-
1
-
-
84879815746
-
Anonymous authentication for privacy-preserving IOT target-driven applications
-
Alcaide, A., Palomar, E., Montero-Castillo, J., & Ribagorda, A. (2013). “Anonymous authentication for privacy-preserving IOT target-driven applications.” Computers & Security, 37, 111–123.
-
(2013)
Computers & Security
, vol.37
, pp. 111-123
-
-
Alcaide, A.1
Palomar, E.2
Montero-Castillo, J.3
Ribagorda, A.4
-
2
-
-
77649297585
-
Robust security mechanisms for data streams systems
-
Ali, M., Eltabakh, M., & Nita-rotaru, C. (2004). “Robust security mechanisms for data streams systems,” Purdue university, csd technical report 04-019.
-
(2004)
Purdue university, csd technical report
, pp. 04-019
-
-
Ali, M.1
Eltabakh, M.2
Nita-rotaru, C.3
-
4
-
-
77956877124
-
The internet of things: A survey
-
Atzori, L., Iera, A., & Morabito, G. (2010). “The internet of things: A survey.” Computer networks, 54(15), 2787–2805.
-
(2010)
Computer networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
5
-
-
0022010535
-
Modeling Data and Process Quality in Multi-input, Multi-output Information Systems
-
Ballou, D. P., & Pazer, H. L. (1985). Modeling Data and Process Quality in Multi-input, Multi-output Information Systems. Management Science, 31(2), 150–162.
-
(1985)
Management Science
, vol.31
, Issue.2
, pp. 150-162
-
-
Ballou, D.P.1
Pazer, H.L.2
-
7
-
-
34047093851
-
Trust negotiation in identity management
-
Bhargav-Spantzel, A., Squicciarini, A., and Bertino, E. “Trust negotiation in identity management,” Security Privacy, IEEE, vol. 5, no. 2, pp. 55 –63, march-April 2007.
-
(2007)
Security Privacy, IEEE, vol. 5, no. 2, pp. 55 –63, march-April
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.2
Bertino, E.3
-
8
-
-
1242330726
-
A Conceptual Framework and Belief-Function Approach to Assessing Overall Information Quality
-
Bovee, M., Srivastava, R. P., & Mak, B. (2001). “A Conceptual Framework and Belief-Function Approach to Assessing Overall Information Quality.” Proc. 6th Int. Conf. on Information Quality (ICIQ-2001), MA, USA, pp.311–32
-
(2001)
Proc. 6th Int. Conf. on Information Quality (ICIQ-2001), MA, USA
, pp. 311-332
-
-
Bovee, M.1
Srivastava, R.P.2
Mak, B.3
-
9
-
-
79952842019
-
Castle: Continuously anonymizing data streams
-
Cao, J., Carminati, B., Ferrari, E., & Tan, K. (2011). “Castle: Continuously anonymizing data streams.” IEEE Transactions on Dependable and Secure Computing, 8(3), 337–352.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.3
, pp. 337-352
-
-
Cao, J.1
Carminati, B.2
Ferrari, E.3
Tan, K.4
-
10
-
-
84979855000
-
Dealing with security requirements during the development of information systems
-
Cauvet: Eds. Springer
-
Chung, L. (1993). “Dealing with security requirements during the development of information systems,” in Advanced Information Systems Engineering, ser. Lecture Notes in Computer Science, C. Rolland, F. Bodart, and C. Cauvet, Eds. Springer
-
(1993)
in Advanced Information Systems Engineering, ser. Lecture Notes in Computer Science, C. Rolland, F. Bodart, and C
-
-
Chung, L.1
-
11
-
-
84875484343
-
Efficient data tagging for managing privacy in the internet of things
-
Evans, D., & Eyers, D. (2012). “Efficient data tagging for managing privacy in the internet of things.” In Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CP- SCom 2012, Besancon, pp 244–248.
-
(2012)
In Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CP- SCom 2012, Besancon
, pp. 244-248
-
-
Evans, D.1
Eyers, D.2
-
12
-
-
84888014600
-
Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things
-
Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou X. (2013). “Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things”. Journal of Network and Computer Applications, 36(6), 1531–1539. doi:10.1016/j.jnca.2012.12.028
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.6
, pp. 1531-1539
-
-
Guo, B.1
Zhang, D.2
Wang, Z.3
Yu, Z.4
Zhou, X.5
-
13
-
-
84876172823
-
User interactive internet of things privacy preserved access control
-
Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A. (2012). “User interactive internet of things privacy preserved access control.” In 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, pp. 597–602.
-
(2012)
In 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom
, pp. 597-602
-
-
Huang, X.1
Fu, R.2
Chen, B.3
Zhang, T.4
Roscoe, A.5
-
14
-
-
84979866253
-
-
Internet of ThingsStrategicResearchRoadmap
-
Internet of ThingsStrategicResearchRoadmap; available online at: http://ec.europa.eu/information_society/policy/rfid/documents/in_cerp.pdf
-
-
-
-
15
-
-
50949085110
-
Addressing privacy requirements in system design: the PriS method
-
Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2008). Addressing privacy requirements in system design: the PriS method. Requirements Engineering, 13(3), 241–255.
-
(2008)
Requirements Engineering
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
16
-
-
34547888732
-
Enhancing user experiencethroughpervasive information systems: The case of pervasiveretailing
-
Kourouthanassis, P. E., Giaglis, G. M., & Vrechopoulos, A. P. (2007). Enhancing user experiencethroughpervasive information systems: The case of pervasiveretailing. International Journal of Information Management, 27(5), 319–335.
-
(2007)
International Journal of Information Management
, vol.27
, Issue.5
, pp. 319-335
-
-
Kourouthanassis, P.E.1
Giaglis, G.M.2
Vrechopoulos, A.P.3
-
17
-
-
84874029588
-
Data Quality Observation in Pervasive Environments. In Proceedings of the 2012 I.E. 15th International Conference on Computational Science and Engineering (CSE ’12). IEEE Computer Society, Washington, DC
-
Li, F., Nastic, S., & Dustdar, S. (2012). Data Quality Observation in Pervasive Environments. In Proceedings of the 2012 I.E. 15th International Conference on Computational Science and Engineering (CSE ’12). IEEE Computer Society, Washington, DC, USA, 602–609. doi:10.1109/ICCSE.2012.88
-
(2012)
USA
, pp. 602-609
-
-
Li, F.1
Nastic, S.2
Dustdar, S.3
-
18
-
-
34548019652
-
-
Lindner, W., & Meier, J. “Securing the borealis data stream engine,” in ser. IDEAS’06. Washington, DC, USA: IEEE Computer Society, pp. 137–147. [Online]
-
Lindner, W., & Meier, J. “Securing the borealis data stream engine,” in Proceedings of the 10th International Database Engineering and Applications Symposium, ser. IDEAS’06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 137–147. [Online]. Available: http:www.//dx.doi.org/10.1109/IDEAS.2006.40
-
(2006)
Proceedings of the 10th International Database Engineering and Applications Symposium
-
-
-
19
-
-
84979863323
-
-
Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., & Hung Byers A. “Big data: The next frontier for innovation, competition, and productivity” [Online]
-
Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., & Hung Byers A. “Big data: The next frontier for innovation, competition, and productivity” Report McKinsey Global Institute 2011. [Online] Available: http://www.mckinsey.com/mgi/publications/big_data/
-
(2011)
Report McKinsey Global Institute
-
-
-
20
-
-
84864330203
-
Research challenges on online service quality prediction for proactive adaptation
-
Metzger, A.; Chi-Hung Chi; Engel, Y.; Marconi, A., “Research challenges on online service quality prediction for proactive adaptation,” Software Services and Systems Research – Results and Challenges (S-Cube), 2012 Workshop on European, vol., no., pp.51,57, 5–5 June 2012 doi:10.1109/S-Cube.2012.6225512
-
(2012)
Software Services and Systems Research – Results and Challenges (S-Cube), 2012 Workshop on European, vol., no., pp.51
, vol.57
, pp. 5
-
-
Metzger, A.1
Chi, C.-H.2
Engel, Y.3
Marconi, A.4
-
21
-
-
84861997111
-
Survey internet of things: Vision, applications and research challenges
-
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Survey internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
22
-
-
0026883734
-
Representing and using nonfunctional requirements: a process-oriented approach
-
Mylopoulos, J., Chung, L., and Nixon, B. “Representing and using nonfunctional requirements: a process-oriented approach,” Software Engineering, IEEE Transactions on, vol. 18, no. 6, pp. 483 –497, Jun. 1992
-
(1992)
Software Engineering, IEEE Transactions on
, vol.18
, Issue.6
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
-
23
-
-
52649140439
-
E. “A security punctuation framework for enforcing access control on streaming data,” in Data Engineering, 2008. ICDE 2008
-
Nehme, R., Rundensteiner, E., & Bertino, E. “A security punctuation framework for enforcing access control on streaming data,” in Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, April 2008, pp. 406 –415
-
(2008)
IEEE 24th International Conference on
, pp. 406-415
-
-
Nehme, R.1
Rundensteiner, E.2
-
24
-
-
85011016388
-
-
Papadopoulos, S., Yang, Y., & Papadias, D. “Cads: continuous authentication on data streams,” in, pp. 135–146. [Online]
-
Papadopoulos, S., Yang, Y., & Papadias, D. “Cads: continuous authentication on data streams,” in Proceedings of the 33rd international conference on Very large data bases, ser. VLDB’07. VLDB Endowment, 2007, pp. 135–146. [Online]. Available: http://dl.acm.org/citation.cfm?id=1325851.1325870
-
(2007)
Proceedings of the 33rd international conference on Very large data bases, ser. VLDB’07. VLDB Endowment
-
-
-
25
-
-
36749060136
-
Service-Oriented Computing: State of the Art and Research Challenges
-
Papazoglou, M. P., Traverso, P., Dustdar, S., & Leymann, F. (2007). Service-Oriented Computing: State of the Art and Research Challenges. IEEE Computer, 40(11), 38–45.
-
(2007)
IEEE Computer
, vol.40
, Issue.11
, pp. 38-45
-
-
Papazoglou, M.P.1
Traverso, P.2
Dustdar, S.3
Leymann, F.4
-
26
-
-
0030086382
-
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L. and Youman, C. E. Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996. [Online]
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L. and Youman, C. E. “Role-based access control models,” Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996. [Online]. Available: http://dx.doi.org/10.1109/2.485845
-
(1996)
Role-based access control models
-
-
-
27
-
-
80755190141
-
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
-
Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.
-
(2012)
Journal of Systems and Software
, vol.85
, Issue.1
, pp. 152-166
-
-
Sicari, S.1
Grieco, L.A.2
Boggia, G.3
Coen-Porisini, A.4
-
28
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
van Lamsweerde, A., & Letier, E. (2000). Handling obstacles in goal-oriented requirements engineering. IEEE Transactions on Software Engineering, 26(10), 978–1005.
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, Issue.10
, pp. 978-1005
-
-
van Lamsweerde, A.1
Letier, E.2
-
29
-
-
0002918344
-
Beyond accuracy: What data quality means to data consumers
-
Wang, R., & Strong, D. (1996). Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems; Armonk; Spring, 12(4), 5–33.
-
(1996)
Journal of Management Information Systems; Armonk; Spring
, vol.12
, Issue.4
, pp. 5-33
-
-
Wang, R.1
Strong, D.2
-
30
-
-
84864960877
-
A privacy enhanced dns scheme for the internet of things
-
Wang, Y., & Wen, Q. (2011). “A privacy enhanced dns scheme for the internet of things.” IET International Conference on Communication Technology and Application, ICCTA, Beijing, pp. 699–702.
-
(2011)
IET International Conference on Communication Technology and Application, ICCTA, Beijing
, pp. 699-702
-
-
Wang, Y.1
Wen, Q.2
-
31
-
-
43249115954
-
Deploying and Managing Web Services: Issues, Solutions, and Directions
-
Yu, Q., Bouguettaya, A., & Medjahed, B. (2008). Deploying and Managing Web Services: Issues, Solutions, and Directions. The VLDB Journal, 17(3), 537–572.
-
(2008)
The VLDB Journal
, vol.17
, Issue.3
, pp. 537-572
-
-
Yu, Q.1
Bouguettaya, A.2
Medjahed, B.3
|