메뉴 건너뛰기




Volumn 8, Issue 4, 2016, Pages 467-483

Security and privacy controls for streaming data in extended intelligent environments

Author keywords

Access control; intelligent environment; privacy; streaming data

Indexed keywords

ACCESS CONTROL; AUTOMATION; BIG DATA; DATA HANDLING; INTELLIGENT AGENTS; INTELLIGENT BUILDINGS; INTERNET OF THINGS; LAWS AND LEGISLATION; SECURITY OF DATA;

EID: 84979519849     PISSN: 18761364     EISSN: None     Source Type: Journal    
DOI: 10.3233/AIS-160384     Document Type: Article
Times cited : (5)

References (61)
  • 2
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • October
    • L. Atzori, A. Iera and G. Morabito, The Internet of Things: A survey, Comput. Netw. 54(15) (October 2010), 2787-2805. doi:10.1016/j.comnet.2010.05.010
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 5
    • 84891887618 scopus 로고    scopus 로고
    • A k-anonymity privacy-preserving approach in wireless medical monitoring environments
    • January
    • P. Belsis and G. Pantziou, A k-anonymity privacy-preserving approach in wireless medical monitoring environments, Personal Ubiquitous Comput. 18(1) (January 2014), 61-74. doi: 10.1007/s00779-012-0618-y
    • (2014) Personal Ubiquitous Comput. , vol.18 , Issue.1 , pp. 61-74
    • Belsis, P.1    Pantziou, G.2
  • 7
    • 84865458860 scopus 로고    scopus 로고
    • Privacy 3.0: = data minimization + user control + contextual integrity (privatheit 3.0: = datenminimierung + nutzerkontrolle + kontextuelle integrität)
    • K. Borcea-Pfitzmann, A. Pfitzmann and M. Berg, Privacy 3.0: = data minimization + user control + contextual integrity (privatheit 3.0: = datenminimierung + nutzerkontrolle + kontextuelle integrität), it-Information Technology 53(1) (2011), 34-40
    • (2011) It-Information Technology , vol.53 , Issue.1 , pp. 34-40
    • Borcea-Pfitzmann, K.1    Pfitzmann, A.2    Berg, M.3
  • 12
    • 84855339464 scopus 로고    scopus 로고
    • Processing flows of information: From data stream to complex event processing
    • June
    • G. Cugola and A. Margara, Processing flows of information: From data stream to complex event processing, ACM Comput. Surv. 44(3) (June 2012), 15:1-15:62. doi:10.1145/ 2187671.2187677
    • (2012) ACM Comput. Surv. , vol.44 , Issue.3 , pp. 151-1562
    • Cugola, G.1    Margara, A.2
  • 14
    • 37549003336 scopus 로고    scopus 로고
    • MapReduce: Simplified data processing on large clusters
    • January
    • J. Dean and S. Ghemawat, MapReduce: Simplified data processing on large clusters, Commun. ACM51(1) (January 2008), 107-113. doi:10.1145/1327452.1327492
    • (2008) Commun. ACM , vol.51 , Issue.1 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 18
    • 84979522519 scopus 로고    scopus 로고
    • Privacy enhancing technologies for the Internet III: Ten years later
    • A. Acquisti, S. Gritzalis, C. Lambrinoudakis and S. De Capitani di Vimercati, eds, Auerbach Publications, New York, London
    • I. Goldberg, Privacy enhancing technologies for the Internet III: Ten years later, in: Digital Privacy: Theory, Technologies and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis and S. De Capitani di Vimercati, eds, Auerbach Publications, New York, London, 2007, pp. 3-18. doi:10.1201/9781420052183.ch1
    • (2007) Digital Privacy: Theory, Technologies and Practices , pp. 3-18
    • Goldberg, I.1
  • 19
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • September
    • J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, Internet of Things (IoT): A vision, architectural elements, and future directions, Future Gener. Comput. Syst. 29(7) (September 2013), 1645-1660. doi:10.1016/j.future.2013.01.010
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 28
    • 84887186291 scopus 로고    scopus 로고
    • Big privacy: Protecting confidentiality in big data
    • September
    • A. Machanavajjhala and J.P. Reiter, Big privacy: Protecting confidentiality in big data, XRDS 19(1) (September 2012), 20-23. doi:10.1145/2331042.2331051
    • (2012) XRDS , vol.19 , Issue.1 , pp. 20-23
    • Machanavajjhala, A.1    Reiter, J.P.2
  • 32
    • 84957042349 scopus 로고    scopus 로고
    • Putting statistical disclosure control into practice: The ARX data anonymization tool
    • Springer International Publishing, Cham
    • F. Prasser and F. Kohlmayer, Putting statistical disclosure control into practice: The ARX data anonymization tool, in: Medical Data Privacy Handbook, Springer International Publishing, Cham, 2015, pp. 111-148
    • (2015) Medical Data Privacy Handbook , pp. 111-148
    • Prasser, F.1    Kohlmayer, F.2
  • 34
    • 41549101735 scopus 로고    scopus 로고
    • Encoding semantic awareness in resource-constrained devices
    • D. Preuveneers and Y. Berbers, Encoding semantic awareness in resource-constrained devices, IEEE Intelligent Systems 23(2) (2008), 26-33. doi:10.1109/MIS.2008.25
    • (2008) IEEE Intelligent Systems , vol.23 , Issue.2 , pp. 26-33
    • Preuveneers, D.1    Berbers, Y.2
  • 35
    • 84908636720 scopus 로고    scopus 로고
    • SAMURAI: A streaming multi-tenant context-management architecture for intelligent and scalable Internet of things applications, in: 2014
    • Shanghai, China, June 30-July 4, 2014, IEEE
    • D. Preuveneers and Y. Berbers, SAMURAI: A streaming multi-tenant context-management architecture for intelligent and scalable Internet of things applications, in: 2014 International Conference on Intelligent Environments, Shanghai, China, June 30-July 4, 2014, IEEE, 2014, pp. 226-233
    • (2014) International Conference on Intelligent Environments , pp. 226-233
    • Preuveneers, D.1    Berbers, Y.2
  • 36
    • 84954121601 scopus 로고    scopus 로고
    • SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments
    • D. Preuveneers, Y. Berbers and W. Joosen, SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments, Journal of Ambient Intelligence and Smart Environments 8(1) (2016), 63-78. doi:10.3233/AIS-150357
    • (2016) Journal of Ambient Intelligence and Smart Environments , vol.8 , Issue.1 , pp. 63-78
    • Preuveneers, D.1    Berbers, Y.2    Joosen, W.3
  • 37
    • 84955479104 scopus 로고    scopus 로고
    • SparkXS: Efficient access control for intelligent and large-scale streaming data applications, in: 2015
    • July
    • D. Preuveneers and W. Joosen, SparkXS: Efficient access control for intelligent and large-scale streaming data applications, in: 2015 International Conference on Intelligent Environments (IE), July 2015, pp. 96-103. doi:10.1109/IE.2015.21
    • (2015) International Conference on Intelligent Environments (IE) , pp. 96-103
    • Preuveneers, D.1    Joosen, W.2
  • 38
    • 84975796117 scopus 로고    scopus 로고
    • Privacy-enabled remote health monitoring applications for resource constrained wearable devices
    • ACM, April
    • D. Preuveneers and W. Joosen, Privacy-enabled remote health monitoring applications for resource constrained wearable devices, in: Proc. of the 31st Annual ACM Symposium on Applied Computing, Vol. 1, ACM, April 2016, pp. 119-124. doi:10.1145/2851613.2851683
    • (2016) Proc. of the 31st Annual ACM Symposium on Applied Computing , vol.1 , pp. 119-124
    • Preuveneers, D.1    Joosen, W.2
  • 39
    • 84975514466 scopus 로고    scopus 로고
    • Adaptive dissemination for mobile electronic health record applications with proactive situational awareness
    • CPS: IEEE Computer Society Conference Publishing Services, January
    • D. Preuveneers, S.N.Z. Naqvi, A. Ramakrishnan, Y. Berbers and W. Joosen, Adaptive dissemination for mobile electronic health record applications with proactive situational awareness, in: HICSS 49, Vol. 49, CPS: IEEE Computer Society Conference Publishing Services, January 2016, pp. 3229-3238
    • (2016) HICSS 49 , vol.49 , pp. 3229-3238
    • Preuveneers, D.1    Naqvi, S.N.Z.2    Ramakrishnan, A.3    Berbers, Y.4    Joosen, W.5
  • 42
    • 84867473104 scopus 로고    scopus 로고
    • PPO & PPM 2.0: Extending the privacy preference framework to provide finer-grained access control for the web of data
    • ACM, New York, NY, USA
    • O. Sacco and J.G. Breslin, PPO & PPM 2.0: Extending the privacy preference framework to provide finer-grained access control for the web of data, in: Proc. of the 8th International Conference on Semantic Systems, I-SEMANTICS '12, ACM, New York, NY, USA, 2012, pp. 80-87
    • (2012) Proc. of the 8th International Conference on Semantic Systems, I-SEMANTICS '12 , pp. 80-87
    • Sacco, O.1    Breslin, J.G.2
  • 43
    • 84891911770 scopus 로고    scopus 로고
    • A privacy preference ontology (PPO) for linked data
    • C. Bizer, T. Heath, T. Berners-Lee and M. Hausenblas, eds, Hyderabad, India, March 29, 2011, CEURWorkshop Proceedings, CEUR-WS.org
    • O. Sacco and A. Passant, A privacy preference ontology (PPO) for linked data, in: WWW2011 Workshop on Linked Data on the Web, C. Bizer, T. Heath, T. Berners-Lee and M. Hausenblas, eds, Hyderabad, India, March 29, 2011, CEURWorkshop Proceedings, Vol. 813, CEUR-WS.org, 2011
    • (2011) WWW2011 Workshop on Linked Data on the Web , vol.813
    • Sacco, O.1    Passant, A.2
  • 44
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • November
    • R.S. Sandhu, Lattice-based access control models, Computer 26(11) (November 1993), 9-19. doi:10.1109/2.241422
    • (1993) Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 45
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • February
    • R.S. Sandhu, E.J. Coyne, H.L. Feinstein and C.E. Youman, Role-based access control models, Computer 29(2) (February 1996), 38-47. doi:10.1109/2.485845
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2    Feinstein, H.L.3    Youman, C.E.4
  • 46
    • 0028513932 scopus 로고
    • Access control: Principle and practice
    • Sept.
    • R. Sandhu and P. Samarati, Access control: Principle and practice, IEEE Communications Magazine 32(9) (Sept. 1994), 40-48. doi:10.1109/35.312842
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 48
    • 31444440239 scopus 로고    scopus 로고
    • The 8 requirements of real-time stream processing
    • December
    • M. Stonebraker, U. Cetintemel and S. Zdonik, The 8 requirements of real-time stream processing, ACM SIGMOD Record 34(4) (December 2005), 42-47. doi:10.1145/1107499. 1107504
    • (2005) ACM SIGMOD Record , vol.34 , Issue.4 , pp. 42-47
    • Stonebraker, M.1    Cetintemel, U.2    Zdonik, S.3
  • 49
    • 84979796608 scopus 로고    scopus 로고
    • Enhancing privacy of information brokering in smart districts by adaptive pseudonymization
    • J. Suomalainen and J. Julku, Enhancing privacy of information brokering in smart districts by adaptive pseudonymization, IEEE Access 4 (2016), 914-927. doi:10.1109/ACCESS. 2016.2538818
    • (2016) IEEE Access , vol.4 , pp. 914-927
    • Suomalainen, J.1    Julku, J.2
  • 50
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • October
    • L. Sweeney, Achieving k-anonymity privacy protection using generalization and suppression, Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5) (October 2002), 571-588. doi: 10.1142/S021848850200165X
    • (2002) Int. J. Uncertain. Fuzziness Knowl.-Based Syst. , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 51
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: A model for protecting privacy
    • October
    • L. Sweeney, K-anonymity: A model for protecting privacy, Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5) (October 2002), 557-570. doi:10.1142/S0218488502001648
    • (2002) Int. J. Uncertain. Fuzziness Knowl.-Based Syst. , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 52
    • 2542469289 scopus 로고    scopus 로고
    • Privacy protection, control of information, and privacy-enhancing technologies
    • March
    • H.T. Tavani and J.H. Moor, Privacy protection, control of information, and privacy-enhancing technologies, SIGCAS Comput. Soc. 31(1) (March 2001), 6-11. doi:10.1145/572277. 572278
    • (2001) SIGCAS Comput. Soc. , vol.31 , Issue.1 , pp. 6-11
    • Tavani, H.T.1    Moor, J.H.2
  • 53
    • 0242308055 scopus 로고    scopus 로고
    • Semantic web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder
    • D. Fensel, K.P. Sycara and J. Mylopoulos, eds, Lecture Notes in Computer Science, Springer
    • G. Tonti, J.M. Bradshaw, R. Jeffers, R. Montanari, N. Suri and A. Uszok, Semantic web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder, in: International Semantic Web Conference, D. Fensel, K.P. Sycara and J. Mylopoulos, eds, Lecture Notes in Computer Science, Vol. 2870, Springer, 2003, pp. 419-437
    • (2003) International Semantic Web Conference , vol.2870 , pp. 419-437
    • Tonti, G.1    Bradshaw, J.M.2    Jeffers, R.3    Montanari, R.4    Suri, N.5    Uszok, A.6
  • 55
    • 84906950333 scopus 로고    scopus 로고
    • Empirical evaluation of a privacy-focused threat modeling methodology
    • K. Wuyts, R. Scandariato and W. Joosen, Empirical evaluation of a privacy-focused threat modeling methodology, Journal of Systems and Software 96 (2014), 122-138. doi:10.1016/ j.jss.2014.05.075
    • (2014) Journal of Systems and Software , vol.96 , pp. 122-138
    • Wuyts, K.1    Scandariato, R.2    Joosen, W.3
  • 56
    • 84979622406 scopus 로고    scopus 로고
    • XACML-V3.0, eXtensible Access Control Markup Language (XACML) Version 3.0. Candidate OASIS Standard 01, September
    • XACML-V3.0, eXtensible Access Control Markup Language (XACML) Version 3.0. Candidate OASIS Standard 01, http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-speccos01-en.html, September 2012
    • (2012)
  • 59


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.