{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:20Z","timestamp":1750220780711,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T00:00:00Z","timestamp":1598400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001632","name":"Ulster University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001632","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000842","name":"British Telecommunications","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000842","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,26]]},"DOI":"10.1145\/3416921.3416932","type":"proceedings-article","created":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T06:20:36Z","timestamp":1601014836000},"page":"92-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A scalable and secure model for surveillance cameras in resource constrained IoT systems"],"prefix":"10.1145","author":[{"given":"Unsub","family":"Zia","sequence":"first","affiliation":[{"name":"School of Computing, Ulster University, Northern Ireland, UK"}]},{"given":"Bryan","family":"Scotney","sequence":"additional","affiliation":[{"name":"School of Computing, Ulster University, Northern Ireland, UK"}]},{"given":"Mark","family":"McCartney","sequence":"additional","affiliation":[{"name":"School of Computing, Ulster University, Northern Ireland, UK"}]},{"given":"Jorge","family":"Martinez","sequence":"additional","affiliation":[{"name":"School of Computing, Ulster University, Northern Ireland, UK"}]},{"given":"Mamun","family":"AbuTair","sequence":"additional","affiliation":[{"name":"School of Computing, Ulster University, Northern Ireland, UK"}]},{"given":"Ali","family":"Sajjad","sequence":"additional","affiliation":[{"name":"Applied Research, British Telecom, Ipswich, UK"}]}],"member":"320","published-online":{"date-parts":[[2020,9,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"H. Saadeh W. Almobaideen and K. E. Sabri \"Internet of Things: A review to support IoT architecture's design \" in 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DEEPS) 2017: IEEE pp. 1--7.  H. Saadeh W. Almobaideen and K. E. Sabri \"Internet of Things: A review to support IoT architecture's design \" in 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DEEPS) 2017: IEEE pp. 1--7.","DOI":"10.1109\/IT-DREPS.2017.8277803"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/app7101072"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2705644"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342068"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"How many CCTV surveillance cameras in the UK,\" no","author":"B. S. I. Association","year":"2013"},{"key":"e_1_3_2_1_6_1","first-page":"26","volume-title":"A storage infrastructure for heterogeneous and multimedia data in the internet of things,\" in 2012 IEEE International Conference on Green Computing and Communications","author":"Francesco M. Di","year":"2012"},{"key":"e_1_3_2_1_7_1","first-page":"50","volume-title":"A storage solution for massive iot data based on nosql,\" in 2012 IEEE International Conference on Green Computing and Communications","author":"Li T.","year":"2012"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"H.-H. Lee J.-H. Kwon J.-J. Jung and E.-J. Kim \"Virtual Storage System based on Multiple Embedded Devices in IoT Environments \" 2017.  H.-H. Lee J.-H. Kwon J.-J. Jung and E.-J. Kim \"Virtual Storage System based on Multiple Embedded Devices in IoT Environments \" 2017.","DOI":"10.14257\/astl.2017.143.29"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-019-00434-x"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2967-9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18061814"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3347-9"},{"first-page":"406","volume-title":"IEEE","author":"Van L. P.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"50","volume-title":"Secure Implementation for Video Streams Based on Fully and Permutation Encryption Techniques,\" in 2017 International Conference on Computer and Applications (ICCA)","author":"Elshamy A. M.","year":"2017"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.08.198"},{"key":"e_1_3_2_1_16_1","first-page":"108","volume-title":"A new IoT combined body detection of people by using computer vision for security application,\" in 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","author":"Othman N. A.","year":"2017"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"key":"e_1_3_2_1_18_1","first-page":"131","volume-title":"An Internet of things approach for motion detection using Raspberry Pi,\" in Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","author":"Ansari A. N.","year":"2015"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2041400"},{"volume-title":"EPFL' data set: multi-camera pedestrian videos,\" Internet web page cvlab. epfl. ch\/data\/pom\/, dated Feb","year":"2013","author":"Shitrit H.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2018.i4.39-61"}],"event":{"name":"ICCBDC '20: 2020 4th International Conference on Cloud and Big Data Computing","sponsor":["Brookes Oxford Brookes University","Staffordshire University Staffordshire University","University of Liverpool"],"location":"Virtual United Kingdom","acronym":"ICCBDC '20"},"container-title":["Proceedings of the 2020 4th International Conference on Cloud and Big Data Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3416921.3416932","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3416921.3416932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:30Z","timestamp":1750200090000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3416921.3416932"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,26]]},"references-count":21,"alternative-id":["10.1145\/3416921.3416932","10.1145\/3416921"],"URL":"https:\/\/doi.org\/10.1145\/3416921.3416932","relation":{},"subject":[],"published":{"date-parts":[[2020,8,26]]},"assertion":[{"value":"2020-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}