Privacy Protection for Data-Driven Smart Manufacturing Systems
暂无分享,去创建一个
[1] Elgar Fleisch,et al. Business Models and the Internet of Things (Extended Abstract) , 2014, OpenIoT@SoftCOM.
[2] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[3] Ashutosh Saxena,et al. A neural network approach for data masking , 2011, Neurocomputing.
[4] Peter Priller,et al. Securing smart maintenance services: Hardware-security and TLS for MQTT , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).
[5] Rainer Drath,et al. Industrie 4.0: Hit or Hype? [Industry Forum] , 2014, IEEE Industrial Electronics Magazine.
[6] H. Nachtmann,et al. SUPPLY CHAIN INFORMATION SHARING IN A VENDOR MANAGED INVENTORY PARTNERSHIP , 2004 .
[7] Peter Friess,et al. Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .
[8] Ching-Hsien Hsu,et al. Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems , 2016, Future Gener. Comput. Syst..
[9] Rupa Parameswaran. A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering , 2006 .
[10] Jeong-A Lee,et al. An Autonomous Self-Aware and Adaptive Fault Tolerant Routing Technique for Wireless Sensor Networks , 2015, Sensors.
[11] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[12] Dan Lin,et al. Data protection models for service provisioning in the cloud , 2010, SACMAT '10.
[13] L. Men,et al. Corporate Reputation Measurement and Evaluation , 2013 .
[14] Roberta Bragg. Cissp Training Guide [With CDROM] , 2002 .
[15] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[16] Boris Otto,et al. Design Principles for Industrie 4.0 Scenarios , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[17] J. D. Osborn,et al. Trusted Platform Module Evolution , 2015 .
[18] Ching-Hsien Hsu,et al. A Vertical Handoff Method via Self-Selection Decision Tree for Internet of Vehicles , 2016, IEEE Systems Journal.
[19] Pierangela Samarati,et al. Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.
[20] Satish Narayana Srirama,et al. ADAPTIVE MOBILE CLOUD WORKFLOW MANAGEMENT SYSTEM FOR SERVICE DISCOVERY IN PROXIMITY-BASED INTERNET OF THINGS , 2015 .
[21] Ching-Hsien Hsu,et al. Collaboration reputation for trustworthy Web service selection in social networks , 2016, J. Comput. Syst. Sci..
[22] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[23] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[24] Ravindra S. Hegadi,et al. A Survey on Recent Trends, Process and Development in Data Masking for Testing , 2011 .
[25] Douglas M. Blough,et al. A robust data obfuscation approach for privacy preserving collaborative filtering , 2006 .
[26] Myung Ho Kim,et al. Towards a respondent-preferred ki-anonymity model , 2015, Frontiers of Information Technology & Electronic Engineering.
[27] Myung Ho Kim,et al. Towards Self-Awareness Privacy Protection for Internet of Things Data Collection , 2014, J. Appl. Math..
[28] Min Chen,et al. A Survey on Internet of Things From Industrial Market Perspective , 2015, IEEE Access.
[29] Zibin Zheng,et al. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems , 2015, IEEE Transactions on Services Computing.
[30] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[31] Michael R Brule,et al. Big Data in Exploration and Production: Real-Time Adaptive Analytics and Data-Flow Architecture , 2013 .
[32] Felix Wortmann,et al. Business Models and the Internet of Things , 2014 .
[33] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[34] Incheon Paik,et al. Intelligent Big Data Analysis Architecture Based on Automatic Service Composition , 2015, 2015 IEEE International Congress on Big Data.
[35] Bashar Nuseibeh,et al. Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.
[36] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[37] Myung Ho Kim,et al. Data protection in the industrial internet of things , 2016, IoT 2016.
[38] R. Cagliano,et al. A Journey through Manufacturing and Supply Chain Strategy Research : A Tribute to Professor Gianluca Spina , 2016 .
[39] Terje Gjøsæter,et al. Secure Information Sharing in an Industrial Internet of Things , 2016, ArXiv.
[40] Thomas F. Edgar,et al. Smart manufacturing, manufacturing intelligence and demand-dynamic performance , 2012, Comput. Chem. Eng..
[41] Steven L. Kinney. Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology) , 2006 .
[42] David G. Stork,et al. Pattern Classification , 1973 .
[43] David Hyman Gordon,et al. Renewable Energy Resources , 1986 .
[44] Saman A. Zonouz,et al. Detecting Industrial Control Malware Using Automated PLC Code Analytics , 2014, IEEE Security & Privacy.
[45] Idit Keidar,et al. Distributed data classification in sensor networks , 2010, PODC.
[46] K. Schwab. The Fourth Industrial Revolution , 2013 .