-
1
-
-
63649117166
-
Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility, Future Generation Computer Systems, 25:599-616, 2009.
-
(2009)
Future Generation Computer Systems
, vol.25
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
4
-
-
0003187764
-
Directive 95/46/ec of the european parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, pp. 31-50, 1995.
-
Official Journal L
, vol.281
, Issue.1995
, pp. 31-50
-
-
-
5
-
-
84986211321
-
Helping the internet of things realize its potential
-
Aug
-
A. V. Dastjerdi, R. Buyya, Fog Computing: Helping the Internet of Things Realize Its Potential. Computer, vol. 49, pp. 112-116, Aug. 2016.
-
(2016)
Computer
, vol.49
, pp. 112-116
-
-
Dastjerdi, A.V.1
Buyya, R.2
Computing, F.3
-
6
-
-
84943612463
-
Security and privacy issues of fog computing: A survey
-
Springer, Cham August
-
S. Yi, Z. Qin, and Q. Li. Security and privacy issues of fog computing: A survey. In International Conference on Wireless Algorithms, Systems, and Applications (pp. 685-695). Springer, Cham, 2015, August.
-
(2015)
International Conference on Wireless Algorithms, Systems, and Applications
, pp. 685-695
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
7
-
-
84961877275
-
On security and privacy issues of fog computing supported internet of things environment
-
September
-
K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh. On security and privacy issues of Fog computing supported Internet of Things environment. In IEEE 6th International Conference on the Network of the Future (NOF), pp. 1-3, September 2015.
-
(2015)
IEEE 6th International Conference on the Network of the Future (NOF)
, pp. 1-3
-
-
Lee, K.1
Kim, D.2
Ha, D.3
Rajput, U.4
Oh, H.5
-
8
-
-
85029170433
-
Security and privacy in fog computing: Challenges
-
M. Mukherjee et al., Security and Privacy in Fog Computing: Challenges. IEEE Access, vol. 5, pp. 19293-19304, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 19293-19304
-
-
Mukherjee, M.1
-
9
-
-
84942907459
-
Activating the internet of things
-
R. Want, S. Dustdar, Activating the Internet of Things. Computer, Vol. 48, No. 9, pp. 16-20, 2015.
-
(2015)
Computer
, vol.48
, Issue.9
, pp. 16-20
-
-
Want, R.1
Dustdar, S.2
-
10
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A Survey. Comput. Netw., Vol. 54, No. 15, pp. 2787-2805, 2010.
-
(2010)
Comput. Netw
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
11
-
-
84929668793
-
Legal aspects of data protection in cloud federations
-
S. Nepal & M. Pathan (Ed.) Berlin, Heidelberg, Springer-Verlag
-
A. Kertesz, Sz. Varadi, Legal Aspects of Data Protection in Cloud Federations. In S. Nepal & M. Pathan (Ed.), Security, Privacy and Trust in Cloud Systems, pp. 433-455, Berlin, Heidelberg. Springer-Verlag, 2014.
-
(2014)
Security, Privacy and Trust in Cloud Systems
, pp. 433-455
-
-
Kertesz, A.1
Varadi, Sz.2
-
13
-
-
84878645836
-
Regulating privacy by design
-
20
-
I. Rubinstein, Regulating Privacy by Design. Berkeley Technol. Law J., vol.26, p.1409, 20.
-
Berkeley Technol. Law J
, vol.26
, pp. 1409
-
-
Rubinstein, I.1
-
14
-
-
85014821711
-
Privacy by design: Taking ctrl of big data
-
E. Everson, Privacy by Design: Taking Ctrl of Big Data. Cleveland State Law Review, vol. 65. pp. 27-44, 2016.
-
(2016)
Cleveland State Law Review
, vol.65
, pp. 27-44
-
-
Everson, E.1
-
15
-
-
84921041928
-
-
Information Commissioners Office (ICO)
-
Information Commissioners Office (ICO), Conducting privacy impact assessments code of practice, 2014. : https://ico.org.uk/media/for-organisations/documents/1595/pia-code-of-practice.pdf
-
(2014)
Conducting Privacy Impact Assessments Code of Practice
-
-
-
16
-
-
85048855071
-
The eu: Privacy by default analysis
-
N. Hodge, The EU: Privacy by Default Analysis. In-House Perspective, vol. 8. pp. 19-22, 2012.
-
(2012)
In-House Perspective
, vol.8
, pp. 19-22
-
-
Hodge, N.1
-
17
-
-
85010393333
-
PIA requirements and privacy decision-making in us government agencies
-
D. Wright and P. De Hert, Eds. Dordrecht: Springer Netherlands
-
K. A. Bamberger and D. K. Mulligan, PIA Requirements and Privacy Decision-Making in US Government Agencies. In Privacy Impact Assessment, D. Wright and P. De Hert, Eds. Dordrecht: Springer Netherlands, pp. 225-250, 2012.
-
(2012)
Privacy Impact Assessment
, pp. 225-250
-
-
Bamberger, K.A.1
Mulligan, D.K.2
|