-
21
-
-
84880261767
-
Building ubiquitous QoC-aware applications through model-driven software engineering
-
10.1016/j.scico.2012.07.019 10.1016/j.scico.2012.07.019
-
Chabridon S, Conan D, Abid Z, Taconet C (2012) Building ubiquitous QoC-aware applications through model-driven software engineering. Sci Comput Program 78:1912-1929. doi: 10.1016/j.scico.2012.07.019
-
(2012)
Sci Comput Program
, vol.78
, pp. 1912-1929
-
-
Chabridon, S.1
Conan, D.2
Abid, Z.3
Taconet, C.4
-
22
-
-
84861187405
-
Balancing behavioral privacy and information utility in sensory data flows
-
10.1016/j.pmcj.2012.03.002
-
Chakraborty S, Charbiwala Z, Choi H, Raghavan KR, Srivastava MB (2012) Balancing behavioral privacy and information utility in sensory data flows. Pervasive Mob Comput 8(3):331-345
-
(2012)
Pervasive Mob Comput
, vol.8
, Issue.3
, pp. 331-345
-
-
Chakraborty, S.1
Charbiwala, Z.2
Choi, H.3
Raghavan, K.R.4
Srivastava, M.B.5
-
25
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84-88 (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
26
-
-
80255136670
-
Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence
-
10.1016/j.pmcj.2011.10.001
-
Conti M, Das SK, Bisdikian C, Kumar M, et al (2012) Looking ahead in pervasive computing: challenges and opportunities in the era of cyber-physical convergence. Pervasive Mob Comput 8(1):2-21
-
(2012)
Pervasive Mob Comput
, vol.8
, Issue.1
, pp. 2-21
-
-
Conti, M.1
Das, S.K.2
Bisdikian, C.3
Kumar, M.4
-
27
-
-
14544294542
-
Context is key
-
DOI 10.1145/1047671.1047703
-
Coutaz J, Crowley JL, Dobson S, Garlan D (2005) Context is key. Commun ACM 48(3):49-53 (Pubitemid 40303805)
-
(2005)
Communications of the ACM
, vol.48
, Issue.3
, pp. 49-53
-
-
Coutaz, J.1
Crowley, J.L.2
Dobson, S.3
Garlan, D.4
-
28
-
-
0035791053
-
Securing context-aware applications using environment roles
-
Covington M, Long W, Srinivasan S, Dey A, Ahamad M, Abowd G (2001) Securing context-aware applications using environment roles. In: 6th ACM symposium on access control models and technologies
-
(2001)
6th ACM Symposium on Access Control Models and Technologies
-
-
Covington, M.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
29
-
-
64749086317
-
A contextual attribute-based access control model
-
Covington M, Sastry M (2006) A contextual attribute-based access control model. In: OTM
-
(2006)
OTM
-
-
Covington, M.1
Sastry, M.2
-
31
-
-
85180633166
-
SybilInfer: Detecting sybil nodes using social networks
-
Danezis G, Mittal P (2009) SybilInfer: detecting sybil nodes using social networks. In: NDSS
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
39
-
-
84867380837
-
Cyber foraging: Bridging mobile and cloud computing
-
10.2200/S00447ED1V01Y201209MPC010
-
Flinn J (2012) Cyber foraging: bridging mobile and cloud computing. Synth Lect Mob Pervasive Comput 7(2):1-103
-
(2012)
Synth Lect Mob Pervasive Comput
, vol.7
, Issue.2
, pp. 1-103
-
-
Flinn, J.1
-
42
-
-
84895062898
-
-
Technical report, uTRUSTit project
-
Graf C, Busch M, Schulz T, Hochleitner C, Skeide Fuglerud K (2012) D2.7 updated design guidelines on the security feedback provided by the "Things". Technical report, uTRUSTit project
-
(2012)
D2.7 Updated Design Guidelines on the Security Feedback Provided by the "things"
-
-
Graf, C.1
Busch, M.2
Schulz, T.3
Hochleitner, C.4
Skeide Fuglerud, K.5
-
44
-
-
79960527045
-
Quality-aware sensor data collection
-
10.1504/IJSNET.2010.033115
-
Han Q, Hakkarinen D, Boonma P, Suzuki J (2010) Quality-aware sensor data collection. Int J Sens Netw 7(3):127-140
-
(2010)
Int J Sens Netw
, vol.7
, Issue.3
, pp. 127-140
-
-
Han, Q.1
Hakkarinen, D.2
Boonma, P.3
Suzuki, J.4
-
48
-
-
65449182434
-
Expressions of expertness: The virtuous circle of natural language for access control policy specification
-
Inglesant P, Sasse MA, Chadwick D, Shi LL (2008) Expressions of expertness: the virtuous circle of natural language for access control policy specification. In: SOUPS
-
(2008)
SOUPS
-
-
Inglesant, P.1
Sasse, M.A.2
Chadwick, D.3
Shi, L.L.4
-
50
-
-
33747651434
-
-
ITU Internet Reports ITU, Geneva
-
ITU Internet Reports (2005) The Internet of Things, 7th edn. ITU, Geneva
-
(2005)
The Internet of Things, 7th Edn
-
-
-
53
-
-
2642533948
-
Managing context information in mobile devices
-
10.1109/MPRV.2003.1228526
-
Korpipää P, Mäntyjärvi J, Kela J, Keränen H, Malm EJ (2003) Managing context information in mobile devices. IEEE Pervasive Comput 2(3):42-51
-
(2003)
IEEE Pervasive Comput
, vol.2
, Issue.3
, pp. 42-51
-
-
Korpipää, P.1
Mäntyjärvi, J.2
Kela, J.3
Keränen, H.4
Malm, E.J.5
-
55
-
-
57349145290
-
Context-aware role-based access control in pervasive computing systems
-
SACMAT '08, ACM, New York
-
Kulkarni D, Tripathi A (2008) Context-aware role-based access control in pervasive computing systems. In: Proceedings of the 13th ACM symposium on access control models and technologies, SACMAT '08, ACM, New York, pp 113-122
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 113-122
-
-
Kulkarni, D.1
Tripathi, A.2
-
56
-
-
15944413918
-
Context sensitivity in role-based access control
-
DOI 10.1145/567331.567336
-
Kumar A, Karnik NM, Chafle G (2002) Context sensitivity in role-based access control. Oper Syst Rev 36(3):53-66 (Pubitemid 41107669)
-
(2002)
Operating Systems Review (ACM)
, vol.36
, Issue.3
, pp. 53-66
-
-
Kumar, A.1
Karnik, N.2
Chafle, G.3
-
57
-
-
78249273432
-
-
Krumm J (ed) Ubiquitous computing. CRC, Boca Raton
-
Langheinrich M (2009) Privacy in ubiquitous computing. In: Krumm J (ed) Ubiquitous computing. CRC, Boca Raton, pp 95-160
-
(2009)
Privacy in Ubiquitous Computing
, pp. 95-160
-
-
Langheinrich, M.1
-
58
-
-
77950864309
-
Usage control in computer security: A survey
-
10.1016/j.cosrev.2010.02.002
-
Lazouski A, Martinelli F, Mori P (2010) Usage control in computer security: a survey. Elsevier Comput Sci Rev 4(2):81-99
-
(2010)
Elsevier Comput Sci Rev
, vol.4
, Issue.2
, pp. 81-99
-
-
Lazouski, A.1
Martinelli, F.2
Mori, P.3
-
59
-
-
19944367736
-
Personal privacy through understanding and action: Five pitfalls for designers
-
10.1007/s00779-004-0304-9
-
Lederer S, Hong J, Dey A, Landay J (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquit Comput 8(6):440-454
-
(2004)
Personal Ubiquit Comput
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
Hong, J.2
Dey, A.3
Landay, J.4
-
60
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(3):3:1-3:52
-
(2007)
ACM Trans Knowl Discov Data
, vol.1
, Issue.3
, pp. 31-352
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
63
-
-
84895057200
-
Quality of context: Models and applications for context-aware systems in pervasive environments
-
10.1017/1291 S000000000000000 06175312
-
Manzoor A, Truong H-L, Dustdar S (2012) Quality of context: models and applications for context-aware systems in pervasive environments. Knowl Eng Rev. doi: 10.1017/S000000000000000. Special issue on web and mobile information services
-
(2012)
Knowl Eng Rev
-
-
Manzoor, A.1
Truong, H.-L.2
Dustdar, S.3
-
65
-
-
84895065665
-
-
Technical report, University, Toulouse, IRIT
-
Marie P, Desprats T, Chabridon S, Sibilla M (2013) A meta-model for the management of the quality of context information. Technical report, University, Toulouse, IRIT
-
(2013)
A Meta-model for the Management of the Quality of Context Information
-
-
Marie, P.1
Desprats, T.2
Chabridon, S.3
Sibilla, M.4
-
66
-
-
34147215372
-
Murky conceptual waters: The public and the private
-
10.1023/A:1012456832336
-
Marx G (2001) Murky conceptual waters: the public and the private. Ethics Inf Technol 3(3):157-169
-
(2001)
Ethics Inf Technol
, vol.3
, Issue.3
, pp. 157-169
-
-
Marx, G.1
-
68
-
-
70549097304
-
A context quality model to support transparent reasoning with uncertain context
-
Springer Berlin
-
McKeever S, Ye J, Coyle L, Dobson S (2009) A context quality model to support transparent reasoning with uncertain context. In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin
-
(2009)
First International Workshop on Quality of Context. Lecture Notes in Computer Science, Vol 5786
-
-
McKeever, S.1
Ye, J.2
Coyle, L.3
Dobson, S.4
-
69
-
-
84895057864
-
Learning from what others know: Privacy preserving cross system personalization
-
Mehta B (2007) Learning from what others know: privacy preserving cross system personalization. In: 11th conferences on user modeling
-
(2007)
11th Conferences on User Modeling
-
-
Mehta, B.1
-
70
-
-
84861997111
-
Survey Internet of things: Vision, applications and research challenges
-
10.1016/j.adhoc.2012.02.016
-
Miorandi S, an Sicari D, De Pellegrini F, Chlamtac I (2012) Survey Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497-1516
-
(2012)
Ad Hoc Netw
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, S.1
An Sicari, D.2
De Pellegrini, F.3
Chlamtac, I.4
-
76
-
-
84875671552
-
-
OASIS (XACML) Accessed 15 Feb 2013
-
OASIS (2012) Extensible access control markup language (XACML). http://www.oasis-open.org/committees/xacml/ Accessed 15 Feb 2013
-
(2012)
Extensible Access Control Markup Language
-
-
-
80
-
-
84893514207
-
Authorization policies: Using decision support system for context-aware protection of user's private data
-
Oglaza A, Laborde R, Zaraté P (2013) Authorization policies: using decision support system for context-aware protection of user's private data. In: IEEE international symposium on UbiSafe computing
-
(2013)
IEEE International Symposium on UbiSafe Computing
-
-
Oglaza Laborde A, R.1
Zaraté, P.2
-
82
-
-
84895064036
-
-
OpenID Accessed 15 Feb 2013
-
OpenID (2013) Foundation website. http://openid.net/ Accessed 15 Feb 2013
-
(2013)
Foundation Website
-
-
-
85
-
-
80052848840
-
Sticky policies: An approach for managing privacy across multiple parties
-
10.1109/MC.2011.225
-
Pearson S, Casassa Mont M (2011) Sticky policies: an approach for managing privacy across multiple parties. IEEE Comput 44(9):60-68
-
(2011)
IEEE Comput
, vol.44
, Issue.9
, pp. 60-68
-
-
Pearson, S.1
Casassa Mont, M.2
-
86
-
-
84894668409
-
Context aware computing for the Internet of Things: A survey
-
10.1109/SURV.2013.042313.00197
-
Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2013) Context aware computing for the Internet of Things: a survey. Commun Surv Tutor, IEEE PP (99):1-41. doi: 10.1109/SURV.2013.042313.00197. ISSN 1553-877X
-
(2013)
Commun Surv Tutor, IEEE PP
, Issue.99
, pp. 1-41
-
-
Perera, C.1
Zaslavsky, A.2
Christen, P.3
Georgakopoulos, D.4
-
87
-
-
84937555451
-
Networks without user observability: Design options
-
Springer Berlin
-
Pfitzmann A, Waidner M (1985) Networks without user observability: design options. In: Advances in cryptology - EUROCRYPT, workshop on the theory and application of cryptographic techniques, Linz, Austria. Lecture notes in computer science, vol 219. Springer, Berlin, pp 245-253
-
(1985)
Advances in Cryptology - EUROCRYPT, Workshop on the Theory and Application of Cryp-tographic Techniques, Linz, Austria. Lecture Notes in Computer Science, Vol 219
, pp. 245-253
-
-
Pfitzmann, A.1
Waidner, M.2
-
90
-
-
84895059498
-
-
Privacy by Design Resolution Jerusalem, Israel Accessed 15 Feb 2013
-
Privacy by Design Resolution (2010) Data protection and 32nd conference of privacy commissioners. http://www.privacybydesign.ca/content/uploads/2010/11/ pbd-resolution.pdf. Jerusalem, Israel Accessed 15 Feb 2013
-
(2010)
Data Protection and 32nd Conference of Privacy Commissioners
-
-
-
91
-
-
3042647442
-
Reasoning about uncertain contexts in pervasive computing environments
-
10.1109/MPRV.2004.1316821
-
Ranganathan A, Al-Muhtadi J, Campbell RH (2004) Reasoning about uncertain contexts in pervasive computing environments. IEEE Pervasive Comput 3(2):10-18
-
(2004)
IEEE Pervasive Comput
, vol.3
, Issue.2
, pp. 10-18
-
-
Ranganathan, A.1
Al-Muhtadi, J.2
Campbell, R.H.3
-
92
-
-
80052854156
-
Securing the Internet of Things
-
10.1109/MC.2011.291
-
Roman R, Najera P, Lopez J (2011) Securing the Internet of Things. IEEE Comput 44(9):51-58
-
(2011)
IEEE Comput
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
93
-
-
84879225866
-
On the features and challenges of security and privacy in distributed Internet of Things
-
10.1016/j.comnet.2012.12.018
-
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed Internet of Things. Comput Netw 57(10):2266-2279
-
(2013)
Comput Netw
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
95
-
-
24644491370
-
TurfNet: An architecture for dynamically composable networks
-
Springer Berlin
-
Schmid S, Eggert L, Brunner M, Quittek J (2005) TurfNet: an architecture for dynamically composable networks. In: Autonomic communication. Lecture notes in computer science, vol 3457. Springer, Berlin
-
(2005)
Autonomic Communication. Lecture Notes in Computer Science, Vol 3457
-
-
Schmid, S.1
Eggert, L.2
Brunner, M.3
Quittek, J.4
-
97
-
-
81855218082
-
Privacy, trust and interaction in the Internet of Things
-
Springer Berlin
-
Schrammel J, Hochleitner C, Tscheligi M (2011) Privacy, trust and interaction in the Internet of Things. In: Ambient intelligence. Lecture notes in computer science, vol 7040. Springer, Berlin, pp 378-379
-
(2011)
Ambient Intelligence. Lecture Notes in Computer Science, Vol 7040
, pp. 378-379
-
-
Schrammel, J.1
Hochleitner, C.2
Tscheligi, M.3
-
98
-
-
50949127576
-
Quality-of-context and its use for protecting privacy in context-aware systems
-
10.4304/jsw.3.3.83-93
-
Sheikh K, Wegdam M, Sinderen MV (2008) Quality-of-context and its use for protecting privacy in context-aware systems. J Softw 3(3):83-93
-
(2008)
J Softw
, vol.3
, Issue.3
, pp. 83-93
-
-
Sheikh, K.1
Wegdam, M.2
Sinderen, M.V.3
-
100
-
-
84895057751
-
-
Accessed 15 Feb 2013
-
Shibboleth (2013) Consortium website. http://shibboleth.net/ Accessed 15 Feb 2013
-
(2013)
Consortium Website
-
-
Shibboleth1
-
101
-
-
33644925852
-
A taxonomy of privacy
-
10.2307/40041279
-
Solove D (2006) A taxonomy of privacy. Univ Pennsylvania Law Rev 153(3):477
-
(2006)
Univ Pennsylvania Law Rev
, vol.153
, Issue.3
, pp. 477
-
-
Solove, D.1
-
102
-
-
80052089327
-
Advantages of a non-technical XACML notation in role-based models
-
security and trust (PST)
-
Stepien B, Matwin S, Felty A (2011) Advantages of a non-technical XACML notation in role-based models. In: 9th annual international conference on privacy, security and trust (PST), pp 193-200
-
(2011)
9th Annual International Conference on Privacy
, pp. 193-200
-
-
Stepien, B.1
Matwin, S.2
Felty, A.3
-
104
-
-
84862777858
-
Personalization and privacy: A survey of privacy risks and remedies in personalization-based systems
-
10.1007/s11257-011-9110-z
-
Toch E, Wang Y, Cranor L (2012) Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model User-Adap Inter 22(1-2):203-220
-
(2012)
User Model User-Adap Inter
, vol.22
, Issue.1-2
, pp. 203-220
-
-
Toch, E.1
Wang, Y.2
Cranor, L.3
-
111
-
-
79960773255
-
When efficiency matters: Towards quality of context-aware peers for adaptive communication in VANETs
-
Germany
-
Yasar A-U-H, Paridel K, Preuveneers D, Berbers Y (2011) When efficiency matters: towards quality of context-aware peers for adaptive communication in VANETs. In: Intelligent vehicles symposium, Germany
-
(2011)
Intelligent Vehicles Symposium
-
-
A-U-H, Y.1
Paridel, K.2
Preuveneers, D.3
Berbers, Y.4
|