publication . Article . Other literature type . Preprint . 2019

Designing Privacy-aware Internet of Things Applications

Mahmoud Barhamgi; Arosha K. Bandara; Blaine A. Price; Bashar Nuseibeh; Muhammad Ajmal; Charith Perera;
Open Access
  • Published: 01 Sep 2019 Journal: Information Sciences, volume 512, pages 238-257 (issn: 0020-0255, Copyright policy)
  • Publisher: Elsevier BV
Abstract
Comment: Information Sciences, 2019
Subjects
free text keywords: Control and Systems Engineering, Theoretical Computer Science, Software, Information Systems and Management, Artificial Intelligence, Computer Science Applications, [INFO]Computer Science [cs], Computer Science - Software Engineering, QA76, Data science, Design process, business.industry, business, Information privacy, Information sensitivity, Computer science, Internet of Things
Funded by
EC| ASAP
Project
ASAP
Adaptive Security and Privacy
  • Funder: European Commission (EC)
  • Project Code: 291652
  • Funding stream: FP7 | SP2 | ERC
Communities
Rural Digital Europe
18 references, page 1 of 2

1. C. Perera, A. Zaslavsky, P. Christen, D. Georgakopoulos, Communications Surveys Tutorials, IEEE 16(1), 414 (2014)

2. C. Perera, C.H. Liu, S. Jayawardena, IEEE Transactions on Emerging Topics in Computing 3(4), 585 (2015)

3. C. Perera, C. Mccormick, A. Bandara, B.A. Price, B. Nuseibeh, in The 6th International Conference on the Internet of Things (2016), pp. 83{92

4. J.H. Hoepman, in ICT Systems Security and Privacy Protection, IFIP Advances in Information and Communication Technology, vol. 428, ed. by N. CuppensBoulahia, F. Cuppens, S. Jajodia, A. Abou El Kalam, T. Sans (Springer Berlin Heidelberg, 2014), pp. 446{459

5. R. Roman, J. Zhou, J. Lopez, Computer Networks 57(10), 2266 (2013)

6. D. Pyle, Data preparation for data mining (Morgan Kaufmann Publishers, San Francisco, Calif, 1999)

7. C.S. French, Data Processing and Information Technology (Cengage Learning Business Press, 1996)

8. W. Lowrance, Journal of Health Services Research & Policy 8(suppl 1), 2 (2003)

9. C. Perera, C.H. Liu, S. Jayawardena, IEEE Access 2, 1660 (2014). DOI 10.1109/ACCESS.2015.2389854

10. L. Bass, P. Clements, R. Kazman, Software Architecture in Practice, 3rd edn. (Addison-Wesley Professional, Upper Saddle River, NJ, 2012)

11. H. Sharp, Y. Rogers, J. Preece, Book 11, 602 (2011). DOI 10.1162/leon.2005.38.5.401

12. E. Luger, L. Urquhart, T. Rodden, M. Golembewski, Proceedings of the ACM CHI'15 Conference on Human Factors in Computing Systems 1, 457 (2015)

13. A. Cavoukian, in 32nd International Conference of Data Protection and Privacy Commissioners (2010)

14. ISO/IEC 29100, Information technology Security techniques Privacy framework. Tech. rep. (2011)

15. European Commission, Proposal for a Regulation of the European Parliament And Of The Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). Tech. rep. (2012)

18 references, page 1 of 2
Any information missing or wrong?Report an Issue