메뉴 건너뛰기




Volumn 69, Issue 1-2, 2014, Pages 47-62

A survey on addressing privacy together with quality of context for context management in the Internet of Things

Author keywords

Context management; Internet of Things; Privacy; Quality of context

Indexed keywords


EID: 84895061858     PISSN: 00034347     EISSN: 19589395     Source Type: Journal    
DOI: 10.1007/s12243-013-0387-2     Document Type: Review
Times cited : (39)

References (112)
  • 6
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • 10.1016/j.comnet.2010.05.010 1208.68071
    • Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw 54(15):2787-2805
    • (2010) Comput Netw , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 9
    • 84866512143 scopus 로고    scopus 로고
    • A survey of context data distribution for mobile ubiquitous systems
    • Bellavista P, Corradi A, Fanelli M, Foschini L (2012) A survey of context data distribution for mobile ubiquitous systems. ACM Comput Surv 44(24):24:1-24:45
    • (2012) ACM Comput Surv , vol.44 , Issue.24 , pp. 241-2445
    • Bellavista, P.1    Corradi, A.2    Fanelli, M.3    Foschini, L.4
  • 10
    • 77950189737 scopus 로고    scopus 로고
    • A survey of context modelling and reasoning techniques
    • 10.1016/j.pmcj.2009.06.002
    • Bettini C, Brdiczka O, Henricksen K, Indulska J, et al (2010) A survey of context modelling and reasoning techniques. Pervasive Mob Comp 6(2):161-180
    • (2010) Pervasive Mob Comp , vol.6 , Issue.2 , pp. 161-180
    • Bettini, C.1    Brdiczka, O.2    Henricksen, K.3    Indulska, J.4
  • 12
    • 84865458860 scopus 로고    scopus 로고
    • Privacy 3.0:= data minimization + user control + contextual integrity
    • Borcea-Pfitzmann K, Pfitzmann A, Berg M (2011) Privacy 3.0:= data minimization + user control contextual integrity. Inf Technol 53(1):34-40
    • (2011) Inf Technol , vol.53 , Issue.1 , pp. 34-40
    • Borcea-Pfitzmann, K.1    Pfitzmann, A.2    Berg, M.3
  • 13
    • 77950577596 scopus 로고    scopus 로고
    • Measuring the probability of correctness of contextual information in context aware systems
    • autonomic and secure computing, Washington
    • Brgulja N, Kusber R, David K, Baumgarten M (2009) Measuring the probability of correctness of contextual information in context aware systems. In: 8th IEEE international conference on dependable, autonomic and secure computing, Washington
    • (2009) 8th IEEE International Conference on Dependable
    • Brgulja, N.1    Kusber, R.2    David, K.3    Baumgarten, M.4
  • 16
    • 84895061686 scopus 로고
    • Canadian and Dutch Protection Authorities pdf Accessed 15 Feb 2013
    • Canadian and Dutch Protection Authorities (1995) Privacy-enhancing technologies: the path to anonymity. http://www.ontla.on.ca/library/repository/ mon/10000/184530.pdf Accessed 15 Feb 2013
    • (1995) Privacy-enhancing Technologies: The Path to Anonymity
  • 17
    • 0036993076 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • Canny J (2002) Collaborative filtering with privacy via factor analysis. In: 25th ACM SIGIR
    • (2002) 25th ACM SIGIR
    • Canny, J.1
  • 21
    • 84880261767 scopus 로고    scopus 로고
    • Building ubiquitous QoC-aware applications through model-driven software engineering
    • 10.1016/j.scico.2012.07.019 10.1016/j.scico.2012.07.019
    • Chabridon S, Conan D, Abid Z, Taconet C (2012) Building ubiquitous QoC-aware applications through model-driven software engineering. Sci Comput Program 78:1912-1929. doi: 10.1016/j.scico.2012.07.019
    • (2012) Sci Comput Program , vol.78 , pp. 1912-1929
    • Chabridon, S.1    Conan, D.2    Abid, Z.3    Taconet, C.4
  • 25
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • DOI 10.1145/358549.358563
    • Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84-88 (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 26
    • 80255136670 scopus 로고    scopus 로고
    • Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence
    • 10.1016/j.pmcj.2011.10.001
    • Conti M, Das SK, Bisdikian C, Kumar M, et al (2012) Looking ahead in pervasive computing: challenges and opportunities in the era of cyber-physical convergence. Pervasive Mob Comput 8(1):2-21
    • (2012) Pervasive Mob Comput , vol.8 , Issue.1 , pp. 2-21
    • Conti, M.1    Das, S.K.2    Bisdikian, C.3    Kumar, M.4
  • 29
    • 64749086317 scopus 로고    scopus 로고
    • A contextual attribute-based access control model
    • Covington M, Sastry M (2006) A contextual attribute-based access control model. In: OTM
    • (2006) OTM
    • Covington, M.1    Sastry, M.2
  • 31
    • 85180633166 scopus 로고    scopus 로고
    • SybilInfer: Detecting sybil nodes using social networks
    • Danezis G, Mittal P (2009) SybilInfer: detecting sybil nodes using social networks. In: NDSS
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 39
    • 84867380837 scopus 로고    scopus 로고
    • Cyber foraging: Bridging mobile and cloud computing
    • 10.2200/S00447ED1V01Y201209MPC010
    • Flinn J (2012) Cyber foraging: bridging mobile and cloud computing. Synth Lect Mob Pervasive Comput 7(2):1-103
    • (2012) Synth Lect Mob Pervasive Comput , vol.7 , Issue.2 , pp. 1-103
    • Flinn, J.1
  • 44
    • 79960527045 scopus 로고    scopus 로고
    • Quality-aware sensor data collection
    • 10.1504/IJSNET.2010.033115
    • Han Q, Hakkarinen D, Boonma P, Suzuki J (2010) Quality-aware sensor data collection. Int J Sens Netw 7(3):127-140
    • (2010) Int J Sens Netw , vol.7 , Issue.3 , pp. 127-140
    • Han, Q.1    Hakkarinen, D.2    Boonma, P.3    Suzuki, J.4
  • 48
    • 65449182434 scopus 로고    scopus 로고
    • Expressions of expertness: The virtuous circle of natural language for access control policy specification
    • Inglesant P, Sasse MA, Chadwick D, Shi LL (2008) Expressions of expertness: the virtuous circle of natural language for access control policy specification. In: SOUPS
    • (2008) SOUPS
    • Inglesant, P.1    Sasse, M.A.2    Chadwick, D.3    Shi, L.L.4
  • 50
  • 56
    • 15944413918 scopus 로고    scopus 로고
    • Context sensitivity in role-based access control
    • DOI 10.1145/567331.567336
    • Kumar A, Karnik NM, Chafle G (2002) Context sensitivity in role-based access control. Oper Syst Rev 36(3):53-66 (Pubitemid 41107669)
    • (2002) Operating Systems Review (ACM) , vol.36 , Issue.3 , pp. 53-66
    • Kumar, A.1    Karnik, N.2    Chafle, G.3
  • 57
    • 78249273432 scopus 로고    scopus 로고
    • Krumm J (ed) Ubiquitous computing. CRC, Boca Raton
    • Langheinrich M (2009) Privacy in ubiquitous computing. In: Krumm J (ed) Ubiquitous computing. CRC, Boca Raton, pp 95-160
    • (2009) Privacy in Ubiquitous Computing , pp. 95-160
    • Langheinrich, M.1
  • 58
    • 77950864309 scopus 로고    scopus 로고
    • Usage control in computer security: A survey
    • 10.1016/j.cosrev.2010.02.002
    • Lazouski A, Martinelli F, Mori P (2010) Usage control in computer security: a survey. Elsevier Comput Sci Rev 4(2):81-99
    • (2010) Elsevier Comput Sci Rev , vol.4 , Issue.2 , pp. 81-99
    • Lazouski, A.1    Martinelli, F.2    Mori, P.3
  • 59
    • 19944367736 scopus 로고    scopus 로고
    • Personal privacy through understanding and action: Five pitfalls for designers
    • 10.1007/s00779-004-0304-9
    • Lederer S, Hong J, Dey A, Landay J (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquit Comput 8(6):440-454
    • (2004) Personal Ubiquit Comput , vol.8 , Issue.6 , pp. 440-454
    • Lederer, S.1    Hong, J.2    Dey, A.3    Landay, J.4
  • 63
    • 84895057200 scopus 로고    scopus 로고
    • Quality of context: Models and applications for context-aware systems in pervasive environments
    • 10.1017/1291 S000000000000000 06175312
    • Manzoor A, Truong H-L, Dustdar S (2012) Quality of context: models and applications for context-aware systems in pervasive environments. Knowl Eng Rev. doi: 10.1017/S000000000000000. Special issue on web and mobile information services
    • (2012) Knowl Eng Rev
    • Manzoor, A.1    Truong, H.-L.2    Dustdar, S.3
  • 66
    • 34147215372 scopus 로고    scopus 로고
    • Murky conceptual waters: The public and the private
    • 10.1023/A:1012456832336
    • Marx G (2001) Murky conceptual waters: the public and the private. Ethics Inf Technol 3(3):157-169
    • (2001) Ethics Inf Technol , vol.3 , Issue.3 , pp. 157-169
    • Marx, G.1
  • 69
    • 84895057864 scopus 로고    scopus 로고
    • Learning from what others know: Privacy preserving cross system personalization
    • Mehta B (2007) Learning from what others know: privacy preserving cross system personalization. In: 11th conferences on user modeling
    • (2007) 11th Conferences on User Modeling
    • Mehta, B.1
  • 70
    • 84861997111 scopus 로고    scopus 로고
    • Survey Internet of things: Vision, applications and research challenges
    • 10.1016/j.adhoc.2012.02.016
    • Miorandi S, an Sicari D, De Pellegrini F, Chlamtac I (2012) Survey Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497-1516
    • (2012) Ad Hoc Netw , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, S.1    An Sicari, D.2    De Pellegrini, F.3    Chlamtac, I.4
  • 76
    • 84875671552 scopus 로고    scopus 로고
    • OASIS (XACML) Accessed 15 Feb 2013
    • OASIS (2012) Extensible access control markup language (XACML). http://www.oasis-open.org/committees/xacml/ Accessed 15 Feb 2013
    • (2012) Extensible Access Control Markup Language
  • 80
    • 84893514207 scopus 로고    scopus 로고
    • Authorization policies: Using decision support system for context-aware protection of user's private data
    • Oglaza A, Laborde R, Zaraté P (2013) Authorization policies: using decision support system for context-aware protection of user's private data. In: IEEE international symposium on UbiSafe computing
    • (2013) IEEE International Symposium on UbiSafe Computing
    • Oglaza Laborde A, R.1    Zaraté, P.2
  • 82
    • 84895064036 scopus 로고    scopus 로고
    • OpenID Accessed 15 Feb 2013
    • OpenID (2013) Foundation website. http://openid.net/ Accessed 15 Feb 2013
    • (2013) Foundation Website
  • 85
    • 80052848840 scopus 로고    scopus 로고
    • Sticky policies: An approach for managing privacy across multiple parties
    • 10.1109/MC.2011.225
    • Pearson S, Casassa Mont M (2011) Sticky policies: an approach for managing privacy across multiple parties. IEEE Comput 44(9):60-68
    • (2011) IEEE Comput , vol.44 , Issue.9 , pp. 60-68
    • Pearson, S.1    Casassa Mont, M.2
  • 86
    • 84894668409 scopus 로고    scopus 로고
    • Context aware computing for the Internet of Things: A survey
    • 10.1109/SURV.2013.042313.00197
    • Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2013) Context aware computing for the Internet of Things: a survey. Commun Surv Tutor, IEEE PP (99):1-41. doi: 10.1109/SURV.2013.042313.00197. ISSN 1553-877X
    • (2013) Commun Surv Tutor, IEEE PP , Issue.99 , pp. 1-41
    • Perera, C.1    Zaslavsky, A.2    Christen, P.3    Georgakopoulos, D.4
  • 90
    • 84895059498 scopus 로고    scopus 로고
    • Privacy by Design Resolution Jerusalem, Israel Accessed 15 Feb 2013
    • Privacy by Design Resolution (2010) Data protection and 32nd conference of privacy commissioners. http://www.privacybydesign.ca/content/uploads/2010/11/ pbd-resolution.pdf. Jerusalem, Israel Accessed 15 Feb 2013
    • (2010) Data Protection and 32nd Conference of Privacy Commissioners
  • 91
    • 3042647442 scopus 로고    scopus 로고
    • Reasoning about uncertain contexts in pervasive computing environments
    • 10.1109/MPRV.2004.1316821
    • Ranganathan A, Al-Muhtadi J, Campbell RH (2004) Reasoning about uncertain contexts in pervasive computing environments. IEEE Pervasive Comput 3(2):10-18
    • (2004) IEEE Pervasive Comput , vol.3 , Issue.2 , pp. 10-18
    • Ranganathan, A.1    Al-Muhtadi, J.2    Campbell, R.H.3
  • 92
    • 80052854156 scopus 로고    scopus 로고
    • Securing the Internet of Things
    • 10.1109/MC.2011.291
    • Roman R, Najera P, Lopez J (2011) Securing the Internet of Things. IEEE Comput 44(9):51-58
    • (2011) IEEE Comput , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 93
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed Internet of Things
    • 10.1016/j.comnet.2012.12.018
    • Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed Internet of Things. Comput Netw 57(10):2266-2279
    • (2013) Comput Netw , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 98
    • 50949127576 scopus 로고    scopus 로고
    • Quality-of-context and its use for protecting privacy in context-aware systems
    • 10.4304/jsw.3.3.83-93
    • Sheikh K, Wegdam M, Sinderen MV (2008) Quality-of-context and its use for protecting privacy in context-aware systems. J Softw 3(3):83-93
    • (2008) J Softw , vol.3 , Issue.3 , pp. 83-93
    • Sheikh, K.1    Wegdam, M.2    Sinderen, M.V.3
  • 100
    • 84895057751 scopus 로고    scopus 로고
    • Accessed 15 Feb 2013
    • Shibboleth (2013) Consortium website. http://shibboleth.net/ Accessed 15 Feb 2013
    • (2013) Consortium Website
    • Shibboleth1
  • 101
    • 33644925852 scopus 로고    scopus 로고
    • A taxonomy of privacy
    • 10.2307/40041279
    • Solove D (2006) A taxonomy of privacy. Univ Pennsylvania Law Rev 153(3):477
    • (2006) Univ Pennsylvania Law Rev , vol.153 , Issue.3 , pp. 477
    • Solove, D.1
  • 102
    • 80052089327 scopus 로고    scopus 로고
    • Advantages of a non-technical XACML notation in role-based models
    • security and trust (PST)
    • Stepien B, Matwin S, Felty A (2011) Advantages of a non-technical XACML notation in role-based models. In: 9th annual international conference on privacy, security and trust (PST), pp 193-200
    • (2011) 9th Annual International Conference on Privacy , pp. 193-200
    • Stepien, B.1    Matwin, S.2    Felty, A.3
  • 104
    • 84862777858 scopus 로고    scopus 로고
    • Personalization and privacy: A survey of privacy risks and remedies in personalization-based systems
    • 10.1007/s11257-011-9110-z
    • Toch E, Wang Y, Cranor L (2012) Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model User-Adap Inter 22(1-2):203-220
    • (2012) User Model User-Adap Inter , vol.22 , Issue.1-2 , pp. 203-220
    • Toch, E.1    Wang, Y.2    Cranor, L.3
  • 109
    • 0000320829 scopus 로고
    • The right to privacy
    • 10.2307/1321160
    • Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Rev 4(5):193-220
    • (1890) Harvard Law Rev , vol.4 , Issue.5 , pp. 193-220
    • Warren, S.D.1    Brandeis, L.D.2
  • 111
    • 79960773255 scopus 로고    scopus 로고
    • When efficiency matters: Towards quality of context-aware peers for adaptive communication in VANETs
    • Germany
    • Yasar A-U-H, Paridel K, Preuveneers D, Berbers Y (2011) When efficiency matters: towards quality of context-aware peers for adaptive communication in VANETs. In: Intelligent vehicles symposium, Germany
    • (2011) Intelligent Vehicles Symposium
    • A-U-H, Y.1    Paridel, K.2    Preuveneers, D.3    Berbers, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.