{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:12:59Z","timestamp":1755792779920,"version":"3.44.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/fuzz-ieee.2016.7737997","type":"proceedings-article","created":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T18:19:22Z","timestamp":1479320362000},"page":"2425-2432","source":"Crossref","is-referenced-by-count":4,"title":["Towards a user privacy preservation system for IoT environments: a habit-based approach"],"prefix":"10.1109","author":[{"given":"Nouredine","family":"Tamani","sequence":"first","affiliation":[{"name":"L3i Lab, Univ. La Rochelle, France"}]},{"given":"Yacine","family":"Ghamri-Doudane","sequence":"additional","affiliation":[{"name":"L3i Lab, Univ. La Rochelle, France"}]}],"member":"263","reference":[{"key":"ref33","first-page":"1604","article-title":"Ranking alternatives expressed via atanassov's intuitionistic fuzzy sets","volume":"8","author":"szmidt","year":"2008","journal-title":"Proceedings of IPMU"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(86)80034-3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/wcc.327"},{"key":"ref30","volume":"14","author":"kruegel","year":"2005","journal-title":"Intrusion Detection and Correlation Challenges and Solutions"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/969150"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/info-09-2013-0047"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research an interdisciplinary review","volume":"35","author":"smith","year":"2011","journal-title":"MIS Quarterly"},{"key":"ref13","article-title":"Privacy by design: The 7 foundational principles. implementation and mapping of fair information practices","author":"cavoukian","year":"2009","journal-title":"Technical Report Information and Privacy Commissioner of Ontario"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.11.011"},{"key":"ref15","first-page":"207","article-title":"Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems","author":"baldini","year":"0","journal-title":"2013 ch 4 Internet of Things Privacy Security and Governance"},{"key":"ref16","first-page":"225","author":"bohli","year":"0","journal-title":"Internet of Things Converging Technologies for Smart Environments and Integrated Ecosystems River Publishers 2013 ch 5 Security and Privacy Challenge in Data Aggregation for the IoT in Smart Cities"},{"key":"ref17","article-title":"A survey on internet of things: security and privacy issues","volume":"90","author":"kumar","year":"2014","journal-title":"International Journal of Computer Applications"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2737097"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2808691"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.485"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00985-3_2"},{"key":"ref6","article-title":"Internet of things. privacy & security in a connected world","author":"report","year":"2015","journal-title":"Federal Trade Commission (USA) Tech Rep"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0013-4"},{"journal-title":"The working party on the protection of individuals with regard to the processing of personal data european commission Tech Rep","article-title":"Opinion 8\/2014 on the on recent developments on the internet of things","year":"2014","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/JCM-05-2013-0549"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.186"},{"key":"ref2","article-title":"The internet of things: Are organizations ready for a multi-trillion dollar prize?","author":"consulting","year":"2014","journal-title":"Capgemini Consulting Tech Rep"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.2307\/41703503","article-title":"Business intelligence and analytics From big data to big impact","volume":"36","author":"chen","year":"2012","journal-title":"MIS Quarterly"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"journal-title":"Trusted Platform Module Basics Using TPM in Embedded Systems (Embedded Technology)","year":"2006","author":"kinney","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.05.013"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref24","first-page":"5","article-title":"On the trusted use of large-scale personal data","volume":"35","author":"de montjoye","year":"2012","journal-title":"IEEE Data Eng Bull"},{"key":"ref23","article-title":"Personal linked data: a solution to manage user's privacy on the web","author":"serrano-alvarado","year":"2013","journal-title":"Atelier sur la Protection de la Vie Priv&#x00E9;e (APVP)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21040-2_27"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2013.125"}],"event":{"name":"2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2016,7,24]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2016,7,29]]}},"container-title":["2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7694773\/7737658\/07737997.pdf?arnumber=7737997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:39:03Z","timestamp":1755196743000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7737997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2016.7737997","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}