{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T10:33:32Z","timestamp":1774262012196,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T00:00:00Z","timestamp":1463356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,16]]},"DOI":"10.1145\/2903150.2911710","type":"proceedings-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T19:23:42Z","timestamp":1464895422000},"page":"461-466","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["New directions in IoT privacy using attribute-based authentication"],"prefix":"10.1145","author":[{"given":"Gergely","family":"Alp\u00e1r","sequence":"first","affiliation":[{"name":"Radboud University, The Netherlands"}]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[{"name":"Radboud University, The Netherlands"}]},{"given":"Lynn","family":"Batten","sequence":"additional","affiliation":[{"name":"Deakin University, Melbourne"}]},{"given":"Veelasha","family":"Moonsamy","sequence":"additional","affiliation":[{"name":"Radboud University, The Netherlands"}]},{"given":"Anna","family":"Krasnova","sequence":"additional","affiliation":[{"name":"Radboud University, The Netherlands"}]},{"given":"Antoine","family":"Guellier","sequence":"additional","affiliation":[{"name":"CentraleSupelec\/Inria, France"}]},{"given":"Iynkaran","family":"Natgunanathan","sequence":"additional","affiliation":[{"name":"Deakin University, Melbourne"}]}],"member":"320","published-online":{"date-parts":[[2016,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Profiles for the OASIS Security Assertion Markup Language (SAML) 2005.  Profiles for the OASIS Security Assertion Markup Language (SAML) 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6309-2_12"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36140-1_5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517881.2517884"},{"issue":"1","key":"e_1_3_2_1_7_1","first-page":"23","article-title":"The Identity Crisis -- Security","volume":"9","author":"Alp\u00e1r G.","year":"2013","unstructured":"G. Alp\u00e1r , J.-H. Hoepman , and J. Siljee . The Identity Crisis -- Security , Privacy and Usability Issues in Identity Management. Journal of Information System Security , 9 ( 1 ): 23 -- 53 , 2013 . G. Alp\u00e1r, J.-H. Hoepman, and J. Siljee. The Identity Crisis -- Security, Privacy and Usability Issues in Identity Management. Journal of Information System Security, 9(1):23--53, 2013.","journal-title":"Journal of Information System Security"},{"key":"e_1_3_2_1_8_1","first-page":"189","volume-title":"TILTing Perspectives","author":"Alp\u00e1r G.","year":"2013","unstructured":"G. Alp\u00e1r and B. Jacobs . Credential Design in Attribute-Based Identity Management . In TILTing Perspectives , pages 189 -- 204 , 2013 . G. Alp\u00e1r and B. Jacobs. Credential Design in Attribute-Based Identity Management. In TILTing Perspectives, pages 189--204, 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586114"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03829-7_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.15"},{"key":"e_1_3_2_1_13_1","volume-title":"November","author":"European Parliament and the European Council","year":"1995","unstructured":"European Parliament and the European Council . Data Protection Directive 95\/46\/EC , November 1995 . European Parliament and the European Council. Data Protection Directive 95\/46\/EC, November 1995."},{"key":"e_1_3_2_1_14_1","volume-title":"European Research Cluster on the Internet of Things","author":"Baldini Gianmarco","year":"2015","unstructured":"Gianmarco Baldini , Trevor Peirce , Maarten Botterman et al. Iot governance, privacy and security issues. Position paper , European Research Cluster on the Internet of Things , 2015 . Gianmarco Baldini, Trevor Peirce, Maarten Botterman et al. Iot governance, privacy and security issues. Position paper, European Research Cluster on the Internet of Things, 2015."},{"key":"e_1_3_2_1_15_1","volume-title":"Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management","author":"Hansen M.","year":"2010","unstructured":"M. Hansen and A. Pfitzmann . A terminology for talking about privacy by data minimization: Anonymity , Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 . v0.34 (accessed Dec. 2015). M. Hansen and A. Pfitzmann. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, 2010. v0.34 (accessed Dec. 2015)."},{"key":"e_1_3_2_1_16_1","volume-title":"36th International Conference of Data Protection and Privacy Commissioners","author":"Kohnstamm J.","year":"2014","unstructured":"J. Kohnstamm and D. Madhub . Mauritius declaration on the Internet of Things . In 36th International Conference of Data Protection and Privacy Commissioners , Oct. 2014 . J. Kohnstamm and D. Madhub. Mauritius declaration on the Internet of Things. In 36th International Conference of Data Protection and Privacy Commissioners, Oct. 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2470247"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1985625.1985645"},{"key":"e_1_3_2_1_19_1","series-title":"LNICST","first-page":"243","volume-title":"Security and Privacy in Communication Networks","author":"Mostowski W.","year":"2011","unstructured":"W. Mostowski and P. Vullers . Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards . In G. Kesidis and H. Wang, editors, Security and Privacy in Communication Networks , volume 96 of LNICST , pages 243 -- 260 , London, UK , Sept. 2011 . Springer Berlin Heidelberg . W. Mostowski and P. Vullers. Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. In G. Kesidis and H. Wang, editors, Security and Privacy in Communication Networks, volume 96 of LNICST, pages 243--260, London, UK, Sept. 2011. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_21_1","volume-title":"Microsoft Research","author":"Paquin C.","year":"2013","unstructured":"C. Paquin . U-Prove Technology Overview V1.1. Technical report , Microsoft Research , Apr. 2013 . (rev 2). C. Paquin. U-Prove Technology Overview V1.1. Technical report, Microsoft Research, Apr. 2013. (rev 2)."},{"key":"e_1_3_2_1_22_1","volume-title":"Device democracy: Saving the future of the Internet of Things. Technical report","author":"Pureswaran V.","year":"2015","unstructured":"V. Pureswaran and P. Brody . Device democracy: Saving the future of the Internet of Things. Technical report , IBM Institute for Business Value , 2015 . V. Pureswaran and P. Brody. Device democracy: Saving the future of the Internet of Things. Technical report, IBM Institute for Business Value, 2015."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14439-9"},{"key":"e_1_3_2_1_24_1","volume-title":"Gartner","author":"Rivera J.","year":"2013","unstructured":"J. Rivera and R. van der Meulen. Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020 . Gartner , Dec. 2013 . (accessed Dec. 2015). J. Rivera and R. van der Meulen. Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020. Gartner, Dec. 2013. (accessed Dec. 2015)."},{"key":"e_1_3_2_1_25_1","volume-title":"Internet Society","author":"Rose K.","year":"2015","unstructured":"K. Rose , S. Eldridge , and L. Chapin . The Internet of Things: An Overview (understanding the issues and challenges of a more connected world). Technical report , Internet Society , October 2015 . K. Rose, S. Eldridge, and L. Chapin. The Internet of Things: An Overview (understanding the issues and challenges of a more connected world). Technical report, Internet Society, October 2015."},{"key":"e_1_3_2_1_26_1","volume-title":"Harvard University Press","author":"Solove D. J.","year":"2010","unstructured":"D. J. Solove . Understanding Privacy . Harvard University Press , New York , 2010 . D. J. Solove. Understanding Privacy. Harvard University Press, New York, 2010."},{"issue":"2","key":"e_1_3_2_1_27_1","first-page":"98","article-title":"Weaving technology and policy together to maintain confidentiality. The Journal of Law","volume":"25","author":"Sweeney L.","year":"1997","unstructured":"L. Sweeney . Weaving technology and policy together to maintain confidentiality. The Journal of Law , Medicine & Ethics , 25 ( 2-3 ): 98 -- 110 , June 1997 . L. Sweeney. Weaving technology and policy together to maintain confidentiality. The Journal of Law, Medicine & Ethics, 25(2-3):98--110, June 1997.","journal-title":"Medicine & Ethics"},{"key":"e_1_3_2_1_28_1","volume-title":"Unpublished","author":"Sweeney L.","year":"2000","unstructured":"L. Sweeney . Simple demographics often identify people uniquely . Unpublished , 2000 . L. Sweeney. Simple demographics often identify people uniquely. Unpublished, 2000."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_30_1","volume-title":"Conclusions of the internet of things public consultation","author":"The European Commission","year":"2013","unstructured":"The European Commission . Conclusions of the internet of things public consultation , 2013 . (accessed Dec. 2015). The European Commission. Conclusions of the internet of things public consultation, 2013. (accessed Dec. 2015)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20769-3_16"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37282-7_5"},{"key":"e_1_3_2_1_33_1","volume-title":"The Bodley Head Ltd","author":"Westin A.","year":"1970","unstructured":"A. Westin . Privacy and Freedom . The Bodley Head Ltd , New York , 1970 . A. Westin. Privacy and Freedom. The Bodley Head Ltd, New York, 1970."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"S.\n      Yoon H.\n      Park and \n      H. S.\n      Yoo\n  . \n  Computer Science and its Applications volume \n  330\n   of \n  LNEE chapter Security Issues on Smarthome in IoT Environment pages \n  691\n  --\n  696\n  . \n  Springer Berlin Heidelberg 2015\n  .  S. Yoon H. Park and H. S. Yoo. Computer Science and its Applications volume 330 of LNEE chapter Security Issues on Smarthome in IoT Environment pages 691--696. Springer Berlin Heidelberg 2015.","DOI":"10.1007\/978-3-662-45402-2_97"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"}],"event":{"name":"CF'16: Computing Frontiers Conference","location":"Como Italy","acronym":"CF'16","sponsor":["Micron Foundation Micron Technology Foundation, Inc.","ACM Association for Computing Machinery","Politecnico di Milano Politecnico di Milano","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IBM IBM"]},"container-title":["Proceedings of the ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2903150.2911710","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2903150.2911710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:16Z","timestamp":1750222576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2903150.2911710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,16]]},"references-count":34,"alternative-id":["10.1145\/2903150.2911710","10.1145\/2903150"],"URL":"https:\/\/doi.org\/10.1145\/2903150.2911710","relation":{},"subject":[],"published":{"date-parts":[[2016,5,16]]},"assertion":[{"value":"2016-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}