-
1
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabit, "The Internet of Things: A survey," Computer Networks, vol. 54, no. 15, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
-
-
Atzori, L.1
Iera, A.2
Morabit, G.3
-
3
-
-
84874277715
-
A cloud design for user-controlled storage and processing of sensor data
-
R. Hummen et al., "A Cloud Design for User-controlled Storage and Processing of Sensor Data," in IEEE CloudCom, 2012.
-
(2012)
IEEE CloudCom
-
-
Hummen, R.1
-
4
-
-
85001608959
-
Maintaining user control while storing and processing sensor data in the cloud
-
M. Henze et al., "Maintaining User Control While Storing and Processing Sensor Data in the Cloud," IJGHPC, vol. 5, no. 4, 2013.
-
(2013)
IJGHPC
, vol.5
, Issue.4
-
-
Henze, M.1
-
6
-
-
84897726068
-
Efficient and scalable IoT Service delivery on cloud
-
F. Li et al., "Efficient and Scalable IoT Service Delivery on Cloud," in IEEE CLOUD, 2013.
-
(2013)
IEEE CLOUD
-
-
Li, F.1
-
8
-
-
84889706242
-
Home is safer than the cloud! Privacy concerns for consumer cloud storage
-
I. Ion et al., "Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage," in SOUPS, 2011.
-
(2011)
SOUPS
-
-
Ion, I.1
-
9
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J. Joshi, and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security Privacy, vol. 8, no. 6, 2010.
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.6
-
-
Takabi, H.1
Joshi, J.2
Ahn, G.3
-
10
-
-
84992141126
-
The cloud needs cross-Layer data handling annotations
-
M. Henze, R. Hummen, and K. Wehrle, "The Cloud Needs Cross-Layer Data Handling Annotations," in IEEE SPW, 2013.
-
(2013)
IEEE SPW
-
-
Henze, M.1
Hummen, R.2
Wehrle, K.3
-
11
-
-
78650041762
-
Healthy ageing supported by technology: A Cross-Disciplinary research challenge
-
S. Koch, "Healthy Ageing Supported by Technology: A Cross-Disciplinary Research Challenge," Inform. Health Soc. Care, vol. 35, no. 3-4, 2010.
-
(2010)
Inform. Health Soc. Care
, vol.35
, Issue.3-4
-
-
Koch, S.1
-
12
-
-
80052696161
-
A survey on privacy in mobile participatory sensing applications
-
D. Christin et al., "A survey on privacy in mobile participatory sensing applications," J. Syst. Software, vol. 84, no. 11, 2011.
-
(2011)
J. Syst. Software
, vol.84
, Issue.11
-
-
Christin, D.1
-
14
-
-
0346869574
-
Designing for ubiquity: The perception of privacy
-
R. Beckwith, "Designing for Ubiquity: The Perception of Privacy," IEEE Pervasive Computing, vol. 2, no. 2, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.2
-
-
Beckwith, R.1
-
16
-
-
84874834655
-
Privacy promises, access control, and privacy management-Enforcing privacy throughout an enterprise by extending access control
-
C. Powers, P. Ashley, and M. Schunter, "Privacy Promises, Access Control, and Privacy Management-Enforcing Privacy Throughout an Enterprise By Extending Access Control," in ISEC, 2002.
-
(2002)
ISEC
-
-
Powers, C.1
Ashley, P.2
Schunter, M.3
-
17
-
-
84867800053
-
Secure and scalable cloud-Based architecture for e-Health wireless sensor networks
-
A. Lounis et al., "Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks," in ICCCN, 2012.
-
(2012)
ICCCN
-
-
Lounis, A.1
-
18
-
-
84939475227
-
Modeling cloud architectures as interactive systems
-
A. Navarro Pérez and B. Rumpe, "Modeling Cloud Architectures as Interactive Systems," in MDHPCL, 2013.
-
(2013)
MDHPCL
-
-
Navarro Pérez, A.1
Rumpe, B.2
-
20
-
-
78650911864
-
HICCUPS: Health Information Collaborative Collection Using Privacy and Security
-
A. D. Molina, M. Salajegheh, and K. Fu, "HICCUPS: Health Information Collaborative Collection Using Privacy and Security," in ACM SPIMACS, 2009.
-
(2009)
ACM SPIMACS
-
-
Molina, A.D.1
Salajegheh, M.2
Fu, K.3
-
21
-
-
48749117730
-
Context-Aware wireless sensor networks for assisted living and residential monitoring
-
A. Wood et al., "Context-Aware Wireless Sensor Networks for Assisted Living and Residential Monitoring," IEEE Network, vol. 22, no. 4, 2008.
-
(2008)
IEEE Network
, vol.22
, Issue.4
-
-
Wood, A.1
-
22
-
-
84922542871
-
Privacy as a service: Privacy-Aware data storage and processing in cloud computing architectures
-
W. Itani, A. Kayssi, and A. Chehab, "Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures," in IEEE DASC, 2009.
-
(2009)
IEEE DASC
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
23
-
-
84922542870
-
A privacy policy model for enterprises
-
G. Karjoth and M. Schunter, "A Privacy Policy Model for Enterprises," in IEEE CSFW, 2002.
-
(2002)
IEEE CSFW
-
-
Karjoth, G.1
Schunter, M.2
-
24
-
-
77955210831
-
Privacy-Aware role-Based access control
-
Q. Ni et al., "Privacy-Aware Role-Based Access Control," ACM TISSEC, vol. 13, no. 3, 2010.
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
-
-
Ni, Q.1
-
26
-
-
84880314081
-
Flexible data distribution policy language and gateway architecture
-
J. Spillner and A. Schill, "Flexible Data Distribution Policy Language and Gateway Architecture," in IEEE LatinCloud, 2012.
-
(2012)
IEEE LatinCloud
-
-
Spillner, J.1
Schill, A.2
-
27
-
-
33748362881
-
Usable security and privacy: A case study of developing privacy management tools
-
C. Brodie et al., "Usable Security and Privacy: A Case Study of Developing Privacy Management Tools," in SOUPS, 2005.
-
(2005)
SOUPS
-
-
Brodie, C.1
-
29
-
-
38049149416
-
An empirical study of natural language parsing of privacy policy rules using the SPARCLE Policy workbench
-
C. A. Brodie, C.-M. Karat, and J. Karat, "An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench," in SOUPS, 2006.
-
(2006)
SOUPS
-
-
Brodie, C.A.1
Karat, C.-M.2
Karat, J.3
-
31
-
-
84922542868
-
Towards data handling requirements-aware cloud computing
-
M. Henze et al., "Towards Data Handling Requirements-aware Cloud Computing," in IEEE CloudCom, 2013.
-
(2013)
IEEE Cloud Com
-
-
Henze, M.1
-
32
-
-
0141725648
-
Model-Driven development: A metamodeling foundation
-
C. Atkinson and T. Kuhne, "Model-Driven Development: A Metamodeling Foundation," IEEE Software, vol. 20, no. 5, 2003.
-
(2003)
IEEE Software
, vol.20
, Issue.5
-
-
Atkinson, C.1
Kuhne, T.2
-
34
-
-
0242655790
-
SecureUML: A UML-Based modeling language for model-Driven security
-
T. Lodderstedt, D. Basin, and J. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security," in UML, 2002.
-
(2002)
UML
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
37
-
-
80053267657
-
A contextual approach to privacy online
-
H. Nissenbaum, "A Contextual Approach to Privacy Online," Daedalus, vol. 140, no. 4, 2011.
-
(2011)
Daedalus
, vol.140
, Issue.4
-
-
Nissenbaum, H.1
-
38
-
-
33748924513
-
Collective information practice: Emploring privacy and security as social and cultural phenomena
-
P. Dourish and K. Anderson, "Collective Information Practice: Emploring Privacy and Security as Social and Cultural Phenomena," Human-Computer Interaction, vol. 21, no. 3, 2006.
-
(2006)
Human-Computer Interaction
, vol.21
, Issue.3
-
-
Dourish, P.1
Anderson, K.2
-
39
-
-
38149054260
-
Personal information, borders, and the new surveillance studies
-
G. T. Marx and G. W. Muschert, "Personal Information, Borders, and the New Surveillance Studies," Annu. Rev. Law Soc. Sci., vol. 3, 2007.
-
(2007)
Annu. Rev. Law Soc. Sci.
, vol.3
-
-
Marx, G.T.1
Muschert, G.W.2
|