{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:24:54Z","timestamp":1774538694377,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856735","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"384-391","source":"Crossref","is-referenced-by-count":25,"title":["A framework for personal data protection in the IoT"],"prefix":"10.1109","author":[{"given":"Ilaria","family":"Torre","sequence":"first","affiliation":[]},{"given":"Frosina","family":"Koceva","sequence":"additional","affiliation":[]},{"given":"Odnan Ref","family":"Sanchez","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Adorni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2016.68"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897878"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2613521"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-014-0787-y"},{"key":"ref14","first-page":"143","article-title":"ipShield: A Framework For Enforcing Context-Aware Privacy","author":"chakraborty","year":"2014","journal-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)"},{"key":"ref15","article-title":"Managing Personal Information: A Telco Perspective","author":"szczekocka","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282766"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2757302.2757306"},{"key":"ref3","first-page":"243","article-title":"Side-channel attacks on mobile and wearable systems","author":"nahapetia","year":"2016","journal-title":"13th IEEE Annual Consumer Communications and Networking Conference CCNC 2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7146\/aahcc.v1i1.21312"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37487-6_29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18491-3_20"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070970"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2329841"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8070-0_9"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","location":"Barcelona, Spain","start":{"date-parts":[[2016,12,5]]},"end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856735.pdf?arnumber=7856735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T19:52:47Z","timestamp":1513194767000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856735\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856735","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}