-
1
-
-
84898043733
-
Charting past, present, and future research in ubiquitous computing
-
G.D. Abowd, and E.D. Mynatt Charting past, present, and future research in ubiquitous computing ACM Trans Comput Hum Interact 7 1 2000 29 58
-
(2000)
ACM Trans Comput Hum Interact
, vol.7
, Issue.1
, pp. 29-58
-
-
Abowd, G.D.1
Mynatt, E.D.2
-
2
-
-
77956877124
-
The internet of things: a survey
-
L. Atzori, A. Iera, and G. Morabito The internet of things: a survey Comput Netw 54 2010 2787 2805
-
(2010)
Comput Netw
, Issue.54
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
4
-
-
84870318243
-
Semantics for the internet of things: early progress and back to the future
-
P. Barnaghi, Wang W., C. Henson, and K. Taylor Semantics for the internet of things: early progress and back to the future Int J Semantic Web Inf Syst 8 1 2012 1 21
-
(2012)
Int J Semantic Web Inf Syst
, vol.8
, Issue.1
, pp. 1-21
-
-
Barnaghi, P.1
Wang, W.2
Henson, C.3
Taylor, K.4
-
6
-
-
2942524994
-
Location privacy in pervasive computing
-
A.R. Beresford, and F. Stajano Location privacy in pervasive computing Pervasive Comput IEEE 2 1 2003 46 55
-
(2003)
Pervasive Comput IEEE
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
8
-
-
24644520728
-
Towards security and privacy for pervasive computing
-
Springer New York, Berlin and Heidelberg
-
R. Campbell, J. Al-Muhtadi, P. Naldurg, G. Sampemane, and M.D. Mickunas Towards security and privacy for pervasive computing Software security - theories and systems 2003 Springer New York, Berlin and Heidelberg 1 15
-
(2003)
Software Security - Theories and Systems
, pp. 1-15
-
-
Campbell, R.1
Al-Muhtadi, J.2
Naldurg, P.3
Sampemane, G.4
Mickunas, M.D.5
-
9
-
-
17444413736
-
Privacy in pervasive computing environments-a contradiction in terms?
-
J. Cas Privacy in pervasive computing environments-a contradiction in terms? Technol Soc Mag IEEE 24 1 2005 24 33
-
(2005)
Technol Soc Mag IEEE
, vol.24
, Issue.1
, pp. 24-33
-
-
Cas, J.1
-
10
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan, and A. Perrig Security and privacy in sensor networks Computer 36 10 2003 103 105
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
11
-
-
84859979325
-
-
Asia and South Pacific design automation conference (ASP-DAC), Issue 17
-
Chen Y.K. Challenges and opportunities of internet of things Asia and South Pacific design automation conference (ASP-DAC), Issue 17 2012 383 388
-
(2012)
Challenges and Opportunities of Internet of Things
, pp. 383-388
-
-
Chen, Y.K.1
-
12
-
-
0039456088
-
Internet privacy concerns confirm the case for intervention
-
R. Clarke Internet privacy concerns confirm the case for intervention Commun ACM 42 2 1999 60 67
-
(1999)
Commun ACM
, vol.42
, Issue.2
, pp. 60-67
-
-
Clarke, R.1
-
15
-
-
33646948585
-
Research ethics and data quality: the implications of informed consent
-
G. Crow, R. Wiles, S. Heath, and V. Charles Research ethics and data quality: the implications of informed consent Int J Soc Res Methodol 9 2 2006 83 95
-
(2006)
Int J Soc Res Methodol
, vol.9
, Issue.2
, pp. 83-95
-
-
Crow, G.1
Wiles, R.2
Heath, S.3
Charles, V.4
-
16
-
-
0033464665
-
Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation
-
M.J. Culnan, and P.K. Armstrong Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation Organ Sci 10 1 1999 104 115
-
(1999)
Organ Sci
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.J.1
Armstrong, P.K.2
-
17
-
-
84904152379
-
Misuse resistant parallel authenticated encryptions
-
Springer International Publishing Chicago
-
N. Datta, and M. Nandi Misuse resistant parallel authenticated encryptions Information security and privacy 2014 Springer International Publishing Chicago 306 321
-
(2014)
Information Security and Privacy
, pp. 306-321
-
-
Datta, N.1
Nandi, M.2
-
18
-
-
31044453562
-
"lost in translation"?: intercultural dialogues on privacy and information ethics (introduction to special issue on privacy and data privacy protection in Asia)
-
C. Ess "Lost in translation"?: intercultural dialogues on privacy and information ethics (introduction to special issue on privacy and data privacy protection in Asia) Ethics Inf Technol 7 1 2005 1 6
-
(2005)
Ethics Inf Technol
, vol.7
, Issue.1
, pp. 1-6
-
-
Ess, C.1
-
19
-
-
78650942089
-
Vision and challenges for realising the internet of things
-
Publications Office of the European Union Luxembourg
-
European Commission (ISM) Vision and challenges for realising the internet of things CERP-IoT - cluster of European research projects on the internet of things 2010 Publications Office of the European Union Luxembourg 1 230
-
(2010)
CERP-IoT - Cluster of European Research Projects on the Internet of Things
, pp. 1-230
-
-
-
24
-
-
84957854760
-
Data quality, database fragmentation and information privacy
-
M.R. Gibbs, G. Shanks, and R. Lederman Data quality, database fragmentation and information privacy Surveill Soc 3 1 2002
-
(2002)
Surveill Soc
, vol.3
, Issue.1
-
-
Gibbs, M.R.1
Shanks, G.2
Lederman, R.3
-
26
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami Internet of Things (IoT): A vision, architectural elements, and future directions Future Generation Comput Syst 29 7 2013 1645 1660
-
(2013)
Future Generation Comput Syst
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
29
-
-
2442557513
-
Modeling privacy control in context-aware systems
-
Jiang X., and J.A. Landay Modeling privacy control in context-aware systems Pervasive Comput IEEE 1 3 2002 59 63
-
(2002)
Pervasive Comput IEEE
, vol.1
, Issue.3
, pp. 59-63
-
-
Jiang, X.1
Landay, J.A.2
-
30
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
L. Kagal, T. Finin, and A. Joshi Trust-based security in pervasive computing environments Computer 34 12 2001 154 157
-
(2001)
Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
31
-
-
0010602271
-
System software for ubiquitous computing
-
T. Kindberg, and A. Fox System software for ubiquitous computing Pervasive Comput IEEE 1 1 2002 70 81
-
(2002)
Pervasive Comput IEEE
, vol.1
, Issue.1
, pp. 70-81
-
-
Kindberg, T.1
Fox, A.2
-
32
-
-
75449104170
-
Smart objects as building blocks for the internet of things
-
G. Kortuem, F. Kawsar, D. Fitton, and V. Sundramoorthy Smart objects as building blocks for the internet of things Internet Comput IEEE 14 1 2010 44 51
-
(2010)
Internet Comput IEEE
, vol.14
, Issue.1
, pp. 44-51
-
-
Kortuem, G.1
Kawsar, F.2
Fitton, D.3
Sundramoorthy, V.4
-
33
-
-
84904202504
-
TMDS: thin-model data sharing scheme supporting keyword search in cloud storage
-
Springer International Publishing Chicago
-
Liu Z., Li J., Chen X., Yang J., and Jia C. TMDS: thin-model data sharing scheme supporting keyword search in cloud storage Information security and privacy 2014 Springer International Publishing Chicago 115 130
-
(2014)
Information Security and Privacy
, pp. 115-130
-
-
Liu, Z.1
Li, J.2
Chen, X.3
Yang, J.4
Jia, C.5
-
35
-
-
13244298307
-
Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model
-
N.K. Malhotra, S.S. Kim, and J. Agarwal Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model Inform Syst Res 15 4 2004 336 355
-
(2004)
Inform Syst Res
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
36
-
-
55249097295
-
Four ethical issues of the information age
-
R.O. Mason Four ethical issues of the information age MISQ 1986 5 12
-
(1986)
MISQ
, pp. 5-12
-
-
Mason, R.O.1
-
38
-
-
0032282474
-
Protecting privacy in an information age: the problem of privacy in public
-
H. Nissenbaum Protecting privacy in an information age: the problem of privacy in public Law Philos 17 5 1998 559 596
-
(1998)
Law Philos
, vol.17
, Issue.5
, pp. 559-596
-
-
Nissenbaum, H.1
-
44
-
-
84896918069
-
Guidelines for internet of things deployment approaches-the thing commandments
-
E. Oriwoh, P. Sant, and G. Epiphaniou Guidelines for internet of things deployment approaches-the thing commandments Procedia Comput Sci 21 2013 122 131
-
(2013)
Procedia Comput Sci
, Issue.21
, pp. 122-131
-
-
Oriwoh, E.1
Sant, P.2
Epiphaniou, G.3
-
45
-
-
64849115259
-
Identities in the future internet of things
-
A.C. Sarma, and G. João Identities in the future internet of things Wireless Pers Commun 3 49 2009 353 363
-
(2009)
Wireless Pers Commun
, vol.3
, Issue.49
, pp. 353-363
-
-
Sarma, A.C.1
João, G.2
-
47
-
-
0035428427
-
Pervasive computing: vision and challenges
-
M. Satyanarayanan Pervasive computing: vision and challenges Pers Commun IEEE 8 4 2001 10 17
-
(2001)
Pers Commun IEEE
, vol.8
, Issue.4
, pp. 10-17
-
-
Satyanarayanan, M.1
-
48
-
-
81355150537
-
Information privacy research: an interdisciplinary review
-
H.J. Smith, T. Dinev, and Xu H. Information privacy research: an interdisciplinary review MISQ 35 4 2011 989 1016
-
(2011)
MISQ
, vol.35
, Issue.4
, pp. 989-1016
-
-
Smith, H.J.1
Dinev, T.2
Xu, H.3
-
49
-
-
84900078964
-
Responsibility for information assurance and privacy: a problem of individual ethics?
-
B.C. Stahl Responsibility for information assurance and privacy: a problem of individual ethics? Adv Top End User Comput 4 4 2005 186
-
(2005)
Adv Top End User Comput
, vol.4
, Issue.4
, pp. 186
-
-
Stahl, B.C.1
-
50
-
-
3042803767
-
Pervasive computing goes the last hundred feet with RFID systems
-
V. Stanford Pervasive computing goes the last hundred feet with RFID systems Pervasive Comput IEEE 2 2 2003 9 14
-
(2003)
Pervasive Comput IEEE
, vol.2
, Issue.2
, pp. 9-14
-
-
Stanford, V.1
-
51
-
-
13844272147
-
Technology, security, and individual privacy: new tools, new threats, and new public perceptions
-
L.S. Strickland, and L.E. Hunt Technology, security, and individual privacy: new tools, new threats, and new public perceptions J Am Soc Inf Sci Technol 56 3 2005 221 234
-
(2005)
J Am Soc Inf Sci Technol
, vol.56
, Issue.3
, pp. 221-234
-
-
Strickland, L.S.1
Hunt, L.E.2
-
52
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
L. Sweeney Achieving k-anonymity privacy protection using generalization and suppression Int J Uncertain Fuzziness Knowledge Based Syst 10 5 2002 571 588
-
(2002)
Int J Uncertain Fuzziness Knowledge Based Syst
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
53
-
-
84876830574
-
The pursuit of privacy in a world where information control is failing
-
A. Thierer The pursuit of privacy in a world where information control is failing Harv J Law Public Policy 36 2013 409 1245
-
(2013)
Harv J Law Public Policy
, vol.36
, pp. 409-1245
-
-
Thierer, A.1
-
54
-
-
84866949605
-
Internet of things strategic research roadmap
-
O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, and et al. Internet of things strategic research roadmap Internet Things Glob Technol Soc Trends 2011 9 52
-
(2011)
Internet Things Glob Technol Soc Trends
, pp. 9-52
-
-
Vermesan, O.1
Friess, P.2
Guillemin, P.3
Gusmeroli, S.4
Sundmaeker, H.5
Bassi, A.6
-
55
-
-
84904170496
-
ExBLACR: extending BLACR system
-
Springer International Publishing Chicago
-
Wang W., Feng D., Qin Y., Shao J., Xi L., and Chu X. ExBLACR: extending BLACR system Information security and privacy 2014 Springer International Publishing Chicago 397 412
-
(2014)
Information Security and Privacy
, pp. 397-412
-
-
Wang, W.1
Feng, D.2
Qin, Y.3
Shao, J.4
Xi, L.5
Chu, X.6
-
56
-
-
71649095641
-
Internet of things-Need for a new legal environment?
-
R.H. Weber Internet of things-Need for a new legal environment? Comput Law Secur Rev 25 6 2009 522 527
-
(2009)
Comput Law Secur Rev
, vol.25
, Issue.6
, pp. 522-527
-
-
Weber, R.H.1
-
57
-
-
74949143896
-
Internet of things-new security and privacy challenges
-
R.H. Weber Internet of things-new security and privacy challenges Comput Law Secur Rev 1 26 2010 23 30
-
(2010)
Comput Law Secur Rev
, vol.1
, Issue.26
, pp. 23-30
-
-
Weber, R.H.1
-
58
-
-
79953100622
-
Accountability in the internet of things
-
R.H. Weber Accountability in the internet of things Comput Law Secur Rev 2 27 2011 133 138
-
(2011)
Comput Law Secur Rev
, vol.2
, Issue.27
, pp. 133-138
-
-
Weber, R.H.1
-
59
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
M. Weiser Some computer science issues in ubiquitous computing Commun ACM 36 7 1993 75 84
-
(1993)
Commun ACM
, vol.36
, Issue.7
, pp. 75-84
-
-
Weiser, M.1
-
60
-
-
84885391260
-
Privacy and Freedom
-
A.F. Westin Privacy and Freedom 25 Wash. & Lee L. Rev 166 1968 http://scholarlycommons.law.wlu.edu/wlulr/vol25/iss1/20
-
(1968)
25 Wash. & Lee L. Rev
, vol.166
-
-
Westin, A.F.1
-
61
-
-
84874109016
-
Location-aware private service discovery in pervasive computing environment
-
Yu C., Yao D., Li X., Zhang Y., Yang L.T., Xiong N., and et al. Location-aware private service discovery in pervasive computing environment Inf Sci (Ny) 230 2013 78 93
-
(2013)
Inf Sci (Ny)
, vol.230
, pp. 78-93
-
-
Yu, C.1
Yao, D.2
Li, X.3
Zhang, Y.4
Yang, L.T.5
Xiong, N.6
|