2015 IEEE 2nd World Forum on Internet of Things (WF-IoT) 2015
DOI: 10.1109/wf-iot.2015.7389154
|View full text |Cite
|
Sign up to set email alerts
|

An agent-based framework for Informed Consent in the internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
28
0
1

Year Published

2019
2019
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(29 citation statements)
references
References 10 publications
0
28
0
1
Order By: Relevance
“…The (Suo et al, 2012) says countries should implement new IoT-specific legislation to promote the development of IoT. IoT policies are associated with privacy mechanisms to guarantee safe authentication (Neisse et al, 2015). According to (Almeida, Goh, & Doneda, 2017) the principles in IoT must bring together different interests in an environment that must be effective and a legitimate governance framework.…”
Section: Discussion and Insightsmentioning
confidence: 99%
See 3 more Smart Citations
“…The (Suo et al, 2012) says countries should implement new IoT-specific legislation to promote the development of IoT. IoT policies are associated with privacy mechanisms to guarantee safe authentication (Neisse et al, 2015). According to (Almeida, Goh, & Doneda, 2017) the principles in IoT must bring together different interests in an environment that must be effective and a legitimate governance framework.…”
Section: Discussion and Insightsmentioning
confidence: 99%
“…According to (Almeida, Goh, & Doneda, 2017) the principles in IoT must bring together different interests in an environment that must be effective and a legitimate governance framework. The IoT devices in an IoT system must manage and deploy privacy policies to control the flow of data to service providers (Neisse et al, 2015). According to (Chatfield and Reddick, 2018) at IoT, public policies consist of cybersecurity policies and digital technology policies and should behave as complements to each other (Chatfield & Reddick, 2018).…”
Section: Discussion and Insightsmentioning
confidence: 99%
See 2 more Smart Citations
“…Particularly when there are multiple devices which collaboratively define the service, an overarching consent needs to be given by aggregating and consolidating different data sources and devices. As such, the typical approach is to define new dedicated elements in a typical IoT architecture such as Agents [33], Privacy proxies on the IoT supporting network [34] or by creating a specific, network discoverable, service for Privacy disclosure (such as the Privacy Assistant of CMU [35]). This is made more challenging by the fact that fact that many IoT applications are dynamic, have lose connectivity graphs and weak (if any) device identity.…”
Section: Related Workmentioning
confidence: 99%