{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:40:35Z","timestamp":1725871235873},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319470740"},{"type":"electronic","value":"9783319470757"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47075-7_11","type":"book-chapter","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T07:50:05Z","timestamp":1479369005000},"page":"87-95","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Aware on-Demand Resource Provisioning for IoT Data Processing"],"prefix":"10.1007","author":[{"given":"Tom","family":"Kirkham","sequence":"first","affiliation":[]},{"given":"Arnab","family":"Sinha","sequence":"additional","affiliation":[]},{"given":"Nikos","family":"Parlavantzas","sequence":"additional","affiliation":[]},{"given":"Bartosz","family":"Kryza","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Fremantle","sequence":"additional","affiliation":[]},{"given":"Kyriakos","family":"Kritikos","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Aziz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,18]]},"reference":[{"key":"11_CR1","unstructured":"Cognicity Smart City Challenge Canary Wharf. http:\/\/www.Cognicity.london"},{"key":"11_CR2","unstructured":"Becon Horizon 2020 project. www.beacon.eu"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-20034-7","volume-title":"Intelligent Mechanisms for Network Configuration and Security","author":"B Spinnewyn","year":"2015","unstructured":"Spinnewyn, B., Latr\u00e9, S.: Towards a fluid cloud: an extension of the cloud into the local network. In: Latr\u00e9, S., Charalambides, M., Fran\u00e7ois, J., Schmitt, C., Stiller, B. (eds.) AIMS 2015. LNCS, vol. 9122, pp. 61\u201365. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-20034-7"},{"issue":"7","key":"11_CR4","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Aazam, M.; Huh, E.-N.: Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (AINA), pp. 687\u2013694, 24\u201327 March 2015","DOI":"10.1109\/AINA.2015.254"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: Proceedings of 2015 Workshop on Mobile Big Data (Mobidata 2015). ACM, New York, pp. 37\u201342 (2015)","DOI":"10.1145\/2757384.2757397"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1\u20138, 7\u201310 September 2014","DOI":"10.15439\/2014F503"},{"key":"11_CR8","unstructured":"Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification via sensor fingerprinting (2014). arXiv preprint arXiv:1408.1416"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Desruelle, H., Lyle, J., Isenberg, S., Gielen, F.: On the challenges of building a web-based ubiquitous application platform. In: Proceedings of 2012 ACM Conference on Ubiquitous Computing, pp. 733\u2013736. ACM (2012)","DOI":"10.1145\/2370216.2370377"},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1504\/IJMSO.2014.059142","volume":"9","author":"K Jeffery","year":"2014","unstructured":"Jeffery, K., Houssos, N., J\u00f6rg, B., Asserson, A.: Research information management: the CERIF approach. IJMSO 9(1), 5\u201314 (2014). doi: 10.1504\/IJMSO.2014.059142","journal-title":"IJMSO"},{"key":"11_CR11","unstructured":"CERIF Specification. http:\/\/cordis.europa.eu\/cerif\/"},{"key":"11_CR12","unstructured":"EU PaaSage project. www.paasage.eu"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Internet of Things. IoT Infrastructures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47075-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T23:50:42Z","timestamp":1498348242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47075-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470740","9783319470757"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47075-7_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016]]}}}