-
1
-
-
84919372488
-
Security, privacy and trust in internet of things: The road ahead
-
S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in internet of things: The road ahead, " Computer Networks, vol. 76, 2015, pp. 146-164.
-
(2015)
Computer Networks
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.A.3
Coen-Porisini, A.4
-
2
-
-
85006184584
-
A survey on internet of things from industrial market perspective
-
C. Perera, C. H. Liu, S. Jayawardena, and M. Chen, "A survey on internet of things from industrial market perspective, " IEEE Access, vol. 2, 2014, pp. 1660-1679. [Online]. Available: http://dx. doi. org/10. 1109/ACCESS. 2015. 2389854
-
(2014)
IEEE Access
, vol.2
, pp. 1660-1679
-
-
Perera, C.1
Liu, C.H.2
Jayawardena, S.3
Chen, M.4
-
4
-
-
77953213147
-
Myths and fallacies of personally identifiable information
-
A. Narayanan and V. Shmatikov, "Myths and fallacies of "personally identifiable information", " Commun. ACM, vol. 53, no. 6, 2010, pp. 24-26.
-
(2010)
Commun. ACM
, vol.53
, Issue.6
, pp. 24-26
-
-
Narayanan, A.1
Shmatikov, V.2
-
5
-
-
58149425798
-
A theory of human motivation
-
A. H. Maslow, "A theory of human motivation. " Psychological review, vol. 50, no. 4, 1943, p. 370.
-
(1943)
Psychological Review
, vol.50
, Issue.4
, pp. 370
-
-
Maslow, A.H.1
-
6
-
-
84910134274
-
Anonymity, privacy, and trust
-
R. S. Poore, "Anonymity, privacy, and trust, " Information Systems Security, vol. 8, no. 3, 1999, pp. 16-20.
-
(1999)
Information Systems Security
, vol.8
, Issue.3
, pp. 16-20
-
-
Poore, R.S.1
-
7
-
-
0008139038
-
Code and other laws of cyberspace
-
L. Lessig, Code and other laws of cyberspace. Basic books, 1999.
-
(1999)
Basic Books
-
-
Lessig, L.1
-
8
-
-
77952415199
-
Towards a privacy-enhanced social networking site
-
15-18 February 2010, Krakow, Poland. IEEE Computer Society
-
E. ämeur, S. Gambs, and A. Ho, "Towards a privacy-enhanced social networking site, " in ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland. IEEE Computer Society, 2010, pp. 172-179.
-
(2010)
ARES 2010, Fifth International Conference on Availability, Reliability and Security
, pp. 172-179
-
-
Ämeur, E.1
Gambs, S.2
Ho, A.3
-
9
-
-
79959853254
-
Relations among privacy notions
-
J. Bohli and A. Pashalidis, "Relations among privacy notions, " ACM Trans. Inf. Syst. Secur. , vol. 14, no. 1, 2011, p. 4.
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, Issue.1
, pp. 4
-
-
Bohli, J.1
Pashalidis, A.2
-
10
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy, " International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, 2002, pp. 557-570.
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
11
-
-
84866382206
-
Trust management for the internet of things and its application to service composition
-
San Francisco, CA, USA, June 25-28, 2012. IEEE Computer Society
-
F. Bao and I. Chen, "Trust management for the internet of things and its application to service composition, " in 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June 25-28, 2012. IEEE Computer Society, 2012, pp. 1-6. [Online]. Available: http://dx. doi. org/10. 1109/WoWMoM. 2012. 6263792
-
(2012)
2012 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012
, pp. 1-6
-
-
Bao, F.1
Chen, I.2
-
12
-
-
84880723510
-
Ideas for a trust indicator in the internet of things
-
W. Leister and T. Schulz, "Ideas for a trust indicator in the internet of things, " in SMART 2012, The First International Conference on Smart Systems, Devices and Technologies, 2012, pp. 31-34.
-
(2012)
SMART 2012, the First International Conference on Smart Systems, Devices and Technologies
, pp. 31-34
-
-
Leister, W.1
Schulz, T.2
-
13
-
-
44049097288
-
A probabilistic trust model for gnupg
-
J. Jonczy, M. Wüthrich, and R. Haenni, "A probabilistic trust model for gnupg, " in Proceedings of the 23rd Chaos Communication Congress, 23C3, 2006, pp. 61-66.
-
(2006)
Proceedings of the 23rd Chaos Communication Congress
, vol.23 C3
, pp. 61-66
-
-
Jonczy, J.1
Wüthrich, M.2
Haenni, R.3
-
14
-
-
0003187764
-
On the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Parliament and Council of the European Union
-
European Parliament and Council of the European Union, "On the protection of individuals with regard to the processing of personal data and on the free movement of such data, " Official Journal, vol. L, no. 281, 1995, pp. 0031-0050.
-
(1995)
Official Journal
, vol.50
, Issue.281
, pp. 0031-0050
-
-
-
15
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
18-21 May 2008, Oakland, California, USA. IEEE Computer Society
-
A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets, " in 2008 IEEE Symposium on Security and Privacy (S&P 2008), 18-21 May 2008, Oakland, California, USA. IEEE Computer Society, 2008, pp. 111-125. [Online]. Available: http://ieeexplore. ieee. org/xpl/mostRecentIssue. jsp?punumber=4531131
-
(2008)
2008 IEEE Symposium on Security and Privacy (S&P 2008)
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
16
-
-
84863944193
-
-
NTMS, A. Levi, M. Badra, M. Cesana, M. Ghassemian, Ö. Gürbüz, N. Jabeur, M. Klonowski, A. Maña, S. Sargento, and S. Zeadally, Eds. IEEE
-
N. Jabeur, S. Zeadally, and S. Maydebura, "Improving trust and privacy models in social networks, " in NTMS, A. Levi, M. Badra, M. Cesana, M. Ghassemian, Ö. Gürbüz, N. Jabeur, M. Klonowski, A. Maña, S. Sargento, and S. Zeadally, Eds. IEEE, 2012, pp. 1-5.
-
(2012)
Improving Trust and Privacy Models in Social Networks
, pp. 1-5
-
-
Jabeur, N.1
Zeadally, S.2
Maydebura, S.3
-
18
-
-
84877959844
-
A framework for evaluating trust of service providers in cloud marketplaces
-
Portugal, March 18-22, 2013, S. Y. Shin and J. C. Maldonado, Eds. ACM
-
S. M. Habib, V. Varadharajan, and M. Mühlhäuser, "A framework for evaluating trust of service providers in cloud marketplaces, " in Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, Coimbra, Portugal, March 18-22, 2013, S. Y. Shin and J. C. Maldonado, Eds. ACM, 2013, pp. 1963-1965.
-
(2013)
Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, Coimbra
, pp. 1963-1965
-
-
Habib, S.M.1
Varadharajan, V.2
Mühlhäuser, M.3
-
19
-
-
70350674935
-
A data privacy taxonomy
-
A. P. Sexton, Ed. Springer
-
K. Barker, M. Askari, M. Banerjee, K. Ghazinour, B. Mackas, M. Majedi, S. Pun, and A. Williams, "A data privacy taxonomy, " in BNCOD, ser. Lecture Notes in Computer Science, A. P. Sexton, Ed. , vol. 5588. Springer, 2009, pp. 42-54.
-
(2009)
BNCOD, Ser. Lecture Notes in Computer Science
, vol.5588
, pp. 42-54
-
-
Barker, K.1
Askari, M.2
Banerjee, M.3
Ghazinour, K.4
Mackas, B.5
Majedi, M.6
Pun, S.7
Williams, A.8
-
20
-
-
38049048780
-
A three-dimensional conceptual framework for database privacy
-
W. Jonker and M. Petkovic, Eds. Springer
-
J. Domingo-Ferrer, "A three-dimensional conceptual framework for database privacy, " in Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, ser. Lecture Notes in Computer Science, W. Jonker and M. Petkovic, Eds. , vol. 4721. Springer, 2007, pp. 193-202.
-
(2007)
Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, Ser. Lecture Notes in Computer Science
, vol.4721
, pp. 193-202
-
-
Domingo-Ferrer, J.1
-
21
-
-
84879098109
-
The pursuit of citizens' privacy: A privacy-aware smart city is possible
-
A. Martnez-Balleste, P. A. Perez-Martnez, and A. Solanas, "The pursuit of citizens' privacy: A privacy-aware smart city is possible, " IEEE Communications Magazine, vol. 51, no. 6, 2013. [Online]. Available: http://dx. doi. org/10. 1109/MCOM. 2013. 6525606
-
(2013)
IEEE Communications Magazine
, vol.51
, Issue.6
-
-
Martnez-Balleste, A.1
Perez-Martnez, P.A.2
Solanas, A.3
-
22
-
-
0038687775
-
Design and implementation of the idemix anonymous credential system
-
Washington, DC, USA, November 18-22, 2002, V. Atluri, Ed. ACM
-
J. Camenisch and E. V. Herreweghen, "Design and implementation of the idemix anonymous credential system, " in Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, V. Atluri, Ed. ACM, 2002, pp. 21-30. [Online]. Available: http://dl. acm. org/citation. cfm?id=586110
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002
, pp. 21-30
-
-
Camenisch, J.1
Herreweghen, E.V.2
-
23
-
-
0001604533
-
Blind signatures for untraceable payments
-
Santa Barbara, California, USA, August 23-25, 1982. , D. Chaum, R. L. Rivest, and A. T. Sherman, Eds. Plenum Press, New York
-
D. Chaum, "Blind signatures for untraceable payments, " in Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982. , D. Chaum, R. L. Rivest, and A. T. Sherman, Eds. Plenum Press, New York, 1982, pp. 199-203.
-
(1982)
Advances in Cryptology: Proceedings of CRYPTO '82
, pp. 199-203
-
-
Chaum, D.1
-
25
-
-
84857073828
-
Evaluating the privacy risk of location-based services
-
FC 2011, Gros Islet, St. Lucia, February 28-March 4, 2011, Revised Selected Papers, ser. Lecture Notes in Computer Science, G. Danezis, Ed. Springer
-
J. Freudiger, R. Shokri, and J. Hubaux, "Evaluating the privacy risk of location-based services, " in Financial Cryptography and Data Security-15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28-March 4, 2011, Revised Selected Papers, ser. Lecture Notes in Computer Science, G. Danezis, Ed. , vol. 7035. Springer, 2011, pp. 31-46.
-
(2011)
Financial Cryptography and Data Security-15th International Conference
, vol.7035
, pp. 31-46
-
-
Freudiger, J.1
Shokri, R.2
Hubaux, J.3
-
26
-
-
2942587015
-
Mix zones: User privacy in locationaware services
-
Orlando, FL, USA. IEEE Computer Society
-
A. R. Beresford and F. Stajano, "Mix zones: User privacy in locationaware services, " in 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, USA. IEEE Computer Society, 2004, pp. 127-131.
-
(2004)
2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004
, pp. 127-131
-
-
Beresford, A.R.1
Stajano, F.2
-
27
-
-
84929379226
-
Optimized location update protocols for secure and efficient position sharing
-
Germany, March 9-12, 2015. IEEE, p. in print
-
Z. Riaz, F. Dürr, and K. Rothermel, "Optimized location update protocols for secure and efficient position sharing, " in 2015 Conference on Networked Systems, NetSys 2015, Cottbus, Germany, March 9-12, 2015. IEEE, 2015, p. in print.
-
(2015)
2015 Conference on Networked Systems, NetSys 2015, Cottbus
-
-
Riaz, Z.1
Dürr, F.2
Rothermel, K.3
-
28
-
-
85084161366
-
Tor: The secondgeneration onion router
-
August 9-13, 2004, San Diego, CA, USA, M. Blaze, Ed. USENIX
-
R. Dingledine, N. Mathewson, and P. F. Syverson, "Tor: The secondgeneration onion router, " in Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, M. Blaze, Ed. USENIX, 2004, pp. 303-320.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
29
-
-
35048901123
-
Public key encryption with keyword search
-
Interlaken, Switzerland, May 2-6, 2004, Proceedings, ser. Lecture Notes in Computer Science, C. Cachin and J. Camenisch, Eds. Springer
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search, " in Advances in Cryptology-EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, ser. Lecture Notes in Computer Science, C. Cachin and J. Camenisch, Eds. , vol. 3027. Springer, 2004, pp. 506-522.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
30
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things, " Computer Networks, vol. 57, no. 10, 2013, pp. 2266-2279.
-
(2013)
Computer Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
31
-
-
84902254257
-
Making devices trustworthy: Security and trust feedback in the internet of things
-
Newcastle, UK
-
C. Hochleitner, C. Graf, D. Unger, and M. Tscheligi, "Making devices trustworthy: Security and trust feedback in the internet of things, " in Fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), Newcastle, UK, 2012.
-
(2012)
Fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU)
-
-
Hochleitner, C.1
Graf, C.2
Unger, D.3
Tscheligi, M.4
-
32
-
-
17444392883
-
Protecting client privacy with trusted computing at the server
-
March
-
A. Iliev and S. Smith, "Protecting client privacy with trusted computing at the server, " Security Privacy, IEEE, vol. 3, no. 2, March 2005, pp. 20-28.
-
(2005)
Security Privacy, IEEE
, vol.3
, Issue.2
, pp. 20-28
-
-
Iliev, A.1
Smith, S.2
-
33
-
-
0036949385
-
Enabling trusted software integrity
-
ACM
-
D. Kirovski, M. Driníc, and M. Potkonjak, "Enabling trusted software integrity, " in ACM SIGPLAN Notices, vol. 37, no. 10. ACM, 2002, pp. 108-120.
-
(2002)
ACM SIGPLAN Notices
, vol.37
, Issue.10
, pp. 108-120
-
-
Kirovski, D.1
Driníc, M.2
Potkonjak, M.3
-
34
-
-
84910049302
-
Communicating and visualising multicriterial trustworthiness under uncertainty
-
Toronto, ON, Canada, July 23-24, 2014, A. Miri, U. Hengartner, N. Huang, A. Jøsang, and J. Garca-Alfaro, Eds. IEEE
-
F. Volk, S. Hauke, D. Dieth, and M. Mühlhäuser, "Communicating and visualising multicriterial trustworthiness under uncertainty, " in 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, A. Miri, U. Hengartner, N. Huang, A. Jøsang, and J. Garca-Alfaro, Eds. IEEE, 2014, pp. 391-397. [Online]. Available: http://dx. doi. org/10. 1109/PST. 2014. 6890965
-
(2014)
2014 Twelfth Annual International Conference on Privacy, Security and Trust
, pp. 391-397
-
-
Volk, F.1
Hauke, S.2
Dieth, D.3
Mühlhäuser, M.4
|