OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city
暂无分享,去创建一个
Aniello Castiglione | Jafar A. Alzubi | Hamid Esmaeili Najafabadi | Aaqif Afzaal Abbasi | Mehdi Gheisari | Guojun Wang | Jiechao Gao | Aniello Castiglione | J. Alzubi | A. Abbasi | M. Gheisari | Jiechao Gao | Guojun Wang
[1] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[2] Tao Peng,et al. A Multilevel Access Control Scheme for Data Security in Transparent Computing , 2017, Computing in Science & Engineering.
[3] Md Zakirul Alam Bhuiyan,et al. A Dual Privacy Preserving Scheme in Continuous Location-Based Services , 2018, IEEE Internet of Things Journal.
[4] Ji Zhang,et al. NSSSD: A new semantic hierarchical storage for sensor data , 2016, 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[5] Eva Blomqvist,et al. An Ontology-based Context-aware System for Smart Homes: E-care@home , 2017, Sensors.
[6] Derong Shen,et al. Private Blocking Technique for Multi-party Privacy-Preserving Record Linkage , 2017, Data Science and Engineering.
[7] Jing Wang,et al. Automatic text summarization using fuzzy inference , 2016, 2016 22nd International Conference on Automation and Computing (ICAC).
[8] M. Hossein Ahmadzadegan,et al. Security challenges in internet of things: survey , 2017, 2017 IEEE Conference on Wireless Sensors (ICWiSe).
[9] Francesco Palmieri,et al. Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..
[10] J. Fox. Randomized Item Response Theory Models , 2005 .
[11] Santosh Vempala,et al. Randomized algorithms in numerical linear algebra , 2017, Acta Numerica.
[12] Andreas Drexl,et al. Facility location models for distribution system design , 2005, Eur. J. Oper. Res..
[13] Osmanbey Uzunkol,et al. Efficient and verifiable algorithms for secure outsourcing of cryptographic computations , 2015, International Journal of Information Security.
[14] Augie Widyotriatmo,et al. WiMAX-based energy efficient intrusion detection system , 2013, 2013 International Conference on Robotics, Biomimetics, Intelligent Computational Systems.
[15] Kim-Kwang Raymond Choo,et al. HEPart: A balanced hypergraph partitioning algorithm for big data applications , 2018, Future Gener. Comput. Syst..
[16] Matthew W. Pennell,et al. A simple approach for maximizing the overlap of phylogenetic and comparative data , 2015, bioRxiv.
[17] Amit P. Sheth,et al. The SSN ontology of the W3C semantic sensor network incubator group , 2012, J. Web Semant..
[18] Mehdi Gheisari,et al. Performance analysis of two sensor data storages , 2011 .
[19] Pasi Tyrväinen,et al. Towards enabling privacy preserving smart city apps , 2016, 2016 IEEE International Smart Cities Conference (ISC2).
[20] David Sands,et al. Sampling and partitioning for differential privacy , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[21] M. Hossein Ahmadzadegan,et al. Low-rate false alarm intrustion detection system with genetic algorithm approach , 2015, 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI).
[22] Lule Ahmedi,et al. C-SWRL: SWRL for Reasoning over Stream Data , 2017, 2017 IEEE 11th International Conference on Semantic Computing (ICSC).
[23] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[24] M. Elmusrati,et al. Hybrid security classification approach to attacks in WiMAX , 2013, 2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC).
[25] M. H. Ahmadzadegan,et al. Technical Performance Simulation of IDS Within IEEE 802.16 , 2015, IEEE Latin America Transactions.
[26] Henrik Eriksson,et al. The evolution of Protégé: an environment for knowledge-based systems development , 2003, Int. J. Hum. Comput. Stud..
[27] Dongqing Xie,et al. Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges , 2017, IEEE Network.
[28] Li Li,et al. Intelligent fusion of information derived from received signal strength and inertial measurements for indoor wireless localization , 2016 .
[29] Sherali Zeadally,et al. Securing Internet of Things with Software Defined Networking , 2018, IEEE Communications Magazine.
[30] Amit P. Sheth,et al. Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems , 2018, IEEE Internet Computing.
[31] Zakaria Bousalem,et al. XMap: A Novel Approach to Store and Retrieve XML Document in Relational Databases , 2015, J. Softw..
[32] Tapio Fabritius,et al. A multi-purpose triangular framework for M2M communication security , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).
[33] Jin Wang,et al. Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[34] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[35] M. Hossein Ahmadzadegan,et al. Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection , 2015, 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI).
[36] Almudena Alcaide,et al. Anonymous authentication for privacy-preserving IoT target-driven applications , 2013, Comput. Secur..
[37] Gautam Srivastava,et al. ECA: An Edge Computing Architecture for Privacy-Preserving in IoT-Based Smart City , 2019, IEEE Access.
[38] Guojun Wang,et al. A Method for Privacy-Preserving in IoT-SDN Integration Environment , 2018, 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom).
[39] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[40] Mianxiong Dong,et al. Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes , 2017, Future Gener. Comput. Syst..
[41] Rongxing Lu,et al. Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[42] S. Seuring,et al. Challenges and opportunities of digital information at the intersection of Big Data Analytics and supply chain management , 2017 .
[43] Kostas E. Psannis,et al. Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey , 2017, Int. J. Netw. Manag..
[44] Hossein Amini Deilami,et al. Leach-Centric Load Sharing Between Cluster Nodes Based on Network Node Distribution , 2018, 2018 IEEE Conference on Wireless Sensors (ICWiSe).
[45] Klaus Wehrle,et al. A comprehensive approach to privacy in the cloud-based Internet of Things , 2016, Future Gener. Comput. Syst..
[46] Wei Zhang,et al. MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT , 2017, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).
[48] Luigi Logrippo,et al. Platform for privacy preferences (P3P): Current status and future directions , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.
[49] Subhas Mukhopadhyay,et al. WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings , 2015, Sensors.
[50] Jie Wu,et al. Effective Query Grouping Strategy in Clouds , 2017, Journal of Computer Science and Technology.
[51] Guojun Wang,et al. A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking , 2019, Comput. Secur..
[52] Jie Wu,et al. Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..