{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:55Z","timestamp":1750306795563,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490439","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"75-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Negotiation-based privacy preservation scheme in internet of things platform"],"prefix":"10.1145","author":[{"given":"Arijit","family":"Ukil","sequence":"first","affiliation":[{"name":"Innovation Lab, Tata Consultancy Services, Kolkata, India"}]},{"given":"Soma","family":"Bandyopadhyay","sequence":"additional","affiliation":[{"name":"Innovation Lab, Tata Consultancy Services, Kolkata, India"}]},{"given":"Joel","family":"Joseph","sequence":"additional","affiliation":[{"name":"Innovation Lab, Tata Consultancy Services, Pune, India"}]},{"given":"Vijayanand","family":"Banahatti","sequence":"additional","affiliation":[{"name":"Innovation Lab, Tata Consultancy Services, Pune, India"}]},{"given":"Sachin","family":"Lodha","sequence":"additional","affiliation":[{"name":"Innovation Lab, Tata Consultancy Services, Pune, India"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of 5th World TCS Technical Architects' Global Conference (TACTiCS) organized by TCS","author":"Banahatti V.","year":"2009","unstructured":"V. Banahatti , S. Lodha , SafeMask , In Proceedings of 5th World TCS Technical Architects' Global Conference (TACTiCS) organized by TCS , 2009 . V. Banahatti, S. Lodha, SafeMask, In Proceedings of 5th World TCS Technical Architects' Global Conference (TACTiCS) organized by TCS, 2009."},{"issue":"3","key":"e_1_3_2_1_2_1","article-title":"Role of middleware for Internet of things: a study","volume":"2","author":"Bandyopadhyay S.","year":"2011","unstructured":"S. Bandyopadhyay , M. Sengupta , S. Maiti and S. Dutta \" Role of middleware for Internet of things: a study ,\" International Journal of Computer Science & Engineering Survey (IJCSES) vol. 2 , no. 3 , August 2011 . S. Bandyopadhyay, M. Sengupta, S. Maiti and S. Dutta \"Role of middleware for Internet of things: a study,\" International Journal of Computer Science & Engineering Survey (IJCSES) vol.2, no.3, August 2011.","journal-title":"International Journal of Computer Science & Engineering Survey (IJCSES)"},{"key":"e_1_3_2_1_3_1","first-page":"81","article-title":"An Efficient Distribution Sensitive Privacy for Real-Time Applications","volume":"114","author":"Ukil A.","year":"2012","unstructured":"A. Ukil , J. Sen , and S. Ghosh , \" An Efficient Distribution Sensitive Privacy for Real-Time Applications ,\" Springer LNEE , vol. 114 , pp. 81 -- 91 , 2012 . A. Ukil, J. Sen, and S. Ghosh, \"An Efficient Distribution Sensitive Privacy for Real-Time Applications,\" Springer LNEE, vol. 114, pp. 81--91, 2012.","journal-title":"Springer LNEE"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920919"},{"key":"e_1_3_2_1_5_1","article-title":"The Networked Pill","author":"Chorost M.","year":"2008","unstructured":"M. Chorost , \" The Networked Pill \", MIT Technology Review , March 20, 2008 M. Chorost, \"The Networked Pill\", MIT Technology Review, March 20, 2008","journal-title":"MIT Technology Review"},{"key":"e_1_3_2_1_6_1","volume-title":"S. Foresti, and P. Samarati, \"Microdata Protection\", Secure Data Management in Decentralized Systems","author":"Ciriani V.","year":"2007","unstructured":"V. Ciriani , S. De Capitani di Vimercati , S. Foresti, and P. Samarati, \"Microdata Protection\", Secure Data Management in Decentralized Systems , Springer , 2007 . V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, \"Microdata Protection\", Secure Data Management in Decentralized Systems, Springer, 2007."},{"volume-title":"Available from Cisco at http:\/\/www.cisco.com\/web\/strategy\/government\/space-routing.html (accessed on","year":"2012","key":"e_1_3_2_1_7_1","unstructured":"Cisco Satellite Solutions (IRIS) , Available from Cisco at http:\/\/www.cisco.com\/web\/strategy\/government\/space-routing.html (accessed on 10 May , 2012 ). Cisco Satellite Solutions (IRIS), Available from Cisco at http:\/\/www.cisco.com\/web\/strategy\/government\/space-routing.html (accessed on 10 May, 2012)."},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX conference on Hot topics in security","author":"Van Dijk M.","year":"2010","unstructured":"M. Van Dijk and A. Juels , \" On the impossibility of cryptography alone for privacy-preserving cloud computing \", USENIX conference on Hot topics in security , 2010 . M. Van Dijk and A. Juels, \"On the impossibility of cryptography alone for privacy-preserving cloud computing\", USENIX conference on Hot topics in security, 2010."},{"key":"e_1_3_2_1_9_1","volume-title":"April","author":"Evans D.","year":"2011","unstructured":"D. Evans , \"The Internet of Things : How the Next Evolution of the Internet Is Changing Everything,\" CISCO Whitepaper , April , 2011 . D. Evans, \"The Internet of Things: How the Next Evolution of the Internet Is Changing Everything,\" CISCO Whitepaper, April, 2011."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.96"},{"key":"e_1_3_2_1_11_1","volume-title":"Available from IBM at http:\/\/www.ibm.com\/smarterplanet\/us\/en\/ (accessed on","author":"Smarter Planet IBM","year":"2012","unstructured":"IBM Smarter Planet , Available from IBM at http:\/\/www.ibm.com\/smarterplanet\/us\/en\/ (accessed on 10 May , 2012 ) IBM Smarter Planet, Available from IBM at http:\/\/www.ibm.com\/smarterplanet\/us\/en\/ (accessed on 10 May, 2012)"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142499"},{"key":"e_1_3_2_1_13_1","first-page":"56","volume-title":"Security and Trust in KDD (PinKDD)","author":"Lodha S.","year":"2007","unstructured":"S. Lodha and D. Thomas , \" Probabilistic Anonymity,\" In Proceedings of 1st ACM SIGKDD International Workshop on Privacy , Security and Trust in KDD (PinKDD) , pp. 56 -- 79 , 2007 . S. Lodha and D. Thomas, \"Probabilistic Anonymity,\" In Proceedings of 1st ACM SIGKDD International Workshop on Privacy, Security and Trust in KDD (PinKDD), pp. 56--79, 2007."},{"key":"e_1_3_2_1_14_1","volume-title":"Kassel","author":"Mayer C.","year":"2009","unstructured":"C. Mayer , \"Security and Privacy Challenges in the Internet of Things,\" KiVS Workshop on Global Sensor Networks (GSN09) , Kassel , Germany , March 2009 . C. Mayer, \"Security and Privacy Challenges in the Internet of Things,\" KiVS Workshop on Global Sensor Networks (GSN09), Kassel, Germany, March 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1325851.1325913"},{"volume-title":"Available from the Wikipedia at http:\/\/en.wikipedia.org\/wiki\/AlertMe (accessed on","year":"2012","key":"e_1_3_2_1_16_1","unstructured":"Wikipedia, AlertMe , Available from the Wikipedia at http:\/\/en.wikipedia.org\/wiki\/AlertMe (accessed on 10 May , 2012 ). Wikipedia, AlertMe, Available from the Wikipedia at http:\/\/en.wikipedia.org\/wiki\/AlertMe (accessed on 10 May, 2012)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150504"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2008.4493601"},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"Embedded security for Internet of things","author":"Ukil A.","year":"2011","unstructured":"A. Ukil , J. Sen , and S. Koilakonda , \" Embedded security for Internet of things ,\" IEEE NCETACS , pp. 1 -- 6 , 2011 . A. Ukil, J. Sen, and S. Koilakonda, \"Embedded security for Internet of things,\" IEEE NCETACS, pp. 1--6, 2011.","journal-title":"IEEE NCETACS"}],"event":{"name":"SECURIT '12: First International Conference on Security of Internet of Things","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"],"location":"Kollam India","acronym":"SECURIT '12"},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490439","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":19,"alternative-id":["10.1145\/2490428.2490439","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490439","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}