{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:27:27Z","timestamp":1725906447774},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319647005"},{"type":"electronic","value":"9783319647012"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64701-2_58","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:56:55Z","timestamp":1500973015000},"page":"737-752","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Verification Chains for IoT"],"prefix":"10.1007","author":[{"given":"Noria","family":"Foukia","sequence":"first","affiliation":[]},{"given":"David","family":"Billard","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Solana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"58_CR1","unstructured":"EU Data Protection Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L281, pp. 31\u201350, 23 Nov 1995"},{"key":"58_CR2","unstructured":"EU Directive 2016\/680 the European Parliament and of the Council, Official Journal, 27 Apr 2016"},{"key":"58_CR3","unstructured":"Conf\u00e9d\u00e9ration Suisse, Avant-projet de la Loi f\u00e9d\u00e9rale sur la protection des donn\u00e9es (LPD)"},{"key":"58_CR4","doi-asserted-by":"crossref","unstructured":"Foukia, N., Billard, D., Solana, E.: A Framework for Privacy by Design in IoT, presented at the Privacy, Security and Trust Conference, Auckland, New-Zealand (2016)","DOI":"10.1109\/PST.2016.7907022"},{"key":"58_CR5","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW), IEEE, pp. 180\u2013184 (2015)","DOI":"10.1109\/SPW.2015.27"},{"key":"58_CR6","doi-asserted-by":"crossref","unstructured":"Maymounkov, P., Mazieres, D.: Kademlia: a peer-to-peer information system based on the xor metric. In: International Workshop on Peer-to-Peer Systems, pp. 53\u201365 (2002)","DOI":"10.1007\/3-540-45748-8_5"},{"key":"58_CR7","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, vol. 9, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"58_CR8","doi-asserted-by":"crossref","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: (2014) Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014)","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"58_CR9","doi-asserted-by":"crossref","unstructured":"Mainetti, L., Mighali, V., Patrono, L.: A software architecture enabling the web of things. IEEE Internet Things J. 2(6), 445\u2013454 (2015)","DOI":"10.1109\/JIOT.2015.2477467"},{"key":"58_CR10","unstructured":"Perera, C., Liu, C.-H., Jayawardena, S.: The emerging internet of things marketplace from an industrial perspective: a survey. IEEE Trans. Emerg. Top. Comput. 3(4), 585\u2013598 (2015)"},{"key":"58_CR11","doi-asserted-by":"crossref","unstructured":"Hossain, M.-M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the internet of things. In: IEEE World Congress on services (SERVICES), pp. 21\u201328 (2015)","DOI":"10.1109\/SERVICES.2015.12"},{"key":"58_CR12","doi-asserted-by":"crossref","unstructured":"Watson, S., Dehghantanha, A.: Digital forensics: the missing piece of the Internet of Things promise. Comput. Fraud Secur. 2016(6), 5\u20138 (2016)","DOI":"10.1016\/S1361-3723(15)30045-2"},{"key":"58_CR13","doi-asserted-by":"crossref","unstructured":"Zawoad, S., Hasan, R.: FAIoT: Towards building a forensics aware eco system for the internet of things. In: IEEE International Conference on Services Computing, pp. 279\u2013284 (2015)","DOI":"10.1109\/SCC.2015.46"},{"key":"58_CR14","unstructured":"Liu, Y., et al.: Cloudy with a chance of breach: forecasting cyber security incidents. In: USENIX Security, pp. 1009\u20131024 (2015)"},{"key":"58_CR15","unstructured":"Verizon 2016 Data Breach Investigations Report (2016)"},{"key":"58_CR16","unstructured":"European Parliament, European Parliament Legislative Resolution of 12 on the Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation), (COM(2012) 0011 C7\u20130025\/2012 2012\/0011(COD))"},{"key":"58_CR17","unstructured":"Cavoukian, A.: Privacy by Design - The 7 Foundational Principles, originally published on August 2009, revised on January 2011. https:\/\/www.ipc.on.ca\/wpcontent\/uploads\/Resources\/7foundationalprinciples.pdf"},{"key":"58_CR18","unstructured":"Cavoukian, A.: Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices, December 2012. http:\/\/www.cil.cnrs.fr\/CIL\/IMG\/pdf\/operationalizing-pbd-guide.pdf"},{"key":"58_CR19","doi-asserted-by":"crossref","unstructured":"Borking, J.: Organizational adoption of privacy enhancing technologies (PET). In: Computers, Privacy and Data Protection: An Element of Choice. Springer, Netherlands, pp. 309\u2013341 (2011)","DOI":"10.1007\/978-94-007-0641-5_15"},{"key":"58_CR20","unstructured":"EU Directive 2016\/680 the European Parliament and of the Council of 27 April 2016. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=uriserv:OJ.L:2016:119:01:0089:01:ENG"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64701-2_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T15:15:02Z","timestamp":1569942902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64701-2_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319647005","9783319647012"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64701-2_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}