{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:41:49Z","timestamp":1764873709422,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T00:00:00Z","timestamp":1585526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,30]]},"DOI":"10.1145\/3341105.3374108","type":"proceedings-article","created":{"date-parts":[[2020,3,29]],"date-time":"2020-03-29T12:13:52Z","timestamp":1585484032000},"page":"770-772","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards a heterogeneous IoT privacy architecture"],"prefix":"10.1145","author":[{"given":"Sanonda Datta","family":"Gupta","sequence":"first","affiliation":[{"name":"University of Maine"}]},{"given":"Sepideh","family":"Ghanavati","sequence":"additional","affiliation":[{"name":"University of Maine"}]}],"member":"320","published-online":{"date-parts":[[2020,3,30]]},"reference":[{"volume-title":"Statista Research Department","year":"2016","key":"e_1_3_2_1_1_1","unstructured":"Internet of Things (IoT). Statista Research Department , 2016 . Internet of Things (IoT). Statista Research Department, 2016."},{"volume-title":"Article","year":"2019","key":"e_1_3_2_1_2_1","unstructured":"Google probes leak of smart speaker recordings . Article , 2019 . Google probes leak of smart speaker recordings. Article, 2019."},{"volume-title":"FTC","year":"2017","key":"e_1_3_2_1_3_1","unstructured":"Privacy and data security update (2016) . FTC , January , 2017 . Privacy and data security update (2016). FTC, January, 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"National Science and Technology Council","author":"National","year":"2016","unstructured":"National privacy research strategy . National Science and Technology Council , June , 2016 . National privacy research strategy. National Science and Technology Council, June, 2016."},{"key":"e_1_3_2_1_5_1","unstructured":"Cyber Physical Systems Public Working Group. Preliminary Discussion Draft - Framework for Cyber-Physical Systems - Release 0.7.  Cyber Physical Systems Public Working Group. Preliminary Discussion Draft - Framework for Cyber-Physical Systems - Release 0.7."},{"volume-title":"2012 IEEE International Conference on Green Computing and Communications.","key":"e_1_3_2_1_6_1","unstructured":"Evans Efficient data tagging for managing privacy in the internet of things . In 2012 IEEE International Conference on Green Computing and Communications. Evans et al. Efficient data tagging for managing privacy in the internet of things. In 2012 IEEE International Conference on Green Computing and Communications."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Fernandes etal Security analysis of emerging smart home applications. In 2016 IEEE (S & P).  Fernandes et al. Security analysis of emerging smart home applications. In 2016 IEEE (S & P) .","DOI":"10.1109\/SP.2016.44"},{"volume-title":"ESPRE","year":"2018","key":"e_1_3_2_1_8_1","unstructured":"Maitra Privacy consistency analyzer for android applications . In ESPRE 2018 . Maitra et al. Privacy consistency analyzer for android applications. In ESPRE 2018."},{"volume-title":"A design space for effective privacy notices. In {SOUPS}","year":"2015","key":"e_1_3_2_1_9_1","unstructured":"Schaub A design space for effective privacy notices. In {SOUPS} 2015 . Schaub et al. A design space for effective privacy notices. In {SOUPS} 2015."},{"volume-title":"End user security and privacy concerns with smart homes. In {SOUPS}","year":"2017","key":"e_1_3_2_1_10_1","unstructured":"Zeng End user security and privacy concerns with smart homes. In {SOUPS} 2017 . Zeng et al. End user security and privacy concerns with smart homes. In {SOUPS} 2017."},{"volume-title":"Automated analysis of privacy requirements for mobile apps","series-title":"In 2016 AAAI Fall Symposium Series","key":"e_1_3_2_1_11_1","unstructured":"Zimmeck Automated analysis of privacy requirements for mobile apps . In 2016 AAAI Fall Symposium Series . Zimmeck et al. Automated analysis of privacy requirements for mobile apps. In 2016 AAAI Fall Symposium Series."},{"key":"e_1_3_2_1_12_1","unstructured":"Zimmeck etal Privee: An architecture for automatically analyzing web privacy policies. In {USENIX} Security 14.  Zimmeck et al. Privee: An architecture for automatically analyzing web privacy policies. In { USENIX } Security 14 ."},{"key":"e_1_3_2_1_13_1","volume-title":"Internet of Things - Privacy and Security in a Connected World","author":"Federal Trade Commission","year":"2015","unstructured":"Federal Trade Commission . Internet of Things - Privacy and Security in a Connected World , 2015 . Federal Trade Commission. Internet of Things - Privacy and Security in a Connected World, 2015."},{"key":"e_1_3_2_1_14_1","volume-title":"Internet of things: Privacy & security in a connected world","author":"FTC","year":"2015","unstructured":"FTC et al. Internet of things: Privacy & security in a connected world . Washington, DC : Federal Trade Commission , 2015 . FTC et al. Internet of things: Privacy & security in a connected world. Washington, DC: Federal Trade Commission, 2015."},{"key":"e_1_3_2_1_15_1","volume-title":"Amazon echo recorded a couple's conversation, then sent audio to someone they know","author":"Shaban H.","year":"2018","unstructured":"H. Shaban . Amazon echo recorded a couple's conversation, then sent audio to someone they know , 2018 . H. Shaban. Amazon echo recorded a couple's conversation, then sent audio to someone they know, 2018."}],"event":{"name":"SAC '20: The 35th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Brno Czech Republic","acronym":"SAC '20"},"container-title":["Proceedings of the 35th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341105.3374108","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341105.3374108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:24Z","timestamp":1750199904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341105.3374108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,30]]},"references-count":15,"alternative-id":["10.1145\/3341105.3374108","10.1145\/3341105"],"URL":"https:\/\/doi.org\/10.1145\/3341105.3374108","relation":{},"subject":[],"published":{"date-parts":[[2020,3,30]]},"assertion":[{"value":"2020-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}