2019
DOI: 10.1109/tbdata.2017.2737463
|View full text |Cite
|
Sign up to set email alerts
|

Context-Driven Granular Disclosure Control for Internet of Things Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…We also observed that the proposed phases of the data lifecycles also vary [56] while often for the same phase, different terms are used. For example, in the case of data collection, some studies use the term "generation" [95,96] while in other data lifecycles call it "receive" [17,90], "acquir" [55,63,73,97], or data "capture" [84]. So, there is a lot of confusion for the research community and practitioners to understand and use such phases and associate them with management practices in their organizations.…”
Section: Research Gapsmentioning
confidence: 99%
See 3 more Smart Citations
“…We also observed that the proposed phases of the data lifecycles also vary [56] while often for the same phase, different terms are used. For example, in the case of data collection, some studies use the term "generation" [95,96] while in other data lifecycles call it "receive" [17,90], "acquir" [55,63,73,97], or data "capture" [84]. So, there is a lot of confusion for the research community and practitioners to understand and use such phases and associate them with management practices in their organizations.…”
Section: Research Gapsmentioning
confidence: 99%
“…We assign a "mandatory" category to phase that has > 70% of appearance in the data lifecycles, and in other cases, we assigned it "optional" category as shown in Table 2. Additionally, we provide detailed information about the data lifecycles and their [15,53,58,134,143], receive [17], acquisition [13,117], retrieve [115,121], produce [140], acquire [55,63,90,97,147], capture [84,94,126,130,135,148], generation [26,56,95,96,[118][119][120], create [47, 109-111, 116, 124, 149] Collection P3 Integration [17,26,109,124,126,129,130,146,148,153,155], integrate [15,28,116,140,156], aggregate…”
Section: Approach To Dalifmentioning
confidence: 99%
See 2 more Smart Citations
“…The issue of how to protect the security of private information has aroused widespread concern. In April 2016, the European Union promulgated the "General Data Protection Regulation", which provides reference application standards for people's privacy protection [1] [2] [3]. First, Fridrich explored the two-dimensional standard Baker symmetric image encryption algorithm based on chaotic mapping and proposed [4], and has become a key research object of data encryption technology.…”
Section: Introductionmentioning
confidence: 99%