{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T04:10:46Z","timestamp":1725941446728},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811078491"},{"type":"electronic","value":"9789811078507"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7850-7_13","type":"book-chapter","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T11:12:16Z","timestamp":1516014736000},"page":"143-153","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Access Control for Cross-Border Transfer of Sensor Data"],"prefix":"10.1007","author":[{"given":"Seira","family":"Hidano","sequence":"first","affiliation":[]},{"given":"Shinsaku","family":"Kiyomoto","sequence":"additional","affiliation":[]},{"given":"Abdur Rahim","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Toshihiro","family":"Uchibayashi","sequence":"additional","affiliation":[]},{"given":"Takuo","family":"Suganuma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,16]]},"reference":[{"key":"13_CR1","unstructured":"Article 29 Data Protection Working Party: Opinion 8\/2014 on the on Recent Developments on the Internet of Things (2014)"},{"issue":"2","key":"13_CR2","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/s10922-013-9285-1","volume":"22","author":"A Bantouna","year":"2014","unstructured":"Bantouna, A., Poulios, G., Tsagkaris, K., Demestichas, P.: Network load predictions based on big data and the utilization of self-organizing maps. Springer J. Netw. Syst. Manage. 22(2), 150\u2013173 (2014)","journal-title":"Springer J. Netw. Syst. Manage."},{"key":"13_CR3","unstructured":"EU: Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995)"},{"key":"13_CR4","unstructured":"EU FP7\/ICT project 287708: iCore: Internet Connected Objects for Reconfigurable Eco-systems, October 2011\u2013September 2014"},{"key":"13_CR5","unstructured":"EU FP7\/ICT project 609094: RERUM: REliable, Resilient and secUre IoT for sMart city applications, September 2013\u2013August 2016"},{"key":"13_CR6","unstructured":"EU HORIZON 2020 project 643262: iKaaS: intelligent Knowledge-as-a-Service, October 2014\u2013September 2017"},{"issue":"3","key":"13_CR7","first-page":"102","volume":"7","author":"S Faye","year":"2016","unstructured":"Faye, S., Louveton, N., Gheorghe, G., Engel, T.: A two-level approach to characterizing human activities from wearable sensor data. J. Wirel. Mobile Netw. 7(3), 102\u2013110 (2016)","journal-title":"J. Wirel. Mobile Netw."},{"issue":"34","key":"13_CR8","first-page":"1","volume":"3","author":"JL Hernandez-Ramos","year":"2013","unstructured":"Hernandez-Ramos, J.L., Jara, A.J., Marin, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. (JISIS) 3(34), 1\u201316 (2013)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"issue":"2","key":"13_CR9","first-page":"1","volume":"2","author":"S Hidano","year":"2016","unstructured":"Hidano, S., Biswas, A.R., Kiyomoto, S.: Hierarchical privacy CAs for cross-border transfer of personal data. Res. Briefs Inf. Commun. Technol. Evol. (ReBICTE) 2(2), 1\u201312 (2016)","journal-title":"Res. Briefs Inf. Commun. Technol. Evol. (ReBICTE)"},{"key":"13_CR10","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-319-38904-2_34","volume-title":"Cloud Computing","author":"S Hidano","year":"2016","unstructured":"Hidano, S., Kiyomoto, S., Murakami, Y., Vlacheas, P., Moessner, K.: Design of a security gateway for iKaaS platform. In: Zhang, Y., Peng, L., Youn, C.-H. (eds.) CloudComp 2015. LNICST, vol. 167, pp. 323\u2013333. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-38904-2_34"},{"key":"13_CR11","unstructured":"Japan: Act on the Protection of Personal Information, Act No. 57, 30 May 2003"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-319-04897-0_8","volume-title":"Engineering Secure Software and Systems","author":"H Meer de","year":"2014","unstructured":"de Meer, H., P\u00f6hls, H.C., Posegga, J., Samelin, K.: On the relation between redactable and sanitizable signature schemes. In: J\u00fcrjens, J., Piessens, F., Bielova, N. (eds.) ESSoS 2014. LNCS, vol. 8364, pp. 113\u2013130. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-04897-0_8"},{"key":"13_CR13","unstructured":"Pokric, B., Krco, S., Drajic, D., Pokric, M., Rajs, V., Mihajlovic, Z., Knezevic, P., Jovanovic, D.: Augmented reality enabled IoT services for environmental monitoring utilising serious gaming concept. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 6(1), 37\u201355 (2015)"},{"issue":"2","key":"13_CR14","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s11277-014-1683-5","volume":"76","author":"J Poncela","year":"2014","unstructured":"Poncela, J., Vlacheas, P., Giaffreda, R., De, S., Vecchio, M., Nechifor, S., Barco, R., Aguayo-Torres, M.C., Stavroulaki, V., Moessner, K., Demestichas, P.: Smart cities via data aggregation. Springer J. Wirel. Personal Commun. 76(2), 149\u2013168 (2014)","journal-title":"Springer J. Wirel. Personal Commun."},{"key":"13_CR15","unstructured":"Robles, T., Alcarria, R., Martin, D., Navarro, M., Calero, R., Iglesias, S., Lopez, M.: An IoT based reference architecture for smart water management processes. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 6(1), 4\u201323 (2015)"},{"issue":"6","key":"13_CR16","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2013.6525602","volume":"51","author":"P Vlacheas","year":"2013","unstructured":"Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Somov, A., Foteinos, V., Poulios, G., Biswas, A.R., Moessner, K., Demestichas, P.: Enabling smart cities through a cognitive management framework for the internet of things. IEEE Commun. Mag. 51(6), 102\u2013110 (2013)","journal-title":"IEEE Commun. Mag."}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7850-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T11:16:53Z","timestamp":1516015013000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7850-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811078491","9789811078507"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7850-7_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}