{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:25:32Z","timestamp":1725560732135},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.23919\/fruct.2016.7892183","type":"proceedings-article","created":{"date-parts":[[2017,4,6]],"date-time":"2017-04-06T22:59:10Z","timestamp":1491519550000},"page":"54-65","source":"Crossref","is-referenced-by-count":1,"title":["Survey of cloud server geolocating techniques"],"prefix":"10.23919","author":[{"given":"Leo","family":"Hippelainen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ian","family":"Oliver","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shankar","family":"Lai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"year":"0","journal-title":"Wi-Fi Alliance","article-title":"Wi-Fi Aware","key":"ref39"},{"year":"0","key":"ref38"},{"year":"0","journal-title":"Stackexchange Electrical Engineering","article-title":"How many active Bluetooth devices can I reliably detect in a single space?","key":"ref33"},{"year":"2014","journal-title":"Specification of the Bluetooth System Version 4 2","key":"ref32"},{"key":"ref31","article-title":"What Is an RFID Reader's Maximum Range?","author":"roberti","year":"2014","journal-title":"RFID Journal"},{"key":"ref30","article-title":"Definition: data residency","author":"rouse","year":"2015","journal-title":"TechTarget"},{"year":"0","journal-title":"Stackexchange Stackoverflow","article-title":"Maximum number of ZigBee devices","key":"ref37"},{"key":"ref36","article-title":"Position Location Monitoring Using IEEE 802.15.4\/ZigBee&#x00AE; technology","author":"hernandez","year":"2016","journal-title":"NXP Semiconductors Netherlands B V 2014"},{"year":"2014","journal-title":"ZigBee 3 0 standards ZigBee Alliance","key":"ref35"},{"year":"0","journal-title":"Cypress Semiconductor San Jose USA","article-title":"Cypress Unveils a Bluetooth Low Energy Module with 400-Meter Range and a Module with Bluetooth 4.2 Support","key":"ref34"},{"year":"0","author":"mautz","article-title":"Indoor Positioning Technologies","key":"ref10"},{"key":"ref40","article-title":"SALVB: Server Authentication with Location VErification","author":"yu","year":"2016","journal-title":"22nd ACM International Conference on Mobile Computing and Networking (MobiCom 2016)"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/GLOCOMW.2007.4437809"},{"year":"0","journal-title":"Wikipedia","article-title":"Timing advance","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICDCSW.2012.50"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/11422778_62"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2046660.2046677"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2663165.2666091"},{"key":"ref17","article-title":"Open Connect Everywhere: A Glimpse at the Internet Ecosystem through the Lens of the Netflix CDN","author":"b\u00f6ttger","year":"2016","journal-title":"Queen Mary University of London"},{"key":"ref18","article-title":"Global Positioning Using Planetary Constants","author":"itzhak","year":"2010","journal-title":"U S Patent"},{"key":"ref19","article-title":"Goods Tracking Technologies","author":"artes","year":"2016","journal-title":"ABIresearch"},{"key":"ref28","article-title":"Russian Federation: Russia's Personal Data Localization Law Goes Into Effect","author":"gallia","year":"2015","journal-title":"Duane Morris LLP Mondaq"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.6028\/NIST.IR.7904"},{"year":"2012","journal-title":"Privacy Amendment (Enhancing Privacy Protection) Act Australia","key":"ref27"},{"year":"2016","journal-title":"Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)","key":"ref3"},{"year":"2011","author":"mell","journal-title":"The NIST Definition of Cloud Computing National Institute of Standards and Technology U S Department of Commerce","key":"ref6"},{"key":"ref29","article-title":"Data protection in United States: overview","author":"jolly","year":"0","journal-title":"Practical Lawver"},{"year":"0","journal-title":"Wikipedia","article-title":"Data center","key":"ref5"},{"year":"0","journal-title":"Wikipedia","article-title":"Modular data center","key":"ref8"},{"year":"0","journal-title":"Wikipedia","article-title":"Cloud computing","key":"ref7"},{"year":"2013","journal-title":"OECD Publishing","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TSMCC.2007.905750"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/VITAE.2014.6934507"},{"year":"0","author":"vaughan-nichols","article-title":"How Google&#x2013;&#x2013;and everyone else&#x2013;&#x2013;gets Wi-Fi location data","key":"ref20"},{"key":"ref45","article-title":"Cloud Computing for IT Pros (2\/6): What Is Cloud","author":"chou","year":"0","journal-title":"Microsoft"},{"year":"0","journal-title":"TechTarget","article-title":"Definition: data residency","key":"ref22"},{"year":"0","journal-title":"TechTarget","article-title":"Definition: data sovereignty","key":"ref21"},{"key":"ref42","article-title":"Wi-Fi Indoor Location Applications and Revenues","author":"connolly","year":"2016","journal-title":"ABIresearch"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1787\/20716826"},{"key":"ref41","article-title":"Iotera Develops Active RFID Tag With 4-Mile Read Range","author":"swedberg","year":"2014","journal-title":"RFID Journal"},{"year":"0","author":"determann","article-title":"Residency Requirements for Data in Clouds&#x2014;What Now?","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1007\/978-3-662-45391-9_21"},{"year":"0","journal-title":"Symantec Blue Coat","article-title":"Australia Data Privacy Laws","key":"ref26"},{"year":"0","author":"ekholm","article-title":"Applications of Homomorphic Encryption","key":"ref43"},{"year":"0","article-title":"DLA Piper's Data Protection Laws of the World Handbook","key":"ref25"}],"event":{"name":"2016 19th Conference of Open Innovations Association (FRUCT)","start":{"date-parts":[[2016,11,7]]},"location":"Jyvaskyla","end":{"date-parts":[[2016,11,11]]}},"container-title":["2016 19th Conference of Open Innovations Association (FRUCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7887879\/7892173\/07892183.pdf?arnumber=7892183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T02:58:26Z","timestamp":1587092306000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7892183\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":45,"URL":"https:\/\/doi.org\/10.23919\/fruct.2016.7892183","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}