Privacy-preserving data mining: methods, metrics, and applications
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …
computing devices. The analysis of such information is fostering businesses and …
Privacy in the Internet of Things: threats and challenges
JH Ziegeldorf, OG Morchon… - Security and …, 2014 - Wiley Online Library
ABSTRACT The Internet of Things paradigm envisions the pervasive interconnection and
cooperation of smart things over the current and future Internet infrastructure. The Internet of …
cooperation of smart things over the current and future Internet infrastructure. The Internet of …
Evolving privacy: From sensors to the Internet of Things
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …
interacting things capable of offering all sorts of services to near and remote entities. The …
Privacy preservation in wireless sensor networks: A state-of-the-art survey
Much of the existing work on wireless sensor networks (WSNs) has focused on addressing
the power and computational resource constraints of WSNs by the design of specific routing …
the power and computational resource constraints of WSNs by the design of specific routing …
[PDF][PDF] Privacy enhancing technologies: A review
Organisations handle employees', customers' and third parties' Personally Identifiable
Information (PII) in a number of ways and for a variety of reasons; when doing this, it is …
Information (PII) in a number of ways and for a variety of reasons; when doing this, it is …
Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
In wireless sensor networks, performing data aggregation while preserving data
confidentiality and integrity is challenging. Recently, privacy homomorphism-based secure …
confidentiality and integrity is challenging. Recently, privacy homomorphism-based secure …
Attribute-based access to scalable media in cloud-assisted content sharing networks
This paper presents a novel Multi-message Ciphertext Policy Attribute-Based Encryption
(MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for …
(MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for …
Distributed privacy-preserving access control in sensor networks
The owner and users of a sensor network may be different, which necessitates privacy-
preserving access control. On the one hand, the network owner need enforce strict access …
preserving access control. On the one hand, the network owner need enforce strict access …
Distributed access control with privacy support in wireless sensor networks
A distributed access control module in wireless sensor networks (WSNs) allows the network
to authorize and grant user access privileges for in-network data access. Prior research …
to authorize and grant user access privileges for in-network data access. Prior research …
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
E De Cristofaro, C Soriente - Proceedings of the fourth ACM conference …, 2011 - dl.acm.org
Participatory Sensing combines the ubiquity of mobile phones with the sensing capabilities
of Wireless Sensor Networks. It targets the pervasive collection of information, eg …
of Wireless Sensor Networks. It targets the pervasive collection of information, eg …