-
1
-
-
84894668409
-
C aware computing for the internet of things: A survey
-
C. Perera et al., Context Aware Computing for the Internet of Things: A Survey, IEEE Comm. Surveys Tutorials, vol. 16, no. 1, 2013, pp. 414-454
-
(2013)
IEEE Comm. Surveys Tutorials
, vol.16
, Issue.1
, pp. 414-454
-
-
Perera, C.1
-
3
-
-
84961761166
-
The emerging internet of things marketplace from an industrial perspective: A survey
-
Jan
-
C. Perera, C. Liu, and S. Jayawardena, The Emerging Internet of Things Marketplace from an Industrial Perspective: A Survey, IEEE Trans. Emerging Topics in Computing, preprint, 8 Jan. 2015; doi: 10.1109/TETC.2015.2390034
-
(2015)
IEEE Trans. Emerging Topics in Computing, Preprint
, vol.8
-
-
Perera, C.1
Liu, C.2
Jayawardena, S.3
-
4
-
-
84900641617
-
Sensing as a service model for smart cities supported by internet of things
-
C. Perera et al., Sensing as a Service Model for Smart Cities Supported by Internet of Things, Trans. Emerging Telecomm. Technologies (ETT), vol. 25, no. 1, 2014, pp. 81-93
-
(2014)
Trans. Emerging Telecomm. Technologies (ETT
, vol.25
, Issue.1
, pp. 81-93
-
-
Perera, C.1
-
5
-
-
33644925852
-
A taxonomy of privacy
-
D.J. Solove, A Taxonomy of Privacy, Univ. of Pennsylvania Law Rev., vol. 154, no. 3, 2006, pp. 477-560
-
(2006)
Univ. of Pennsylvania Law Rev
, vol.154
, Issue.3
, pp. 477-560
-
-
Solove, D.J.1
-
8
-
-
84942427122
-
Privacy and data protection by design-from policy to engineering tech report european union
-
G. Danezis et al., Privacy and Data Protection by Design-From Policy to Engineering, tech. report, European Union Agency for Network and Information Security (ENISA), 2014
-
(2014)
Agency for Network and Information Security (ENISA
-
-
Danezis, G.1
-
10
-
-
84926486372
-
Privacy design strategies
-
Technology 428, N. Cuppens-Boulahia et al., eds. Springer
-
J.-H. Hoepman, Privacy Design Strategies, ICT Systems Security and Privacy Protection, IFIP Advances in Information and Comm. Technology 428, N. Cuppens-Boulahia et al., eds., Springer, 2014, pp. 446-459
-
(2014)
ICT Systems Security and Privacy Protection, IFIP Advances in Information and Comm
, pp. 446-459
-
-
Hoepman, J.-H.1
-
11
-
-
84886066391
-
Engineering privacy by design
-
S. Grses, C. Troncoso, and C. Díaz., Engineering Privacy by Design, Proc. Computers, Privacy& Data Protection Conf., 2011
-
(2011)
Proc. Computers, Privacy& Data Protection Conf
-
-
Grses, S.1
Troncoso, C.2
Díaz, C.3
-
12
-
-
33745883087
-
-
A. Pfitzmann and M. Hansen, Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management-A Consolidated Proposal for Terminology, 2010 https://dud.inf.tu-dresden.de/literatur/Anon-Terminology-v0.31.pdf
-
(2010)
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management-A Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
13
-
-
0005063385
-
Onion routing
-
D. Goldschlag, M. Reed, and P. Syverson, Onion Routing, Comm. ACM, vol. 42, no. 2, 1999, pp. 39-41
-
(1999)
Comm. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
15
-
-
79952551914
-
The dataware manifesto
-
D. McAuley, R. Mortier, and J. Goulding, The Dataware Manifesto, Proc. 3rd Int'l Conf. Comm. Systems and Networks (COMSNETS), 2011, pp. 1-6
-
(2011)
Proc. 3rd Int'l Conf. Comm. Systems and Networks (COMSNETS
, pp. 1-6
-
-
McAuley, D.1
Mortier, R.2
Goulding, J.3
-
16
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, K-Anonymity: A Model for Protecting Privacy, Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol. 10, no. 5, 2002, pp. 557-570
-
(2002)
Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
17
-
-
84905991151
-
The algorithmic foundations of differential privacy
-
C. Dwork and A. Roth, The Algorithmic Foundations of Differential Privacy, Foundations and Trends in Theoretical Computer Science, vol. 9, nos. 3-4, 2013, pp. 211-407
-
(2013)
Foundations and Trends in Theoretical Computer Science
, vol.9
, Issue.3-4
, pp. 211-407
-
-
Dwork, C.1
Roth, A.2
-
19
-
-
84942466256
-
-
J. Golbeck and M. L. Mauriello, User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns, tech. report, Human-Computer Interaction Lab, University of Maryland, 2014
-
(2014)
User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns, Tech. Report, Human-Computer Interaction Lab, University of Maryland
-
-
Golbeck, J.1
Mauriello, M.L.2
-
20
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
J.I. Hong et al., Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems, Proc. 5th Conf. Designing Interactive Systems: Processes, Practices, Methods, and Techniques, 2004, pp. 91-100
-
(2004)
Proc. 5th Conf. Designing Interactive Systems: Processes, Practices, Methods, and Techniques
, pp. 91-100
-
-
Hong, J.I.1
|