Automated Approach to Analyze IoT Privacy Policies

被引:0
|
作者
Subahi, Alanoud [1 ,2 ]
Theodorakopoulos, George [1 ]
机构
[1] School of Computer Science and Informatics, Cardiff University, Cardiff, United Kingdom
[2] Faculty of Computing and Information Technology, King Abdul Aziz University, Rabigh, Saudi Arabia
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Data privacy - Manufacture - Supervised learning
引用
收藏
页码:163 / 186
相关论文
共 50 条
  • [21] An IDMS Approach Towards Privacy and New requirements in IoT
    Kaffel-Ben Ayed, Hella
    Boujezza, Hajer
    Riabi, Imen
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 429 - 434
  • [22] Digital Witness and Privacy in IoT: Anonymous Witnessing Approach
    Nieto, Ana
    Rios, Ruben
    Lopez, Javier
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 642 - 649
  • [23] An IoT middleware for enhanced security and privacy: the RERUM approach
    Moldovan, George
    Tragos, Elias Z.
    Fragkiadakis, Alexandros
    Poehls, Henrich C.
    Calvo, Daniel
    2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [24] Automata-Based Approach to Design and Analyze Security Policies
    Krombi, Wadie
    Erradi, Mohammed
    Khoumsi, Ahmed
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 306 - 313
  • [25] Towards an Automated Approach for Testing IoT Devices
    Minani, Jean Baptiste
    El Fellah, Yahia
    Sabir, Fatima
    Moha, Naouel
    PROCEEDINGS OF THE 2024 ACM/IEEE 6TH INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING RESEARCH & PRACTICES FOR THE INTERNET OF THINGS, SERP4IOT 2024, 2024, : 22 - 29
  • [26] Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning
    Harkous, Hamza
    Fawaz, Kassem
    Lebret, Remi
    Schaub, Florian
    Shin, Kang G.
    Aberer, Karl
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 531 - 548
  • [27] Improving the Specification and Analysis of Privacy Policies The RSLingo4Privacy Approach
    da Silva, Alberto Rodrigues
    Caramujo, Joao
    Monfared, Shaghayegh
    Calado, Pavel
    Breaux, Travis
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 1 (ICEIS), 2016, : 336 - 347
  • [28] A standardized approach to deal with firewall and mobility policies in the IoT
    Kubler, Sylvain
    Framling, Kary
    Buda, Andrea
    PERVASIVE AND MOBILE COMPUTING, 2015, 20 : 100 - 114
  • [29] STAMP-based Approach to Analyze Safety, Security and Data Privacy
    de Souza, Nivio Paula
    Castro Cesar, Cecilia de Azevedo
    Bezerra, Juliana de Melo
    Hirata, Celso Massaki
    2019 9TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2019, : 181 - 190
  • [30] Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach
    Holubenko, Vitalina
    Gaspar, Diogo
    Leal, Ruben
    Silva, Paulo
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)