메뉴 건너뛰기




Volumn 21, Issue , 2013, Pages 122-131

Guidelines for Internet of things deployment approaches - The thing commandments

Author keywords

Commandments; Internet of Things; Principles; Security; Users

Indexed keywords


EID: 84896918069     PISSN: 18770509     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.procs.2013.09.018     Document Type: Conference Paper
Times cited : (52)

References (34)
  • 1
    • 80955160447 scopus 로고    scopus 로고
    • That 'Internet of things' thing
    • K. Ashton, "That 'Internet of Things' Thing," RFiD Journal, Vol. 22, pp. 97-114, 2009.
    • (2009) RFiD Journal , vol.22 , pp. 97-114
    • Ashton, K.1
  • 2
    • 79953100622 scopus 로고    scopus 로고
    • Accountability in the internet of things
    • 4
    • R. H. Weber, "Accountability in the Internet of Things," Computer Law & Security Review, Vol. 27, pp. 133-138, 4, 2011.
    • (2011) Computer Law & Security Review , vol.27 , pp. 133-138
    • Weber, R.H.1
  • 3
    • 84896924414 scopus 로고    scopus 로고
    • The application of internet of things (IOT) in emergency management system in China
    • 2010 IEEE International Conference on
    • Z. Ji and Q. Anwen, "The application of internet of things (IOT) in emergency management system in china," in Technologies for Homeland Security (HST), 2010 IEEE International Conference on, 2010, pp. 139-142.
    • (2010) Technologies for Homeland Security (HST) , pp. 139-142
    • Ji, Z.1    Anwen, Q.2
  • 4
    • 84856228761 scopus 로고    scopus 로고
    • An overview of the internet of things for people with disabilities
    • 3
    • M. C. Domingo, "An overview of the Internet of Things for people with disabilities," Journal of Network and Computer Applications, Vol. 35, pp. 584-596, 3, 2012.
    • (2012) Journal of Network and Computer Applications , vol.35 , pp. 584-596
    • Domingo, M.C.1
  • 7
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things - New security and privacy challenges
    • 1
    • R. H. Weber, "Internet of Things - New security and privacy challenges," Computer Law & Security Review, Vol. 26, pp. 23-30, 1, 2010.
    • (2010) Computer Law & Security Review , vol.26 , pp. 23-30
    • Weber, R.H.1
  • 9
    • 38549120339 scopus 로고    scopus 로고
    • Distributed ONS and its impact on privacy
    • ICC'07. IEEE International Conference on
    • B. Fabian and O. Gunther, "Distributed ONS and its impact on privacy," in Communications, 2007. ICC'07. IEEE International Conference on, 2007, pp. 1223-1228.
    • (2007) Communications, 2007 , pp. 1223-1228
    • Fabian, B.1    Gunther, O.2
  • 10
    • 84864192996 scopus 로고    scopus 로고
    • Should users be entitled to use and control the devices of their choice on networks?
    • 2012 IEEE
    • S. Jordan and G. Shaffer, "Should users be entitled to use and control the devices of their choice on networks?" in Network Operations and Management Symposium (NOMS), 2012 IEEE, 2012, pp. 1036-1041.
    • (2012) Network Operations and Management Symposium (NOMS) , pp. 1036-1041
    • Jordan, S.1    Shaffer, G.2
  • 11
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • R. Roman, P. Najera and J. Lopez, "Securing the internet of things," Computer, Vol. 44, pp. 51-58, 2011.
    • (2011) Computer , vol.44 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 12
    • 33847396961 scopus 로고    scopus 로고
    • Private enforcement of cybercrime on the electronic frontier
    • M. L. Rustad, "Private Enforcement of Cybercrime on the Electronic Frontier," S. Cal. Interdisc. LJ, Vol. 11, pp. 63, 2001.
    • (2001) S. Cal. Interdisc. LJ , vol.11 , pp. 63
    • Rustad, M.L.1
  • 13
    • 71649095641 scopus 로고    scopus 로고
    • Internet of things - Need for a new legal environment?
    • 11
    • R. H. Weber, "Internet of things - Need for a new legal environment?" Computer Law & Security Review, Vol. 25, pp. 522-527, 11, 2009.
    • (2009) Computer Law & Security Review , vol.25 , pp. 522-527
    • Weber, R.H.1
  • 15
    • 84896986207 scopus 로고    scopus 로고
    • Computer misuse act 1990 (1990 c 18)
    • Anonymous
    • Anonymous "Computer Misuse Act 1990 (1990 c 18)," UK Parliament Acts,.
    • UK Parliament Acts
  • 16
    • 84896977637 scopus 로고    scopus 로고
    • Theft act 1968 (1968 c 60)
    • Anonymous
    • Anonymous "Theft Act 1968 (1968 c 60)," UK Parliament Acts,.
    • UK Parliament Acts
  • 17
    • 84877727033 scopus 로고    scopus 로고
    • The internet of things how the next evolution of the internet is changing everything
    • D. Evans, "The Internet of Things How the Next Evolution of the Internet Is Changing Everything," CISCO White Paper, 2011.
    • (2011) CISCO White Paper
    • Evans, D.1
  • 19
    • 77955080938 scopus 로고    scopus 로고
    • Bureau of Consular Affairs, United States Department of State
    • Bureau of Consular Affairs, United States Department of State. (). The U.S. Electronic Passport.
    • The U.S. Electronic Passport
  • 21
    • 79952489796 scopus 로고    scopus 로고
    • A survey of applications and requirements of unique identification systems and RFID techniques
    • 4
    • E. Ilie-Zudor, Z. Kemény, F. van Blommestein, L. Monostori and A. van der Meulen, "A survey of applications and requirements of unique identification systems and RFID techniques," Comput. Ind., Vol. 62, pp. 227-252, 4, 2011.
    • (2011) Comput. Ind. , vol.62 , pp. 227-252
    • Ilie-Zudor, E.1    Kemény, Z.2    Van Blommestein, F.3    Monostori, L.4    Van Der Meulen, A.5
  • 22
    • 78149306616 scopus 로고    scopus 로고
    • Future internet: The internet of things
    • 2010 3rd International Conference on
    • Lu Tan and Neng Wang, "Future internet: The internet of things," in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, 2010, pp. V5-376-V5-380.
    • (2010) Advanced Computer Theory and Engineering (ICACTE)
    • Lu, T.1    Wang, N.2
  • 23
    • 77957860642 scopus 로고    scopus 로고
    • The age of spimes [Technically speaking]
    • P. McFedries, "The Age of Spimes [Technically Speaking]," Spectrum, IEEE, Vol. 47, pp. 25-25, 2010.
    • (2010) Spectrum, IEEE , vol.47 , pp. 25-25
    • McFedries, P.1
  • 24
    • 79956110780 scopus 로고    scopus 로고
    • An internet of things that do not exist
    • C. Speed, "An internet of things that do not exist," Interactions, Vol. 18, pp. 18-21, 2011.
    • (2011) Interactions , vol.18 , pp. 18-21
    • Speed, C.1
  • 26
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • 10/28
    • L. Atzori, A. Iera and G. Morabito, "The Internet of Things: A survey," Computer Networks, Vol. 54, pp. 2787-2805, 10/28, 2010.
    • (2010) Computer Networks , vol.54 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 28
    • 84933521597 scopus 로고    scopus 로고
    • Embedded RFID and everyday things: A case study of the security and privacy risks of the U.S e-passport
    • RFID, 2007
    • M. Meingast, J. King and D. K. Mulligan, "Embedded RFID and everyday things: A case study of the security and privacy risks of the U.S. e-passport," in RFID, 2007. IEEE International Conference on, 2007, pp. 7-14.
    • (2007) IEEE International Conference on , pp. 7-14
    • Meingast, M.1    King, J.2    Mulligan, D.K.3
  • 30
    • 79951805232 scopus 로고    scopus 로고
    • Internet of things in 2020 - A roadmap for the future
    • European Commission
    • European Commission, "Internet of Things in 2020-A Roadmap for the Future," European Platform for Smart Systems Integration, 2008.
    • (2008) European Platform for Smart Systems Integration
  • 32
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • S. L. Garfinkel, A. Juels and R. Pappu, "RFID privacy: an overview of problems and proposed solutions," Security & Privacy, IEEE, Vol. 3, pp. 34-43, 2005.
    • (2005) Security & Privacy, IEEE , vol.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 33
    • 52149114638 scopus 로고    scopus 로고
    • Ethical implications of implantable radiofrequency identification (RFID) tags in humans
    • 8
    • K. R. Foster and J. Jaeger, "Ethical implications of implantable radiofrequency Identification (RFID) tags in humans," AM J BIOETHICS, Vol. 8, pp. 44-48, 08, 2008.
    • (2008) AM J Bioethics , vol.8 , pp. 44-48
    • Foster, K.R.1    Jaeger, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.