{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T11:54:31Z","timestamp":1773921271999,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2019,9,1]]},"DOI":"10.1109\/tbdata.2017.2737463","type":"journal-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T18:42:47Z","timestamp":1502390567000},"page":"408-422","source":"Crossref","is-referenced-by-count":13,"title":["Context-Driven Granular Disclosure Control for Internet of Things Applications"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9036-6716","authenticated-orcid":false,"given":"Arezou","family":"Soltani Panah","sequence":"first","affiliation":[]},{"given":"Ali","family":"Yavari","sequence":"additional","affiliation":[]},{"given":"Ron","family":"van Schyndel","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Georgakopoulos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7351-5724","authenticated-orcid":false,"given":"Xun","family":"Yi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.247"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1868470.1868472"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190662"},{"key":"ref32","first-page":"763","article-title":"The new casper: Query processing for location services without compromising privacy","author":"mokbel","year":"2007","journal-title":"Proc 32nd Int Conf Very Large Data Bases"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-27696-0_10"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07995-0_39"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555823"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1626536.1626540"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/11428572_10","article-title":"A formal model of obfuscation and negotiation for location privacy","author":"duckham","year":"2005","journal-title":"Proc Int Conf Pervasive Comput"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.715"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.307"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373258"},{"key":"ref14","first-page":"1","article-title":"A dynamic, context-aware security infrastructure for distributed healthcare applications","author":"hu","year":"2004","journal-title":"Proc 1st Workshop Pervasive Privacy Secur Privacy Trust"},{"key":"ref15","first-page":"132","article-title":"Multigranular spatio-temporal object models: Concepts and research directions","author":"bertino","year":"2009","journal-title":"Proc Int Conf Object Databases"},{"key":"ref16","first-page":"65","article-title":"Utilizing noise addition for data privacy, an overview","author":"mivule","year":"2012","journal-title":"Proc Int Conf Inf Knowledge Eng"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_7"},{"key":"ref18","article-title":"The platform for privacy preferences 1.0 (P3P1. 0) specification","volume":"16","author":"cranor","year":"2002","journal-title":"W3C Recommendation"},{"key":"ref19","article-title":"SWRL: A Semantic Web rule language combining OWL and RuleML","volume":"21","author":"horrocks","year":"2004","journal-title":"W3C Member Submission"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2570812"},{"key":"ref4","article-title":"Internet of things (IoT): Smart and secure service delivery","volume":"16","author":"georgakopolous","year":"2016","journal-title":"ACM Trans Internet Technol"},{"key":"ref27","first-page":"3164","article-title":"Watermarking techniques for relational databases: Survey, classification and comparison","volume":"16","author":"halder","year":"2010","journal-title":"J Universal Comput Sci"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.124"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561241"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546907"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.97"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2017.68"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.126"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.89"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.394"},{"key":"ref20","year":"0"},{"key":"ref45","author":"barker","year":"2007","journal-title":"Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)"},{"key":"ref22","article-title":"Lightweight cryptography for the Internet of Things","author":"katagi","year":"0","journal-title":"Sony Corporation"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.12.035"},{"key":"ref42","first-page":"101","article-title":"pCLSC-TKEM: A pairing-free certificateless signcryption-tag key encapsulation mechanism for a privacy-preserving IoT","volume":"9","author":"seo","year":"2016","journal-title":"Trans Data Privacy"},{"key":"ref24","article-title":"The connected car report","author":"greenough","year":"2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2700403"},{"key":"ref23","author":"bertino","year":"2009","journal-title":"Security for Web Services and Service-Oriented Architectures"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.55"},{"key":"ref43","article-title":"Vehicular mobility trace","author":"uppoor","year":"2016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2327587"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/8819924\/08007332.pdf?arnumber=8007332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:44:09Z","timestamp":1657745049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8007332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,1]]},"references-count":45,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2017.2737463","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,1]]}}}