{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T06:30:21Z","timestamp":1725949821793},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319462561"},{"type":"electronic","value":"9783319462578"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46257-8_52","type":"book-chapter","created":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T15:40:53Z","timestamp":1517931653000},"page":"484-493","source":"Crossref","is-referenced-by-count":0,"title":["The Security Architecture and Key Technologies Research of Smart Water Resource"],"prefix":"10.1007","author":[{"given":"Ping","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yuan-Yuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wen-Ze","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xin-Chun","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,13]]},"reference":[{"key":"52_CR1","volume-title":"Top Level Design of Water Affairs and Marine Information Technology Architecture (in Chinese)","author":"WZ Ma","year":"2015","unstructured":"Ma, W.Z.: Top Level Design of Water Affairs and Marine Information Technology Architecture (in Chinese). Shanghai Scientific and Technical Publishers, Shanghai (2015)"},{"key":"52_CR2","unstructured":"Liu, L.: Study on the construction of urban smart water resource (in Chinese). In: 3rd Water Conservancy Informatization and Digital Water Resources Technology Forum of China, pp. 335\u2013341. Hohai University Press, Nanjing (2015)"},{"key":"52_CR3","first-page":"85","volume":"6","author":"QZ Zhan","year":"2010","unstructured":"Zhan, Q.Z.: Ministry of water resources issued \u201cThe basic technical requirements of the internet of water and information security system\u201d (in Chinese). Netinfo Security. 6, 85\u201386 (2010)","journal-title":"Netinfo Security."},{"key":"52_CR4","first-page":"5","volume":"4","author":"M Liu","year":"2014","unstructured":"Liu, M., Yan, J.Z., Yu, Y.C.: Research on data resources system under Beijing\u2019s smart water framework (in Chinese). Water Resour. Informatization 4, 5\u201310 (2014)","journal-title":"Water Resour. Informatization"},{"key":"52_CR5","volume-title":"The Framework of IoT-Internet of Things Technology and Its Impact on Society","author":"D Uckelmann","year":"2013","unstructured":"Uckelmann, D., Harrison, M., Michahelles, F.: The Framework of IoT-Internet of Things Technology and Its Impact on Society. Science Press, Beijing (2013)"},{"key":"52_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.3724\/SP.J.1001.2011.03958","volume":"22","author":"DG Feng","year":"2011","unstructured":"Feng, D.G., Zhang, M., Zhang, Y.: Study on cloud computing security (in Chinese). J. Softw. 22, 71\u201383 (2011)","journal-title":"J. Softw."},{"key":"52_CR7","doi-asserted-by":"publisher","first-page":"434","DOI":"10.3724\/SP.J.1016.2012.00434","volume":"35","author":"W Li","year":"2012","unstructured":"Li, W., Gu, D.W., Zhao, C.: Security analysis of the LED lightweight cipher in the internet of things (in Chinese). Chin. J. Comput. 35, 434\u2013445 (2012)","journal-title":"Chin. J. Comput."},{"key":"52_CR8","first-page":"1","volume":"3","author":"Z Gong","year":"2016","unstructured":"Gong, Z.: Survey on lightweight hash functions (in Chinese). J. Cryptologic Res. 3, 1\u201311 (2016)","journal-title":"J. Cryptologic Res."},{"key":"52_CR9","first-page":"602","volume":"38","author":"CD Hou","year":"2015","unstructured":"Hou, C.D., Li, D., Qui, J.F., Cui, L.: EasiDEF: a horizontal lightweight data exchange protocol for internet of things (in Chinese). Chin. J. Comput. 38, 602\u2013613 (2015)","journal-title":"Chin. J. Comput."},{"key":"52_CR10","series-title":"Advances in Intelligent Systems and Computing","first-page":"105","volume-title":"Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014","author":"MU Shankarwar","year":"2015","unstructured":"Shankarwar, M.U., Pawar, A.V.: Security and privacy in cloud computing: a survey. In: Satapathy, S.C., Biswal, B.N., Udgata, S.K., Mandal, J.K. (eds.) Proc. of the 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 2014. AISC, vol. 328, pp. 105\u2013112. Springer International Publishing, Switzerland (2015)"},{"key":"52_CR11","first-page":"246","volume":"37","author":"DG Feng","year":"2014","unstructured":"Feng, D.G., Zhang, M., Li, H.: Big data security and privacy protection (in Chinese). Chin. J. Comput. 37, 246\u2013258 (2014)","journal-title":"Chin. J. Comput."},{"key":"52_CR12","first-page":"5","volume":"2012","author":"C Tankard","year":"2012","unstructured":"Tankard, C.: Big Data Security. Netw Secur. 2012, 5\u20138 (2012)","journal-title":"Netw Secur."},{"key":"52_CR13","first-page":"40","volume":"2","author":"CK Wu","year":"2015","unstructured":"Wu, C.K.: An overview on the security techniques and challenges of the internet of things (in Chinese). J. Cryptologic Res. 2, 40\u201353 (2015)","journal-title":"J. Cryptologic Res."},{"key":"52_CR14","first-page":"289","volume":"43","author":"YM Guo","year":"2015","unstructured":"Guo, Y.M., Li, S.D., Chen, Z.H.: A lightweight privacy-preserving grouping proof protocol for RFID systems (in Chinese). Acta Electronica Sinica 43, 289\u2013292 (2015)","journal-title":"Acta Electronica Sinica"},{"key":"52_CR15","doi-asserted-by":"crossref","unstructured":"Templeman, R., Korayem, M., Crandall, D., Kapadia, A.: PlaceAvoider: steering first-person cameras away from sensitive spaces. In: 1st Annual Network and Distributed System Security Symposium, San Diego (2014)","DOI":"10.14722\/ndss.2014.23014"},{"key":"52_CR16","doi-asserted-by":"crossref","unstructured":"Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., Wang, H.J.: World-driven access control for continuous sensing. In: 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, pp. 1169\u20131181 (2014)","DOI":"10.1145\/2660267.2660319"},{"key":"52_CR17","unstructured":"Michalevsky, Y., Boneh, D., Nakibly, G.: Gyrophone: recognizing speech from gyroscope signals. In: 23rd USENIX Security Symposium, San Diego, pp. 1053\u20131067 (2014)"},{"key":"52_CR18","doi-asserted-by":"crossref","unstructured":"Dey, S., Roy, N., Xu, W.Y., Choudhury, R.R., Nelakuditi, S.: AccelPrint: imperfections of accelerometers make smartphones trackable. In: 21st Annual Network and Distributed System Security Symposium, San Diego (2014)","DOI":"10.14722\/ndss.2014.23059"},{"key":"52_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","volume-title":"Trust and Trustworthy Computing","author":"C Gibler","year":"2012","unstructured":"Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Jean Camp, L., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust and Trustworthy Computing. LNCS, vol. 7344, pp. 291\u2013307. Springer, Heidelberg (2012)"},{"key":"52_CR20","unstructured":"Fritz, C.: FlowDroid: a precise and scalable data flow analysis for Android. Master\u2019s thesis, TU Darmstadt (2013)"},{"key":"52_CR21","first-page":"393","volume":"32","author":"W Enck","year":"2010","unstructured":"Enck, W., Gilbert, P., Han, S., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32, 393\u2013407 (2010)","journal-title":"ACM Trans. Comput. Syst."},{"key":"52_CR22","unstructured":"Xu, R.B., Sa\u00efdi, H., Anderson, R.: Aurasium: practical policy enforcement for Android applications. In: 21st USENIX Conference on Security Symposium, pp. 27\u201327. USENIX Association Berkeley, California (2012)"},{"key":"52_CR23","doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., Wang. X.S.: Appintent: analyzing sensitive data transmission in Android for privacy leakage detection. In: 20th ACM Conference on Computer and Communications Security, pp. 1043\u20131054. ACM, New York (2013)","DOI":"10.1145\/2508859.2516676"},{"key":"52_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, X., Ahlawat, A., Du, W.: A frame: isolating advertisements from mobile applications in Android. In: 29th Annual Computer Security Applications Conference, pp. 9\u201318. ACM Press, New York (2013)","DOI":"10.1145\/2523649.2523652"},{"key":"52_CR25","doi-asserted-by":"crossref","unstructured":"Pearce, P., Felt, A.P., Nunez, G., Wagner, D.: AdDroid: privilege separation for applications and advertisers in Android. In: 7th ACM Symposium on Information, Computer and Communications Security, pp. 71\u201372. ACM, New York (2012)","DOI":"10.1145\/2414456.2414498"},{"key":"52_CR26","unstructured":"Shekhar, S., Dietz, M., Wallach D.S.: AdSplit: separating smartphone advertising from applications. In: 21th USENIX Conference on Security Symposium, pp. 28\u201328. USENIX Association Berkeley, California (2012)"},{"key":"52_CR27","first-page":"40","volume":"12","author":"CCF Task Force on Big Data","year":"2016","unstructured":"CCF Task Force on Big Data: Predictions and interpretations about the development trend of big data in 2016 (in Chinese). Commun. CCF 12, 40\u201344 (2016)","journal-title":"Commun. CCF"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46257-8_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T07:00:28Z","timestamp":1570690828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46257-8_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319462561","9783319462578"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46257-8_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}