메뉴 건너뛰기




Volumn , Issue , 2015, Pages 2665-2670

A view on privacy & trust in IoT

Author keywords

Internet of Things; Privacy; Trust

Indexed keywords

DATA PRIVACY; TRUSTED COMPUTING;

EID: 84947785321     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCW.2015.7247581     Document Type: Conference Paper
Times cited : (72)

References (34)
  • 1
    • 84919372488 scopus 로고    scopus 로고
    • Security, privacy and trust in internet of things: The road ahead
    • S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in internet of things: The road ahead, " Computer Networks, vol. 76, 2015, pp. 146-164.
    • (2015) Computer Networks , vol.76 , pp. 146-164
    • Sicari, S.1    Rizzardi, A.2    Grieco, L.A.3    Coen-Porisini, A.4
  • 2
    • 85006184584 scopus 로고    scopus 로고
    • A survey on internet of things from industrial market perspective
    • C. Perera, C. H. Liu, S. Jayawardena, and M. Chen, "A survey on internet of things from industrial market perspective, " IEEE Access, vol. 2, 2014, pp. 1660-1679. [Online]. Available: http://dx. doi. org/10. 1109/ACCESS. 2015. 2389854
    • (2014) IEEE Access , vol.2 , pp. 1660-1679
    • Perera, C.1    Liu, C.H.2    Jayawardena, S.3    Chen, M.4
  • 4
    • 77953213147 scopus 로고    scopus 로고
    • Myths and fallacies of personally identifiable information
    • A. Narayanan and V. Shmatikov, "Myths and fallacies of "personally identifiable information", " Commun. ACM, vol. 53, no. 6, 2010, pp. 24-26.
    • (2010) Commun. ACM , vol.53 , Issue.6 , pp. 24-26
    • Narayanan, A.1    Shmatikov, V.2
  • 5
    • 58149425798 scopus 로고
    • A theory of human motivation
    • A. H. Maslow, "A theory of human motivation. " Psychological review, vol. 50, no. 4, 1943, p. 370.
    • (1943) Psychological Review , vol.50 , Issue.4 , pp. 370
    • Maslow, A.H.1
  • 6
    • 84910134274 scopus 로고    scopus 로고
    • Anonymity, privacy, and trust
    • R. S. Poore, "Anonymity, privacy, and trust, " Information Systems Security, vol. 8, no. 3, 1999, pp. 16-20.
    • (1999) Information Systems Security , vol.8 , Issue.3 , pp. 16-20
    • Poore, R.S.1
  • 7
    • 0008139038 scopus 로고    scopus 로고
    • Code and other laws of cyberspace
    • L. Lessig, Code and other laws of cyberspace. Basic books, 1999.
    • (1999) Basic Books
    • Lessig, L.1
  • 11
    • 84866382206 scopus 로고    scopus 로고
    • Trust management for the internet of things and its application to service composition
    • San Francisco, CA, USA, June 25-28, 2012. IEEE Computer Society
    • F. Bao and I. Chen, "Trust management for the internet of things and its application to service composition, " in 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June 25-28, 2012. IEEE Computer Society, 2012, pp. 1-6. [Online]. Available: http://dx. doi. org/10. 1109/WoWMoM. 2012. 6263792
    • (2012) 2012 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 , pp. 1-6
    • Bao, F.1    Chen, I.2
  • 14
    • 0003187764 scopus 로고
    • On the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • European Parliament and Council of the European Union
    • European Parliament and Council of the European Union, "On the protection of individuals with regard to the processing of personal data and on the free movement of such data, " Official Journal, vol. L, no. 281, 1995, pp. 0031-0050.
    • (1995) Official Journal , vol.50 , Issue.281 , pp. 0031-0050
  • 15
    • 50249142450 scopus 로고    scopus 로고
    • Robust de-anonymization of large sparse datasets
    • 18-21 May 2008, Oakland, California, USA. IEEE Computer Society
    • A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets, " in 2008 IEEE Symposium on Security and Privacy (S&P 2008), 18-21 May 2008, Oakland, California, USA. IEEE Computer Society, 2008, pp. 111-125. [Online]. Available: http://ieeexplore. ieee. org/xpl/mostRecentIssue. jsp?punumber=4531131
    • (2008) 2008 IEEE Symposium on Security and Privacy (S&P 2008) , pp. 111-125
    • Narayanan, A.1    Shmatikov, V.2
  • 16
    • 84863944193 scopus 로고    scopus 로고
    • NTMS, A. Levi, M. Badra, M. Cesana, M. Ghassemian, Ö. Gürbüz, N. Jabeur, M. Klonowski, A. Maña, S. Sargento, and S. Zeadally, Eds. IEEE
    • N. Jabeur, S. Zeadally, and S. Maydebura, "Improving trust and privacy models in social networks, " in NTMS, A. Levi, M. Badra, M. Cesana, M. Ghassemian, Ö. Gürbüz, N. Jabeur, M. Klonowski, A. Maña, S. Sargento, and S. Zeadally, Eds. IEEE, 2012, pp. 1-5.
    • (2012) Improving Trust and Privacy Models in Social Networks , pp. 1-5
    • Jabeur, N.1    Zeadally, S.2    Maydebura, S.3
  • 21
    • 84879098109 scopus 로고    scopus 로고
    • The pursuit of citizens' privacy: A privacy-aware smart city is possible
    • A. Martnez-Balleste, P. A. Perez-Martnez, and A. Solanas, "The pursuit of citizens' privacy: A privacy-aware smart city is possible, " IEEE Communications Magazine, vol. 51, no. 6, 2013. [Online]. Available: http://dx. doi. org/10. 1109/MCOM. 2013. 6525606
    • (2013) IEEE Communications Magazine , vol.51 , Issue.6
    • Martnez-Balleste, A.1    Perez-Martnez, P.A.2    Solanas, A.3
  • 22
    • 0038687775 scopus 로고    scopus 로고
    • Design and implementation of the idemix anonymous credential system
    • Washington, DC, USA, November 18-22, 2002, V. Atluri, Ed. ACM
    • J. Camenisch and E. V. Herreweghen, "Design and implementation of the idemix anonymous credential system, " in Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, V. Atluri, Ed. ACM, 2002, pp. 21-30. [Online]. Available: http://dl. acm. org/citation. cfm?id=586110
    • (2002) Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002 , pp. 21-30
    • Camenisch, J.1    Herreweghen, E.V.2
  • 23
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • Santa Barbara, California, USA, August 23-25, 1982. , D. Chaum, R. L. Rivest, and A. T. Sherman, Eds. Plenum Press, New York
    • D. Chaum, "Blind signatures for untraceable payments, " in Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982. , D. Chaum, R. L. Rivest, and A. T. Sherman, Eds. Plenum Press, New York, 1982, pp. 199-203.
    • (1982) Advances in Cryptology: Proceedings of CRYPTO '82 , pp. 199-203
    • Chaum, D.1
  • 25
    • 84857073828 scopus 로고    scopus 로고
    • Evaluating the privacy risk of location-based services
    • FC 2011, Gros Islet, St. Lucia, February 28-March 4, 2011, Revised Selected Papers, ser. Lecture Notes in Computer Science, G. Danezis, Ed. Springer
    • J. Freudiger, R. Shokri, and J. Hubaux, "Evaluating the privacy risk of location-based services, " in Financial Cryptography and Data Security-15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28-March 4, 2011, Revised Selected Papers, ser. Lecture Notes in Computer Science, G. Danezis, Ed. , vol. 7035. Springer, 2011, pp. 31-46.
    • (2011) Financial Cryptography and Data Security-15th International Conference , vol.7035 , pp. 31-46
    • Freudiger, J.1    Shokri, R.2    Hubaux, J.3
  • 27
    • 84929379226 scopus 로고    scopus 로고
    • Optimized location update protocols for secure and efficient position sharing
    • Germany, March 9-12, 2015. IEEE, p. in print
    • Z. Riaz, F. Dürr, and K. Rothermel, "Optimized location update protocols for secure and efficient position sharing, " in 2015 Conference on Networked Systems, NetSys 2015, Cottbus, Germany, March 9-12, 2015. IEEE, 2015, p. in print.
    • (2015) 2015 Conference on Networked Systems, NetSys 2015, Cottbus
    • Riaz, Z.1    Dürr, F.2    Rothermel, K.3
  • 28
  • 30
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things, " Computer Networks, vol. 57, no. 10, 2013, pp. 2266-2279.
    • (2013) Computer Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 32
    • 17444392883 scopus 로고    scopus 로고
    • Protecting client privacy with trusted computing at the server
    • March
    • A. Iliev and S. Smith, "Protecting client privacy with trusted computing at the server, " Security Privacy, IEEE, vol. 3, no. 2, March 2005, pp. 20-28.
    • (2005) Security Privacy, IEEE , vol.3 , Issue.2 , pp. 20-28
    • Iliev, A.1    Smith, S.2
  • 33
    • 0036949385 scopus 로고    scopus 로고
    • Enabling trusted software integrity
    • ACM
    • D. Kirovski, M. Driníc, and M. Potkonjak, "Enabling trusted software integrity, " in ACM SIGPLAN Notices, vol. 37, no. 10. ACM, 2002, pp. 108-120.
    • (2002) ACM SIGPLAN Notices , vol.37 , Issue.10 , pp. 108-120
    • Kirovski, D.1    Driníc, M.2    Potkonjak, M.3
  • 34
    • 84910049302 scopus 로고    scopus 로고
    • Communicating and visualising multicriterial trustworthiness under uncertainty
    • Toronto, ON, Canada, July 23-24, 2014, A. Miri, U. Hengartner, N. Huang, A. Jøsang, and J. Garca-Alfaro, Eds. IEEE
    • F. Volk, S. Hauke, D. Dieth, and M. Mühlhäuser, "Communicating and visualising multicriterial trustworthiness under uncertainty, " in 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, A. Miri, U. Hengartner, N. Huang, A. Jøsang, and J. Garca-Alfaro, Eds. IEEE, 2014, pp. 391-397. [Online]. Available: http://dx. doi. org/10. 1109/PST. 2014. 6890965
    • (2014) 2014 Twelfth Annual International Conference on Privacy, Security and Trust , pp. 391-397
    • Volk, F.1    Hauke, S.2    Dieth, D.3    Mühlhäuser, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.