-
1
-
-
84924389830
-
MillWheel: Fault-tolerant stream processing at Internet scale
-
T. Akidau, A. Balikov, K. Bekiroglu, S. Chernyak, J. Haberman, R. Lax, S. McVeety, D. Mills, P. Nordstrom and S. Whittle, MillWheel: Fault-tolerant stream processing at Internet scale, Very Large Data Bases (2013), 734-746
-
(2013)
Very Large Data Bases
, pp. 734-746
-
-
Akidau, T.1
Balikov, A.2
Bekiroglu, K.3
Chernyak, S.4
Haberman, J.5
Lax, R.6
McVeety, S.7
Mills, D.8
Nordstrom, P.9
Whittle, S.10
-
2
-
-
77956877124
-
The internet of things: A survey
-
October
-
L. Atzori, A. Iera and G. Morabito, The Internet of Things: A survey, Comput. Netw. 54(15) (October 2010), 2787-2805. doi:10.1016/j.comnet.2010.05.010
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
4
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
IEEE Computer Society,Washington, DC, USA
-
A. Barth, A. Datta, J.C. Mitchell and H. Nissenbaum, Privacy and contextual integrity: Framework and applications, in: Proc. of the 2006 IEEE Symposium on Security and Privacy, SP '06, IEEE Computer Society,Washington, DC, USA, 2006, pp. 184-198
-
(2006)
Proc. of the 2006 IEEE Symposium on Security and Privacy, SP '06
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
5
-
-
84891887618
-
A k-anonymity privacy-preserving approach in wireless medical monitoring environments
-
January
-
P. Belsis and G. Pantziou, A k-anonymity privacy-preserving approach in wireless medical monitoring environments, Personal Ubiquitous Comput. 18(1) (January 2014), 61-74. doi: 10.1007/s00779-012-0618-y
-
(2014)
Personal Ubiquitous Comput.
, vol.18
, Issue.1
, pp. 61-74
-
-
Belsis, P.1
Pantziou, G.2
-
6
-
-
70350379222
-
Secure multiparty computation goes live
-
Springer-Verlag, Berlin, Heidelberg
-
P. Bogetoft, D.L. Christensen, I. Damgîrd, M. Geisler, T. Jakobsen, M. Krøigaard, J.D. Nielsen, J.B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach and T. Toft, Secure multiparty computation goes live, in: Financial Cryptography and Data Security, Springer-Verlag, Berlin, Heidelberg, 2009, pp. 325-343
-
(2009)
Financial Cryptography and Data Security
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgîrd, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
7
-
-
84865458860
-
Privacy 3.0: = data minimization + user control + contextual integrity (privatheit 3.0: = datenminimierung + nutzerkontrolle + kontextuelle integrität)
-
K. Borcea-Pfitzmann, A. Pfitzmann and M. Berg, Privacy 3.0: = data minimization + user control + contextual integrity (privatheit 3.0: = datenminimierung + nutzerkontrolle + kontextuelle integrität), it-Information Technology 53(1) (2011), 34-40
-
(2011)
It-Information Technology
, vol.53
, Issue.1
, pp. 34-40
-
-
Borcea-Pfitzmann, K.1
Pfitzmann, A.2
Berg, M.3
-
8
-
-
70450278994
-
An efficient k-anonymous localization technique for assistive environments
-
ACM, New York, NY, USA
-
F. Buccafurri and G. Lax, An efficient k-anonymous localization technique for assistive environments, in: Proc. of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA '09, ACM, New York, NY, USA, 2009, pp. 2:1-2:8
-
(2009)
Proc. of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA '09
, pp. 21-28
-
-
Buccafurri, F.1
Lax, G.2
-
9
-
-
84943698712
-
Advanced data management for real-time data intensive applications and services
-
November
-
L. Carafoli, F. Mandreoli and R. Martoglia, Advanced data management for real-time data intensive applications and services, Journal of Ambient Intelligence and Smart Environments 6(6) (November 2014), 741-742
-
(2014)
Journal of Ambient Intelligence and Smart Environments
, vol.6
, Issue.6
, pp. 741-742
-
-
Carafoli, L.1
Mandreoli, F.2
Martoglia, R.3
-
10
-
-
77955203039
-
A framework to enforce access control over data streams
-
B. Carminati, E. Ferrari, J. Cao and K.-L. Tan, A framework to enforce access control over data streams, ACM Trans. Inf. Syst. Secur. 13(3) (2010). doi:10.1145/1805974.1805984
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.3
-
-
Carminati, B.1
Ferrari, E.2
Cao, J.3
Tan, K.-L.4
-
12
-
-
84855339464
-
Processing flows of information: From data stream to complex event processing
-
June
-
G. Cugola and A. Margara, Processing flows of information: From data stream to complex event processing, ACM Comput. Surv. 44(3) (June 2012), 15:1-15:62. doi:10.1145/ 2187671.2187677
-
(2012)
ACM Comput. Surv.
, vol.44
, Issue.3
, pp. 151-1562
-
-
Cugola, G.1
Margara, A.2
-
13
-
-
84944048132
-
The ponder policy specification language
-
Springer-Verlag, London, UK
-
N. Damianou, N. Dulay, E. Lupu and M. Sloman, The ponder policy specification language, in: Proc. of the International Workshop on Policies for Distributed Systems and Networks, POLICY '01, Springer-Verlag, London, UK, 2001, pp. 18-38. doi:10.1007/3-540-44569-2-2
-
(2001)
Proc. of the International Workshop on Policies for Distributed Systems and Networks, POLICY '01
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
14
-
-
37549003336
-
MapReduce: Simplified data processing on large clusters
-
January
-
J. Dean and S. Ghemawat, MapReduce: Simplified data processing on large clusters, Commun. ACM51(1) (January 2008), 107-113. doi:10.1145/1327452.1327492
-
(2008)
Commun. ACM
, vol.51
, Issue.1
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
15
-
-
70349305273
-
Differential privacy: A survey of results
-
Springer-Verlag, Berlin, Heidelberg
-
C. Dwork, Differential privacy: A survey of results, in: Proc. of the 5th International Conference on Theory and Applications of Models of Computation, TAMC'08, Springer-Verlag, Berlin, Heidelberg, 2008, pp. 1-19. doi:10.1007/978-3-540-79228-4-1
-
(2008)
Proc. of the 5th International Conference on Theory and Applications of Models of Computation, TAMC'08
, pp. 1-19
-
-
Dwork, C.1
-
16
-
-
77956195013
-
Data mining with differential privacy
-
ACM, New York, NY, USA
-
A. Friedman and A. Schuster, Data mining with differential privacy, in: Proc. of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '10, ACM, New York, NY, USA, 2010, pp. 493-502
-
(2010)
Proc. of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '10
, pp. 493-502
-
-
Friedman, A.1
Schuster, A.2
-
17
-
-
77649261628
-
-
PhD thesis, Stanford, CA, USA
-
C. Gentry, A fully homomorphic encryption scheme, PhD thesis, Stanford, CA, USA, 2009, AAI3382729
-
(2009)
A Fully Homomorphic Encryption Scheme
, pp. AAI3382729
-
-
Gentry, C.1
-
18
-
-
84979522519
-
Privacy enhancing technologies for the Internet III: Ten years later
-
A. Acquisti, S. Gritzalis, C. Lambrinoudakis and S. De Capitani di Vimercati, eds, Auerbach Publications, New York, London
-
I. Goldberg, Privacy enhancing technologies for the Internet III: Ten years later, in: Digital Privacy: Theory, Technologies and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis and S. De Capitani di Vimercati, eds, Auerbach Publications, New York, London, 2007, pp. 3-18. doi:10.1201/9781420052183.ch1
-
(2007)
Digital Privacy: Theory, Technologies and Practices
, pp. 3-18
-
-
Goldberg, I.1
-
19
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
September
-
J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, Internet of Things (IoT): A vision, architectural elements, and future directions, Future Gener. Comput. Syst. 29(7) (September 2013), 1645-1660. doi:10.1016/j.future.2013.01.010
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
20
-
-
84886066391
-
Engineering privacy by design
-
25-28 January 2011, January
-
S. Gürses, C. Troncoso and C. Diaz, Engineering privacy by design, in: Conference on Computers, Privacy & Data Protection, 25-28 January 2011, January 2011
-
(2011)
Conference on Computers, Privacy & Data Protection
-
-
Gürses, S.1
Troncoso, C.2
Diaz, C.3
-
21
-
-
84855643907
-
Smart metering depseudonymization
-
ACM,NewYork, NY, USA
-
M. Jawurek, M. Johns and K. Rieck, Smart metering depseudonymization, in: Proc. of the 27th Annual Computer Security Applications Conference, ACSAC '11, ACM,NewYork, NY, USA, 2011, pp. 227-236
-
(2011)
Proc. of the 27th Annual Computer Security Applications Conference, ACSAC '11
, pp. 227-236
-
-
Jawurek, M.1
Johns, M.2
Rieck, K.3
-
22
-
-
84864355928
-
A unified attribute-based access control model covering DAC, MAC and RBAC
-
Springer-Verlag, Berlin, Heidelberg
-
X. Jin, R. Krishnan and R. Sandhu, A unified attribute-based access control model covering DAC, MAC and RBAC, in: Proc. of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec'12, Springer-Verlag, Berlin, Heidelberg, 2012, pp. 41-55
-
(2012)
Proc. of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec'12
, pp. 41-55
-
-
Jin, X.1
Krishnan, R.2
Sandhu, R.3
-
23
-
-
80455140352
-
An attribute based framework for risk-adaptive access control models
-
Aug.
-
S. Kandala, R. Sandhu and V. Bhamidipati, An attribute based framework for risk-adaptive access control models, in: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), Aug. 2011, pp. 236-241. doi:10.1109/ARES.2011.41
-
(2011)
2011 Sixth International Conference on Availability, Reliability and Security (ARES)
, pp. 236-241
-
-
Kandala, S.1
Sandhu, R.2
Bhamidipati, V.3
-
24
-
-
84945556728
-
Privacy by design-Principles of privacyaware ubiquitous systems
-
Springer-Verlag, London, UK
-
M. Langheinrich, Privacy by design-Principles of privacyaware ubiquitous systems, in: Proc. of the 3rd International Conference on Ubiquitous Computing, UbiComp '01, Springer-Verlag, London, UK, 2001, pp. 273-291
-
(2001)
Proc. of the 3rd International Conference on Ubiquitous Computing, UbiComp '01
, pp. 273-291
-
-
Langheinrich, M.1
-
25
-
-
49649119406
-
Cyber physical systems: Design challenges
-
IEEE Computer Society, Washington, DC, USA
-
E.A. Lee, Cyber physical systems: Design challenges, in: Proc. of the 2008 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing, ISORC '08, IEEE Computer Society, Washington, DC, USA, 2008, pp. 363-369. doi:10.1109/ISORC.2008.25
-
(2008)
Proc. of the 2008 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing, ISORC '08
, pp. 363-369
-
-
Lee, E.A.1
-
27
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and l-diversity
-
N. Li, T. Li and S. Venkatasubramanian, t-Closeness: Privacy beyond k-anonymity and l-diversity, in: 23rd International Conference on Data Engineering (ICDE 2007), IEEE, 2007, pp. 106-115. doi:10.1109/ICDE.2007.367856
-
(2007)
23rd International Conference on Data Engineering (ICDE 2007), IEEE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
28
-
-
84887186291
-
Big privacy: Protecting confidentiality in big data
-
September
-
A. Machanavajjhala and J.P. Reiter, Big privacy: Protecting confidentiality in big data, XRDS 19(1) (September 2012), 20-23. doi:10.1145/2331042.2331051
-
(2012)
XRDS
, vol.19
, Issue.1
, pp. 20-23
-
-
Machanavajjhala, A.1
Reiter, J.P.2
-
29
-
-
84874872678
-
Fence: Continuous access control enforcement in dynamic data stream environments
-
ACM, New York, NY, USA
-
R.V. Nehme, H.-S. Lim and E. Bertino, Fence: Continuous access control enforcement in dynamic data stream environments, in: Proc. of the Third ACM Conference on Data and Application Security and Privacy, CODASPY '13, ACM, New York, NY, USA, 2013, pp. 243-254
-
(2013)
Proc. of the Third ACM Conference on Data and Application Security and Privacy, CODASPY '13
, pp. 243-254
-
-
Nehme, R.V.1
Lim, H.-S.2
Bertino, E.3
-
30
-
-
79951736167
-
S4: Distributed stream computing platform
-
Washington, DC, USA
-
L. Neumeyer, B. Robbins, A. Nair and A. Kesari, S4: Distributed stream computing platform, in: Proc. of the 2010 IEEE International Conference on Data Mining Workshops, ICDMW '10, Washington, DC, USA, 2010, pp. 170-177. doi:10.1109/ICDMW.2010.172
-
(2010)
Proc. of the 2010 IEEE International Conference on Data Mining Workshops, ICDMW '10
, pp. 170-177
-
-
Neumeyer, L.1
Robbins, B.2
Nair, A.3
Kesari, A.4
-
31
-
-
77954482365
-
Risk-based access control systems built on fuzzy inferences
-
ACM, New York, NY, USA
-
Q. Ni, E. Bertino and J. Lobo, Risk-based access control systems built on fuzzy inferences, in: Proc. of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, ACM, New York, NY, USA, 2010, pp. 250-260
-
(2010)
Proc. of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10
, pp. 250-260
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
32
-
-
84957042349
-
Putting statistical disclosure control into practice: The ARX data anonymization tool
-
Springer International Publishing, Cham
-
F. Prasser and F. Kohlmayer, Putting statistical disclosure control into practice: The ARX data anonymization tool, in: Medical Data Privacy Handbook, Springer International Publishing, Cham, 2015, pp. 111-148
-
(2015)
Medical Data Privacy Handbook
, pp. 111-148
-
-
Prasser, F.1
Kohlmayer, F.2
-
33
-
-
41549151971
-
-
CW Reports CW464, Department of Computer Science, K.U. Leuven, Leuven, Belgium, October
-
D. Preuveneers and Y. Berbers, Prime numbers considered useful: Ontology encoding for efficient subsumption testing, CW Reports CW464, Department of Computer Science, K.U. Leuven, Leuven, Belgium, October 2006
-
(2006)
Prime Numbers Considered Useful: Ontology Encoding for Efficient Subsumption Testing
-
-
Preuveneers, D.1
Berbers, Y.2
-
34
-
-
41549101735
-
Encoding semantic awareness in resource-constrained devices
-
D. Preuveneers and Y. Berbers, Encoding semantic awareness in resource-constrained devices, IEEE Intelligent Systems 23(2) (2008), 26-33. doi:10.1109/MIS.2008.25
-
(2008)
IEEE Intelligent Systems
, vol.23
, Issue.2
, pp. 26-33
-
-
Preuveneers, D.1
Berbers, Y.2
-
35
-
-
84908636720
-
SAMURAI: A streaming multi-tenant context-management architecture for intelligent and scalable Internet of things applications, in: 2014
-
Shanghai, China, June 30-July 4, 2014, IEEE
-
D. Preuveneers and Y. Berbers, SAMURAI: A streaming multi-tenant context-management architecture for intelligent and scalable Internet of things applications, in: 2014 International Conference on Intelligent Environments, Shanghai, China, June 30-July 4, 2014, IEEE, 2014, pp. 226-233
-
(2014)
International Conference on Intelligent Environments
, pp. 226-233
-
-
Preuveneers, D.1
Berbers, Y.2
-
36
-
-
84954121601
-
SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments
-
D. Preuveneers, Y. Berbers and W. Joosen, SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments, Journal of Ambient Intelligence and Smart Environments 8(1) (2016), 63-78. doi:10.3233/AIS-150357
-
(2016)
Journal of Ambient Intelligence and Smart Environments
, vol.8
, Issue.1
, pp. 63-78
-
-
Preuveneers, D.1
Berbers, Y.2
Joosen, W.3
-
37
-
-
84955479104
-
SparkXS: Efficient access control for intelligent and large-scale streaming data applications, in: 2015
-
July
-
D. Preuveneers and W. Joosen, SparkXS: Efficient access control for intelligent and large-scale streaming data applications, in: 2015 International Conference on Intelligent Environments (IE), July 2015, pp. 96-103. doi:10.1109/IE.2015.21
-
(2015)
International Conference on Intelligent Environments (IE)
, pp. 96-103
-
-
Preuveneers, D.1
Joosen, W.2
-
38
-
-
84975796117
-
Privacy-enabled remote health monitoring applications for resource constrained wearable devices
-
ACM, April
-
D. Preuveneers and W. Joosen, Privacy-enabled remote health monitoring applications for resource constrained wearable devices, in: Proc. of the 31st Annual ACM Symposium on Applied Computing, Vol. 1, ACM, April 2016, pp. 119-124. doi:10.1145/2851613.2851683
-
(2016)
Proc. of the 31st Annual ACM Symposium on Applied Computing
, vol.1
, pp. 119-124
-
-
Preuveneers, D.1
Joosen, W.2
-
39
-
-
84975514466
-
Adaptive dissemination for mobile electronic health record applications with proactive situational awareness
-
CPS: IEEE Computer Society Conference Publishing Services, January
-
D. Preuveneers, S.N.Z. Naqvi, A. Ramakrishnan, Y. Berbers and W. Joosen, Adaptive dissemination for mobile electronic health record applications with proactive situational awareness, in: HICSS 49, Vol. 49, CPS: IEEE Computer Society Conference Publishing Services, January 2016, pp. 3229-3238
-
(2016)
HICSS 49
, vol.49
, pp. 3229-3238
-
-
Preuveneers, D.1
Naqvi, S.N.Z.2
Ramakrishnan, A.3
Berbers, Y.4
Joosen, W.5
-
40
-
-
77956217277
-
Cyber-physical systems: The next computing revolution
-
ACM, New York, NY, USA
-
R.R. Rajkumar, I. Lee, L. Sha and J. Stankovic, Cyber-physical systems: The next computing revolution, in: Proc. of the 47th Design Automation Conference, DAC '10, ACM, New York, NY, USA, 2010, pp. 731-736
-
(2010)
Proc. of the 47th Design Automation Conference, DAC '10
, pp. 731-736
-
-
Rajkumar, R.R.1
Lee, I.2
Sha, L.3
Stankovic, J.4
-
41
-
-
84894224008
-
A loosely coupled and distributed Bayesian framework for multi-context recognition in dynamic ubiquitous environments
-
Dec.
-
A.K. Ramakrishnan, D. Preuveneers and Y. Berbers, A loosely coupled and distributed Bayesian framework for multi-context recognition in dynamic ubiquitous environments, in: Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), Dec. 2013, pp. 270-277
-
(2013)
Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC)
, pp. 270-277
-
-
Ramakrishnan, A.K.1
Preuveneers, D.2
Berbers, Y.3
-
42
-
-
84867473104
-
PPO & PPM 2.0: Extending the privacy preference framework to provide finer-grained access control for the web of data
-
ACM, New York, NY, USA
-
O. Sacco and J.G. Breslin, PPO & PPM 2.0: Extending the privacy preference framework to provide finer-grained access control for the web of data, in: Proc. of the 8th International Conference on Semantic Systems, I-SEMANTICS '12, ACM, New York, NY, USA, 2012, pp. 80-87
-
(2012)
Proc. of the 8th International Conference on Semantic Systems, I-SEMANTICS '12
, pp. 80-87
-
-
Sacco, O.1
Breslin, J.G.2
-
43
-
-
84891911770
-
A privacy preference ontology (PPO) for linked data
-
C. Bizer, T. Heath, T. Berners-Lee and M. Hausenblas, eds, Hyderabad, India, March 29, 2011, CEURWorkshop Proceedings, CEUR-WS.org
-
O. Sacco and A. Passant, A privacy preference ontology (PPO) for linked data, in: WWW2011 Workshop on Linked Data on the Web, C. Bizer, T. Heath, T. Berners-Lee and M. Hausenblas, eds, Hyderabad, India, March 29, 2011, CEURWorkshop Proceedings, Vol. 813, CEUR-WS.org, 2011
-
(2011)
WWW2011 Workshop on Linked Data on the Web
, vol.813
-
-
Sacco, O.1
Passant, A.2
-
44
-
-
0027699087
-
Lattice-based access control models
-
November
-
R.S. Sandhu, Lattice-based access control models, Computer 26(11) (November 1993), 9-19. doi:10.1109/2.241422
-
(1993)
Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
45
-
-
0030086382
-
Role-based access control models
-
February
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein and C.E. Youman, Role-based access control models, Computer 29(2) (February 1996), 38-47. doi:10.1109/2.485845
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
46
-
-
0028513932
-
Access control: Principle and practice
-
Sept.
-
R. Sandhu and P. Samarati, Access control: Principle and practice, IEEE Communications Magazine 32(9) (Sept. 1994), 40-48. doi:10.1109/35.312842
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
47
-
-
84881139576
-
Access policy consolidation for event processing systems
-
IEEE Computer Society, Washington, DC, USA
-
B. Schilling, B. Koldehofe, K. Rotherme and U. Ramachandran, Access policy consolidation for event processing systems, in: Proc. of the 2013 Conference on Networked Systems, NETSYS '13, IEEE Computer Society, Washington, DC, USA, 2013, pp. 92-101. doi:10.1109/NetSys.2013.18
-
(2013)
Proc. of the 2013 Conference on Networked Systems, NETSYS '13
, pp. 92-101
-
-
Schilling, B.1
Koldehofe, B.2
Rotherme, K.3
Ramachandran, U.4
-
48
-
-
31444440239
-
The 8 requirements of real-time stream processing
-
December
-
M. Stonebraker, U. Cetintemel and S. Zdonik, The 8 requirements of real-time stream processing, ACM SIGMOD Record 34(4) (December 2005), 42-47. doi:10.1145/1107499. 1107504
-
(2005)
ACM SIGMOD Record
, vol.34
, Issue.4
, pp. 42-47
-
-
Stonebraker, M.1
Cetintemel, U.2
Zdonik, S.3
-
49
-
-
84979796608
-
Enhancing privacy of information brokering in smart districts by adaptive pseudonymization
-
J. Suomalainen and J. Julku, Enhancing privacy of information brokering in smart districts by adaptive pseudonymization, IEEE Access 4 (2016), 914-927. doi:10.1109/ACCESS. 2016.2538818
-
(2016)
IEEE Access
, vol.4
, pp. 914-927
-
-
Suomalainen, J.1
Julku, J.2
-
50
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
October
-
L. Sweeney, Achieving k-anonymity privacy protection using generalization and suppression, Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5) (October 2002), 571-588. doi: 10.1142/S021848850200165X
-
(2002)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
51
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
October
-
L. Sweeney, K-anonymity: A model for protecting privacy, Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5) (October 2002), 557-570. doi:10.1142/S0218488502001648
-
(2002)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
52
-
-
2542469289
-
Privacy protection, control of information, and privacy-enhancing technologies
-
March
-
H.T. Tavani and J.H. Moor, Privacy protection, control of information, and privacy-enhancing technologies, SIGCAS Comput. Soc. 31(1) (March 2001), 6-11. doi:10.1145/572277. 572278
-
(2001)
SIGCAS Comput. Soc.
, vol.31
, Issue.1
, pp. 6-11
-
-
Tavani, H.T.1
Moor, J.H.2
-
53
-
-
0242308055
-
Semantic web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder
-
D. Fensel, K.P. Sycara and J. Mylopoulos, eds, Lecture Notes in Computer Science, Springer
-
G. Tonti, J.M. Bradshaw, R. Jeffers, R. Montanari, N. Suri and A. Uszok, Semantic web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder, in: International Semantic Web Conference, D. Fensel, K.P. Sycara and J. Mylopoulos, eds, Lecture Notes in Computer Science, Vol. 2870, Springer, 2003, pp. 419-437
-
(2003)
International Semantic Web Conference
, vol.2870
, pp. 419-437
-
-
Tonti, G.1
Bradshaw, J.M.2
Jeffers, R.3
Montanari, R.4
Suri, N.5
Uszok, A.6
-
55
-
-
84906950333
-
Empirical evaluation of a privacy-focused threat modeling methodology
-
K. Wuyts, R. Scandariato and W. Joosen, Empirical evaluation of a privacy-focused threat modeling methodology, Journal of Systems and Software 96 (2014), 122-138. doi:10.1016/ j.jss.2014.05.075
-
(2014)
Journal of Systems and Software
, vol.96
, pp. 122-138
-
-
Wuyts, K.1
Scandariato, R.2
Joosen, W.3
-
56
-
-
84979622406
-
-
XACML-V3.0, eXtensible Access Control Markup Language (XACML) Version 3.0. Candidate OASIS Standard 01, September
-
XACML-V3.0, eXtensible Access Control Markup Language (XACML) Version 3.0. Candidate OASIS Standard 01, http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-speccos01-en.html, September 2012
-
(2012)
-
-
-
57
-
-
84954112745
-
Protecting locations with differential privacy under temporal correlations
-
ACM, New York, NY, USA
-
Y. Xiao and L. Xiong, Protecting locations with differential privacy under temporal correlations, in: Proc. of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, ACM, New York, NY, USA, 2015, pp. 1298-1309
-
(2015)
Proc. of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15
, pp. 1298-1309
-
-
Xiao, Y.1
Xiong, L.2
-
58
-
-
85085251984
-
Spark: Cluster computing with working sets
-
USENIX Association, Berkeley, CA, USA
-
M. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. Stoica, Spark: Cluster computing with working sets, in: Proc. of the 2nd USENIX Conference on Hot Topics in Cloud Computing, HotCloud'10, USENIX Association, Berkeley, CA, USA, 2010
-
(2010)
Proc. of the 2nd USENIX Conference on Hot Topics in Cloud Computing, HotCloud'10
-
-
Zaharia, M.1
Chowdhury, M.2
Franklin, M.J.3
Shenker, S.4
Stoica, I.5
-
59
-
-
84889637396
-
Discretized streams: Fault-tolerant streaming computation at scale
-
Farmington, PA, USA, November 3-6, 2013, M. Kaminsky and M. Dahlin, eds, ACM
-
M. Zaharia, T. Das, H. Li, T. Hunter, S. Shenker and I. Stoica, Discretized streams: Fault-tolerant streaming computation at scale, in: ACMSIGOPS 24th Symposium on Operating Systems Principles, SOSP '13, Farmington, PA, USA, November 3-6, 2013, M. Kaminsky and M. Dahlin, eds, ACM, 2013, pp. 423-438
-
(2013)
ACMSIGOPS 24th Symposium on Operating Systems Principles, SOSP '13
, pp. 423-438
-
-
Zaharia, M.1
Das, T.2
Li, H.3
Hunter, T.4
Shenker, S.5
Stoica, I.6
-
61
-
-
84907023884
-
Urban computing: Concepts, methodologies, and applications
-
Y. Zheng, L. Capra, O. Wolfson and H. Yang, Urban computing: Concepts, methodologies, and applications, ACM Transaction on Intelligent Systems and Technology (2014).
-
(2014)
ACM Transaction on Intelligent Systems and Technology
-
-
Zheng, Y.1
Capra, L.2
Wolfson, O.3
Yang, H.4
|