Dataflow management in the internet of things: Sensing, control, and security

D Wei, H Ning, F Shi, Y Wan, J Xu… - Tsinghua Science …, 2021 - ieeexplore.ieee.org
The pervasiveness of the smart Internet of Things (IoTs) enables many electric sensors and
devices to be connected and generates a large amount of dataflow. Compared with …

Bringing privacy, security and performance to the Internet of Things using IOTA and usage control

N Denis, S Chabridon, M Laurent - Annals of Telecommunications, 2024 - Springer
Abstract The Internet of Things (IoT) is bringing new ways to collect and analyze data to
develop applications answering or anticipating users' needs. These data may be privacy …

PrivacyInsight: the next generation privacy dashboard

C Bier, K Kühne, J Beyerer - Annual privacy forum, 2016 - Springer
Transparency is an integral part of European data protection. In particular, the right of access
allows the data subject to verify if his personal data is processed in a lawful manner. The …

LUCON: Data flow control for message-based IoT systems

J Schütte, GS Brost - … conference on trust, security and privacy …, 2018 - ieeexplore.ieee.org
Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the
exchange of data between services across enterprises. Traditional access and usage …

Data loss prevention based on data-driven usage control

T Wüchner, A Pretschner - 2012 IEEE 23rd International …, 2012 - ieeexplore.ieee.org
Inadvertent data disclosure by insiders is considered as one of the biggest threats for
corporate information security. Data loss prevention systems typically try to cope with this …

A comprehensive and holistic knowledge model for cloud privacy protection

A Akremi, M Rouached - The Journal of Supercomputing, 2021 - Springer
Although Cloud computing is gaining popularity by supporting data analysis in an
outsourced and cost-effective way, it brings serious privacy issues when sending the original …

An ecosystem and IoT device architecture for building trust in the industrial data space

GS Brost, M Huber, M Weiß, M Protsenko… - Proceedings of the 4th …, 2018 - dl.acm.org
The most recent and prominent advances in industrial computing include the growing
interconnectivity of cyber-physical devices, as well as the increasing variety of complex …

Data usage control enforcement in distributed systems

F Kelbert, A Pretschner - Proceedings of the third ACM conference on …, 2013 - dl.acm.org
Distributed usage control is concerned with how data may or may not be used in distributed
system environments after initial access has been granted. If data flows through a distributed …

[PDF][PDF] Challenges and opportunities of cloud computing

M Hauck, M Huber, M Klems, S Kounev… - Karlsruhe Reports in …, 2010 - Citeseer
In recent years, Cloud Computing has become an emerging technology that gains wide
influence on IT systems. Cloud Computing is a distributed computing model for enabling …

Sifter: protecting security-critical kernel modules in Android through attack surface reduction

HW Hung, Y Liu, AA Sani - Proceedings of the 28th Annual International …, 2022 - dl.acm.org
The Linux kernel is an important part of the Trusted Computing Base (TCB) of a mobile
device using the Android OS, making it attractive to attackers. While all vulnerabilities in the …