Automated Approach to Analyze IoT Privacy Policies

被引:0
|
作者
Subahi, Alanoud [1 ,2 ]
Theodorakopoulos, George [1 ]
机构
[1] School of Computer Science and Informatics, Cardiff University, Cardiff, United Kingdom
[2] Faculty of Computing and Information Technology, King Abdul Aziz University, Rabigh, Saudi Arabia
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Data privacy - Manufacture - Supervised learning
引用
收藏
页码:163 / 186
相关论文
共 50 条
  • [1] An Automated Approach for Privacy Leakage Identification in IoT Apps
    Nazzal, Bara'
    Alalfi, Manar H.
    IEEE ACCESS, 2022, 10 : 80727 - 80747
  • [2] Automatic Classification of Web and IoT Privacy Policies
    Carson, Jasmine
    DiSalvo, Lisa
    Ray, Lydia
    2022 IEEE 19TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2022), 2022, : 732 - 735
  • [3] Privacy Policies of IoT Devices: Collection and Analysis
    Kuznetsov, Mikhail
    Novikova, Evgenia
    Kotenko, Igor
    Doynikova, Elena
    SENSORS, 2022, 22 (05)
  • [4] Analysis of IoT Privacy Policies in Smart Transportation Systems
    Kilicay-Ergin, Nil
    Barb, Adrian
    PROCEEDINGS OF THE 2023 CONFERENCE ON SYSTEMS ENGINEERING RESEARCH, CSER 2023, 2024, : 387 - 396
  • [5] Towards automated privacy risk assessments in IoT systems
    Markovic, Milan
    Asif, Waciar
    Corsar, David
    Jacobs, Naomi
    Edwards, Peter
    Rajarajan, Muttukrishnan
    Cottrill, Caitlin
    PROCEEDINGS OF THE 2018 WORKSHOP ON MIDDLEWARE AND APPLICATIONS FOR THE INTERNET OF THINGS (M4IOT '18), 2018, : 15 - 18
  • [6] Toward an Approach to Privacy Notices in IoT
    Shayegh, Parvaneh
    Ghanavati, Sepideh
    2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2017, : 104 - 110
  • [7] A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications
    Harborth, David
    Hatamian, Majid
    Tesfay, Welderufael B.
    Rannenberg, Kai
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 5029 - 5038
  • [8] Semi-automated derivation of personal privacy policies
    Yee, G
    Korba, L
    Innovations Through Information Technology, Vols 1 and 2, 2004, : 455 - 458
  • [9] Scalable Automated Analysis of Access Control and Privacy Policies
    Anh Truong
    Ranise, Silvio
    Thanh Tung Nguyen
    TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGECENTERED SYSTEMS XXXVI: SPECIAL ISSUE ON DATA AND SECURITY ENGINEERING, 2018, 10720 : 142 - 171
  • [10] AUTOMATED ANALYSIS OF CHANGES IN PRIVACY POLICIES A STRUCTURED SELF-ATTENTIVE SENTENCE EMBEDDING APPROACH
    Lin, Fangyu
    Samtani, Sagar
    Zhu, Hongyi
    Brandimarte, Laura
    Chen, Hsinchun
    MIS QUARTERLY, 2024, 48 (04) : 1453 - 1482