{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:10:46Z","timestamp":1725516646833},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642314780"},{"type":"electronic","value":"9783642314797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31479-7_49","type":"book-chapter","created":{"date-parts":[[2012,8,9]],"date-time":"2012-08-09T04:10:15Z","timestamp":1344485415000},"page":"287-295","source":"Crossref","is-referenced-by-count":2,"title":["In Things We Trust? Towards Trustability in the Internet of Things"],"prefix":"10.1007","author":[{"given":"Jaap-Henk","family":"Hoepman","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","unstructured":"Aarts, E., Harwig, R., Schuurmans, M.: Ambient intelligence. In: Denning, P. (ed.) The Invisible Future: The Seamless Integration Of Technology Into Everyday Life. McGraw-Hill (2001)"},{"key":"49_CR2","unstructured":"Alp\u00e1r, G., Hoepman, J.-H., Siljee, J.: The identity crisis. Security, privacy and usability issues in identity management, eprint CoRR cs.CR:1101.0427 (January 2011)"},{"key":"49_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-14992-4_12","volume-title":"Financial Cryptography and Data Security","author":"E. Androulaki","year":"2010","unstructured":"Androulaki, E., Bellovin, S.M.: A Secure and Privacy-Preserving Targeted Ad-System. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010 Workshops. LNCS, vol.\u00a06054, pp. 123\u2013135. Springer, Heidelberg (2010)"},{"issue":"8","key":"49_CR4","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/S1389-1286(98)00020-6","volume":"31","author":"N. Asokan","year":"1999","unstructured":"Asokan, N., Debar, H., Steiner, M., Waidner, M.: Authenticating public terminals. Computer Networks\u00a031(8), 861\u2013870 (1999)","journal-title":"Computer Networks"},{"key":"49_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1146\/annurev.psych.52.1.1","volume":"52","author":"A. Bandura","year":"2001","unstructured":"Bandura, A.: Social cognitive theory: An agentic perspective. Annual Review of Psychology\u00a052, 1\u201326 (2001)","journal-title":"Annual Review of Psychology"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) ACM Conference on Computer and Communications Security, pp. 132\u2013145. ACM (2004)","DOI":"10.1145\/1030083.1030103"},{"key":"49_CR7","unstructured":"Broenink, G., Hoepman, J.-H., van \u2019t Hof, C., van Kranenburg, R., Smits, D., Wisman, T.: The privacy coach: Supporting customer privacy in the internet of things. In: Pervasive 2010 Conference Workshop on What can the Internet of Things do for the Citizen?, Helsinki, Finland, May 17, pp. 72\u201381 (2010)"},{"key":"49_CR8","unstructured":"Friedewald, M., Costa, O.D.: Science and technology roadmapping: Ambient intelligence in everyday life (amilife). Tech. rep., JRC\/IPTS - ESTO (2003)"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L., Juels, A., Pappu, R.: RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy, 34\u201343 (May-June 2005)","DOI":"10.1109\/MSP.2005.78"},{"key":"49_CR10","unstructured":"Hardin, R.: Trust & Trustworthiness. Russell Sage Foundation, New York (2002)"},{"key":"49_CR11","unstructured":"Hildebrandt, M.: Behavioural biometric profiling and transparency enhancing tools. FIDIS Deliverable 7.12"},{"key":"49_CR12","unstructured":"ISTAG. Ambient intelligence: from vision to reality. Tech. rep., ISTAG (2003)"},{"key":"49_CR13","unstructured":"Jalote, P.: Fault Tolerance in Dsitributed Systems. Prentice Hall (1994)"},{"issue":"2","key":"49_CR14","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A. Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications\u00a024(2), 381\u2013394 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"49_CR15","volume-title":"Er redete mit dem Vieh, den V\u00f6geln und den Fischen","author":"K. Lorenz","year":"1949","unstructured":"Lorenz, K.: Er redete mit dem Vieh, den V\u00f6geln und den Fischen. Borotha-Schoeler, Wien (1949)"},{"key":"49_CR16","doi-asserted-by":"crossref","unstructured":"Mitchell, C.J. (ed.): Trusted Computing. The Institution of Engineering and Technology (November 2005)","DOI":"10.1049\/PBPC006E"},{"issue":"1","key":"49_CR17","first-page":"119","volume":"79","author":"H. Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Washington Law Review\u00a079(1), 119\u2013158 (2004)","journal-title":"Washington Law Review"},{"key":"49_CR18","unstructured":"Rieback, M.R., Gaydadjiev, G., Crispo, B., Hofman, R.F.H., Tanenbaum, A.S.: A platform for RFID security and privacy administration. In: LISA, pp. 89\u2013102. USENIX (2006)"},{"key":"49_CR19","unstructured":"Schneier, B.: Security in 2020. CryptoGram (January 2011)"},{"key":"49_CR20","unstructured":"Solove, D.J.: Understanding Privacy. Harvard University Press (2008)"},{"issue":"2","key":"49_CR21","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MSP.2009.31","volume":"11","author":"S. Spiekermann","year":"2009","unstructured":"Spiekermann, S., Evdokimov, S.: Critical RFID privacy-enhancing technologies. IEEE Security & Privacy\u00a011(2), 56\u201362 (2009)","journal-title":"IEEE Security & Privacy"},{"key":"49_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/10720107_24","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol.\u00a01796, pp. 172\u2013182. Springer, Heidelberg (2000)"},{"key":"49_CR23","unstructured":"Sundmaeker, H., Guillemin, P., Friess, P., Woelffl, S.: Vision and Challenges for Realising the Internet of Things. Publication Office of the European Union, Luxembourg (2010), Clusterbook of CERP-IoT, ISBN 978-92-79-15088-3"},{"key":"49_CR24","unstructured":"Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: Privacy preserving targeted advertising. In: 17th Ann.\u00a0Network and Distributed System Symposium, San Diego, CA, USA (February 2010)"},{"issue":"5","key":"49_CR25","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"IV","author":"S.D. Warren","year":"1890","unstructured":"Warren, S.D., Brandeis, L.D.: The right to privacy. The implicit made explicit. Harvard Law Review\u00a0IV(5), 193\u2013220 (1890)","journal-title":"Harvard Law Review"},{"key":"49_CR26","unstructured":"Weber, S.G., Martucci, L.A., Ries, S., M\u00fchlh\u00e4user, M.: Towards trustworthy identity and access management for the future internet. In: The 4th International Workshop on Trustworthy Internet of People, Things & Services (Trustworthy IoPTS 2010) Co-located with the Internet of Things 2010 Conference, Tokyo, Japan (November 2010)"},{"key":"49_CR27","series-title":"SCI","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-16793-5_10","volume-title":"Intelligent Networking, Collaborative Systems and Applications","author":"S.G. Weber","year":"2010","unstructured":"Weber, S.G., M\u00fchlh\u00e4user, M.: Multilaterally Secure Ubiquitous Auditing. In: Caball\u00e9, S., Xhafa, F., Abraham, A. (eds.) Intelligent Networking, Collaborative Systems and Applications. SCI, vol.\u00a0329, pp. 207\u2013233. Springer, Heidelberg (2010)"},{"key":"49_CR28","doi-asserted-by":"crossref","unstructured":"Weiser, M.: The computer for the 21st century. Scientific American (February 1991)","DOI":"10.1038\/scientificamerican0991-94"}],"container-title":["Communications in Computer and Information Science","Constructing Ambient Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31479-7_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T23:40:13Z","timestamp":1557186013000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31479-7_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642314780","9783642314797"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31479-7_49","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}