Privacy in the smart city—applications, technologies, challenges, and solutions
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …
create so-called smart cities. Smart cities rely on a large number of application areas and …
Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
Ethical and privacy principles for learning analytics
The massive adoption of technology in learning processes comes with an equally large
capacity to track learners. Learning analytics aims at using the collected information to …
capacity to track learners. Learning analytics aims at using the collected information to …
Privacy in the Internet of Things: threats and challenges
JH Ziegeldorf, OG Morchon… - Security and …, 2014 - Wiley Online Library
ABSTRACT The Internet of Things paradigm envisions the pervasive interconnection and
cooperation of smart things over the current and future Internet infrastructure. The Internet of …
cooperation of smart things over the current and future Internet infrastructure. The Internet of …
Privacy design strategies
JH Hoepman - IFIP International Information Security Conference, 2014 - Springer
In this paper we define the notion of a privacy design strategy. These strategies help IT
architects to support privacy by design early in the software development life cycle, during …
architects to support privacy by design early in the software development life cycle, during …
" I need a better description": An Investigation Into User Expectations For Differential Privacy
Despite recent widespread deployment of differential privacy, relatively little is known about
what users think of differential privacy. In this work, we seek to explore users' privacy …
what users think of differential privacy. In this work, we seek to explore users' privacy …
Privacy, security and trust in cloud computing
S Pearson - Privacy and security for cloud computing, 2012 - Springer
Cloud computing refers to the underlying infrastructure for an emerging model of service
provision that has the advantage of reducing cost by sharing computing and storage …
provision that has the advantage of reducing cost by sharing computing and storage …
Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services
This study seeks to clarify the nature of control in the context of information privacy to
generate insights into the effects of different privacy assurance approaches on context …
generate insights into the effects of different privacy assurance approaches on context …
A hybrid solution for privacy preserving medical data sharing in the cloud environment
Storing and sharing of medical data in the cloud environment, where computing resources
including storage is provided by a third party service provider, raise serious concern of …
including storage is provided by a third party service provider, raise serious concern of …
Cybersecurity and privacy solutions in smart cities
R Khatoun, S Zeadally - IEEE Communications Magazine, 2017 - ieeexplore.ieee.org
The increasing proliferation and deployment of ICT in the infrastructure of cities has
increased interest in smart cities. The long-term objective of a smart city is to enhance the …
increased interest in smart cities. The long-term objective of a smart city is to enhance the …