메뉴 건너뛰기




Volumn , Issue , 2014, Pages 191-196

User-driven privacy enforcement for cloud-based services in the internet of things

Author keywords

Cloud Computing; Development; Internet of Things; Model driven; Privacy; Services; User acceptance

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; HOME HEALTH CARE; INTERNET OF THINGS;

EID: 84922552115     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FiCloud.2014.38     Document Type: Conference Paper
Times cited : (40)

References (39)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabit, "The Internet of Things: A survey," Computer Networks, vol. 54, no. 15, 2010.
    • (2010) Computer Networks , vol.54 , Issue.15
    • Atzori, L.1    Iera, A.2    Morabit, G.3
  • 3
    • 84874277715 scopus 로고    scopus 로고
    • A cloud design for user-controlled storage and processing of sensor data
    • R. Hummen et al., "A Cloud Design for User-controlled Storage and Processing of Sensor Data," in IEEE CloudCom, 2012.
    • (2012) IEEE CloudCom
    • Hummen, R.1
  • 4
    • 85001608959 scopus 로고    scopus 로고
    • Maintaining user control while storing and processing sensor data in the cloud
    • M. Henze et al., "Maintaining User Control While Storing and Processing Sensor Data in the Cloud," IJGHPC, vol. 5, no. 4, 2013.
    • (2013) IJGHPC , vol.5 , Issue.4
    • Henze, M.1
  • 6
    • 84897726068 scopus 로고    scopus 로고
    • Efficient and scalable IoT Service delivery on cloud
    • F. Li et al., "Efficient and Scalable IoT Service Delivery on Cloud," in IEEE CLOUD, 2013.
    • (2013) IEEE CLOUD
    • Li, F.1
  • 8
    • 84889706242 scopus 로고    scopus 로고
    • Home is safer than the cloud! Privacy concerns for consumer cloud storage
    • I. Ion et al., "Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage," in SOUPS, 2011.
    • (2011) SOUPS
    • Ion, I.1
  • 9
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • H. Takabi, J. Joshi, and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security Privacy, vol. 8, no. 6, 2010.
    • (2010) IEEE Security Privacy , vol.8 , Issue.6
    • Takabi, H.1    Joshi, J.2    Ahn, G.3
  • 10
    • 84992141126 scopus 로고    scopus 로고
    • The cloud needs cross-Layer data handling annotations
    • M. Henze, R. Hummen, and K. Wehrle, "The Cloud Needs Cross-Layer Data Handling Annotations," in IEEE SPW, 2013.
    • (2013) IEEE SPW
    • Henze, M.1    Hummen, R.2    Wehrle, K.3
  • 11
    • 78650041762 scopus 로고    scopus 로고
    • Healthy ageing supported by technology: A Cross-Disciplinary research challenge
    • S. Koch, "Healthy Ageing Supported by Technology: A Cross-Disciplinary Research Challenge," Inform. Health Soc. Care, vol. 35, no. 3-4, 2010.
    • (2010) Inform. Health Soc. Care , vol.35 , Issue.3-4
    • Koch, S.1
  • 12
    • 80052696161 scopus 로고    scopus 로고
    • A survey on privacy in mobile participatory sensing applications
    • D. Christin et al., "A survey on privacy in mobile participatory sensing applications," J. Syst. Software, vol. 84, no. 11, 2011.
    • (2011) J. Syst. Software , vol.84 , Issue.11
    • Christin, D.1
  • 14
    • 0346869574 scopus 로고    scopus 로고
    • Designing for ubiquity: The perception of privacy
    • R. Beckwith, "Designing for Ubiquity: The Perception of Privacy," IEEE Pervasive Computing, vol. 2, no. 2, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.2
    • Beckwith, R.1
  • 16
    • 84874834655 scopus 로고    scopus 로고
    • Privacy promises, access control, and privacy management-Enforcing privacy throughout an enterprise by extending access control
    • C. Powers, P. Ashley, and M. Schunter, "Privacy Promises, Access Control, and Privacy Management-Enforcing Privacy Throughout an Enterprise By Extending Access Control," in ISEC, 2002.
    • (2002) ISEC
    • Powers, C.1    Ashley, P.2    Schunter, M.3
  • 17
    • 84867800053 scopus 로고    scopus 로고
    • Secure and scalable cloud-Based architecture for e-Health wireless sensor networks
    • A. Lounis et al., "Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks," in ICCCN, 2012.
    • (2012) ICCCN
    • Lounis, A.1
  • 18
    • 84939475227 scopus 로고    scopus 로고
    • Modeling cloud architectures as interactive systems
    • A. Navarro Pérez and B. Rumpe, "Modeling Cloud Architectures as Interactive Systems," in MDHPCL, 2013.
    • (2013) MDHPCL
    • Navarro Pérez, A.1    Rumpe, B.2
  • 20
    • 78650911864 scopus 로고    scopus 로고
    • HICCUPS: Health Information Collaborative Collection Using Privacy and Security
    • A. D. Molina, M. Salajegheh, and K. Fu, "HICCUPS: Health Information Collaborative Collection Using Privacy and Security," in ACM SPIMACS, 2009.
    • (2009) ACM SPIMACS
    • Molina, A.D.1    Salajegheh, M.2    Fu, K.3
  • 21
    • 48749117730 scopus 로고    scopus 로고
    • Context-Aware wireless sensor networks for assisted living and residential monitoring
    • A. Wood et al., "Context-Aware Wireless Sensor Networks for Assisted Living and Residential Monitoring," IEEE Network, vol. 22, no. 4, 2008.
    • (2008) IEEE Network , vol.22 , Issue.4
    • Wood, A.1
  • 22
    • 84922542871 scopus 로고    scopus 로고
    • Privacy as a service: Privacy-Aware data storage and processing in cloud computing architectures
    • W. Itani, A. Kayssi, and A. Chehab, "Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures," in IEEE DASC, 2009.
    • (2009) IEEE DASC
    • Itani, W.1    Kayssi, A.2    Chehab, A.3
  • 23
    • 84922542870 scopus 로고    scopus 로고
    • A privacy policy model for enterprises
    • G. Karjoth and M. Schunter, "A Privacy Policy Model for Enterprises," in IEEE CSFW, 2002.
    • (2002) IEEE CSFW
    • Karjoth, G.1    Schunter, M.2
  • 24
    • 77955210831 scopus 로고    scopus 로고
    • Privacy-Aware role-Based access control
    • Q. Ni et al., "Privacy-Aware Role-Based Access Control," ACM TISSEC, vol. 13, no. 3, 2010.
    • (2010) ACM TISSEC , vol.13 , Issue.3
    • Ni, Q.1
  • 26
    • 84880314081 scopus 로고    scopus 로고
    • Flexible data distribution policy language and gateway architecture
    • J. Spillner and A. Schill, "Flexible Data Distribution Policy Language and Gateway Architecture," in IEEE LatinCloud, 2012.
    • (2012) IEEE LatinCloud
    • Spillner, J.1    Schill, A.2
  • 27
    • 33748362881 scopus 로고    scopus 로고
    • Usable security and privacy: A case study of developing privacy management tools
    • C. Brodie et al., "Usable Security and Privacy: A Case Study of Developing Privacy Management Tools," in SOUPS, 2005.
    • (2005) SOUPS
    • Brodie, C.1
  • 29
    • 38049149416 scopus 로고    scopus 로고
    • An empirical study of natural language parsing of privacy policy rules using the SPARCLE Policy workbench
    • C. A. Brodie, C.-M. Karat, and J. Karat, "An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench," in SOUPS, 2006.
    • (2006) SOUPS
    • Brodie, C.A.1    Karat, C.-M.2    Karat, J.3
  • 31
    • 84922542868 scopus 로고    scopus 로고
    • Towards data handling requirements-aware cloud computing
    • M. Henze et al., "Towards Data Handling Requirements-aware Cloud Computing," in IEEE CloudCom, 2013.
    • (2013) IEEE Cloud Com
    • Henze, M.1
  • 32
    • 0141725648 scopus 로고    scopus 로고
    • Model-Driven development: A metamodeling foundation
    • C. Atkinson and T. Kuhne, "Model-Driven Development: A Metamodeling Foundation," IEEE Software, vol. 20, no. 5, 2003.
    • (2003) IEEE Software , vol.20 , Issue.5
    • Atkinson, C.1    Kuhne, T.2
  • 34
    • 0242655790 scopus 로고    scopus 로고
    • SecureUML: A UML-Based modeling language for model-Driven security
    • T. Lodderstedt, D. Basin, and J. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security," in UML, 2002.
    • (2002) UML
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 37
    • 80053267657 scopus 로고    scopus 로고
    • A contextual approach to privacy online
    • H. Nissenbaum, "A Contextual Approach to Privacy Online," Daedalus, vol. 140, no. 4, 2011.
    • (2011) Daedalus , vol.140 , Issue.4
    • Nissenbaum, H.1
  • 38
    • 33748924513 scopus 로고    scopus 로고
    • Collective information practice: Emploring privacy and security as social and cultural phenomena
    • P. Dourish and K. Anderson, "Collective Information Practice: Emploring Privacy and Security as Social and Cultural Phenomena," Human-Computer Interaction, vol. 21, no. 3, 2006.
    • (2006) Human-Computer Interaction , vol.21 , Issue.3
    • Dourish, P.1    Anderson, K.2
  • 39
    • 38149054260 scopus 로고    scopus 로고
    • Personal information, borders, and the new surveillance studies
    • G. T. Marx and G. W. Muschert, "Personal Information, Borders, and the New Surveillance Studies," Annu. Rev. Law Soc. Sci., vol. 3, 2007.
    • (2007) Annu. Rev. Law Soc. Sci. , vol.3
    • Marx, G.T.1    Muschert, G.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.