Staying at the Edge of Privacy: Edge Computing and Impersonal Extraction
暂无分享,去创建一个
[1] Karl Marx,et al. capital: tique de l'e?conomie politique , 2004 .
[2] Antoinette Rouvroy,et al. The end(s) of critique: data behaviourism versus due process , 2013 .
[3] Tom H. Luan,et al. Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.
[4] Rowan Wilken,et al. Platform specificity and the politics of location data extraction , 2015 .
[5] Lujo Bauer,et al. Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles , 2017, SOUPS.
[6] Khalil El-Khatib,et al. A survey of privacy enhancing technologies for smart cities , 2019, Pervasive Mob. Comput..
[7] Yu Chen,et al. Smart Surveillance as an Edge Network Service: From Harr-Cascade, SVM to a Lightweight CNN , 2018, 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC).
[8] Xiaojiang Du,et al. Preserving Location Privacy in Mobile Edge Computing , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[9] Weisong Shi,et al. The Promise of Edge Computing , 2016, Computer.
[10] Paramvir Bahl,et al. Real-Time Video Analytics: The Killer App for Edge Computing , 2017, Computer.
[11] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[12] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[13] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[14] Latanya Sweeney,et al. Computational disclosure control: a primer on data privacy protection , 2001 .
[15] L Sweeney,et al. Weaving Technology and Policy Together to Maintain Confidentiality , 1997, Journal of Law, Medicine & Ethics.
[16] Noel E. O'Connor,et al. Performance of video processing at the edge for crowd-monitoring applications , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).
[17] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[18] Bernard E. Harcourt,et al. Exposed: Desire and Disobedience in the Digital Age , 2015 .
[19] L. F. Luna-Reyes,et al. Private Data and Public Value: Governance, Green Consumption, and Sustainable Supply Chains , 2016 .
[20] Helen Nissenbaum,et al. Big data's end run around procedural privacy protections , 2014, Commun. ACM.
[21] H. Jarman,et al. Private Data and Public Value , 2016 .
[22] Hua Wang,et al. Editorial: Special Issue on Security and Privacy of IoT , 2017, World Wide Web.
[23] K. Marx. Capital: A Critique of Political Economy , 1867 .
[24] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[25] John R Connery,et al. The right to privacy. , 1973, The Linacre quarterly.
[26] Bing Chen,et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.
[27] In Wang,et al. Facial feature discovery for ethnicity recognition , 2019, WIREs Data Mining Knowl. Discov..
[28] Rajkumar Buyya,et al. Metropolitan intelligent surveillance systems for urban areas by harnessing IoT and edge computing paradigms , 2018, Softw. Pract. Exp..
[29] Jathan Sadowski. When data is capital: Datafication, accumulation, and extraction , 2019, Big Data Soc..
[30] L. Floridi. Open Data, Data Protection, and Group Privacy , 2014, Philosophy & Technology.
[31] Quan Zhang,et al. Firework: Data Processing and Sharing for Hybrid Cloud-Edge Analytics , 2018, IEEE Transactions on Parallel and Distributed Systems.
[32] Josep Domingo-Ferrer,et al. Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections , 2016, Database Anonymization.
[33] Shoshana Zuboff,et al. Big other: surveillance capitalism and the prospects of an information civilization , 2015, J. Inf. Technol..
[34] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[35] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[36] Michael Friedewald,et al. Seven Types of Privacy , 2013, European Data Protection.
[37] Serge Gutwirth,et al. European Data Protection: Coming of Age , 2013, European Data Protection.
[38] Tony Q. S. Quek,et al. Intelligent Video Surveillance based on Mobile Edge Networks , 2018, 2018 IEEE International Conference on Communication Systems (ICCS).
[39] P Pafko,et al. [Right to privacy]. , 2013, Rozhledy v chirurgii : mesicnik Ceskoslovenske chirurgicke spolecnosti.
[40] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[41] Brett Neilson,et al. The Politics of Operations , 2019 .
[42] Brent Mittelstadt,et al. From Individual to Group Privacy in Big Data Analytics , 2017 .
[43] M. Pasquinelli. Italian Operaismo and the Information Machine , 2015 .
[44] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[45] Sophia Melanson,et al. We are data: algorithms and the making of our digital selves , 2017 .
[46] Julie E. Cohen. Turning Privacy Inside Out , 2019, Theoretical Inquiries in Law.
[47] Colin Koopman,et al. How We Became Our Data , 2019 .
[48] Shoshana Zuboff. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power , 2019 .