{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:39:04Z","timestamp":1730223544521,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/ghtc.2018.8601929","type":"proceedings-article","created":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T20:54:06Z","timestamp":1546980846000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["A Testbed Evaluation for a Privacy-Aware Monitoring System in Smart Home"],"prefix":"10.1109","author":[{"given":"Mohsen","family":"Shirali","sequence":"first","affiliation":[]},{"given":"Masoumeh","family":"Sharafi","sequence":"additional","affiliation":[]},{"given":"Mona","family":"Ghassemian","sequence":"additional","affiliation":[]},{"given":"Faranak","family":"Fotouhi-Ghazvini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"ref38","first-page":"67","article-title":"Smart home solutions: privacy issues","author":"marianthi","year":"2017","journal-title":"Handbook of Smart Homes Health Care and Well-Being"},{"journal-title":"Project Weave","year":"2015","key":"ref33"},{"journal-title":"Homekit","year":"2015","key":"ref32"},{"journal-title":"SmartThings","year":"2015","key":"ref31"},{"key":"ref30","first-page":"636","article-title":"Security analysis of emerging smart home applications","author":"earlence","year":"2016","journal-title":"IEEE Symposium on Security and Privacy (SP)"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1007\/978-981-10-4166-2_86","article-title":"A testbed evaluation of MAC layer protocols for smart home remote monitoring of the elderly mobility pattern","author":"jafari","year":"2017","journal-title":"CMBEBIH 2017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.328"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2018.03.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-014-0341-4"},{"journal-title":"The Future of Connected Home Health","year":"2016","author":"johnson","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2503881"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2787688"},{"key":"ref12","first-page":"31","article-title":"Security issues in smart home and mobile health system: threat analysis, possible countermeasures and lessons learned","volume":"9","author":"olawumi","year":"2017","journal-title":"International Journal on Information Technologies and Security"},{"key":"ref13","first-page":"275","article-title":"Context-based access control to medical data in smart homes","volume":"2","author":"mouhcine","year":"2011","journal-title":"International Conference on Computer Engineering and Applications (IPCSIT'2011)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.107"},{"key":"ref15","first-page":"1","article-title":"Assistive technology for people with dementia and their caregivers at home: what might help","author":"o'keeffe","year":"2010","journal-title":"Final report prepared for Administration on Aging (Massachusetts)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.buildenv.2010.10.021"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF01208726","article-title":"Preferred ambient temperature for old and young men in summer and winter","volume":"36","author":"keiko","year":"1992","journal-title":"International Journal of Biometeorology"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1111\/j.1600-0668.2011.00745.x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.buildenv.2011.10.012"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/WCNCW.2014.6934872","article-title":"RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects","author":"p\u00f6hls","year":"2014","journal-title":"IEEE Wireless Communications and Networking Conference Workshops (WCNCW)"},{"journal-title":"Health in the green economy health co-benefits of climate change mitigation-housing sector","year":"2011","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.044"},{"journal-title":"Capturing the multiple benefits of energy efficiency measuring the positive impacts","year":"2014","key":"ref3"},{"journal-title":"Expert Group Meeting &#x201C;What does the green economy mean for sustainable urban development &#x201D;","year":"2011","author":"habitat","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.003"},{"journal-title":"World development report development and climate change","year":"2010","key":"ref5"},{"journal-title":"Oracle White Paper","article-title":"The Internet of Things: Manage the complexity, seize the opportunity","year":"2014","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2015.03.017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792434"},{"journal-title":"Later Life in the United Kingdom","year":"2018","author":"age","key":"ref9"},{"journal-title":"The current state of security in smart home systems-threats in the internet of things","year":"2016","author":"schwarz","key":"ref1"},{"journal-title":"Cryptography Theory and Practice","year":"1995","author":"stinson","key":"ref46"},{"journal-title":"West Midlands Public Health Observatory","year":"0","key":"ref20"},{"journal-title":"Sun Spot World","year":"0","key":"ref45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2015.7151407"},{"key":"ref21","article-title":"A testbed evaluation for an indoor temperature monitoring system in smart homes","author":"shirali","year":"2018","journal-title":"16th IEEE International Conference on Smart City (SmartCity2018)"},{"key":"ref42","first-page":"191","volume":"104","author":"act","year":"1996","journal-title":"Health Insurance Portability and Accountability Act of 1996 Public Law 104-191"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"44","DOI":"10.3390\/info7030044","article-title":"IoT privacy and security challenges for smart home environments","volume":"7","author":"lin","year":"2016","journal-title":"Information"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.82"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2263379"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031498"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409663"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21552\/EDPL\/2016\/3\/4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389144"}],"event":{"name":"2018 IEEE Global Humanitarian Technology Conference (GHTC)","start":{"date-parts":[[2018,10,18]]},"location":"San Jose, CA","end":{"date-parts":[[2018,10,21]]}},"container-title":["2018 IEEE Global Humanitarian Technology Conference (GHTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8589961\/8601528\/08601929.pdf?arnumber=8601929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T18:53:00Z","timestamp":1643136780000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8601929\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/ghtc.2018.8601929","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}