individual advantages of its components, but also gen-
erates many synergies.
ACKNOWLEDGEMENTS
This paper is the result of a collaboration between the
research projects AVARE and PATRON, both com-
missioned and financed by the Baden-W
¨
urttemberg
Stiftung gGmbH.
REFERENCES
Almaghrabi, R., Villalobos, G., Pouladzadeh, P., and Shir-
mohammadi, S. (2012). A novel method for measur-
ing nutrition intake based on food image. In Proceed-
ings of the 2012 IEEE International Instrumentation
and Measurement Technology Conference, I2MTC
’12, pages 366–370.
Alpers, S., Oberweis, A., Pieper, M., Betz, S., Fritsch, A.,
Schiefer, G., and Wagner, M. (2017a). PRIVACY-
AVARE: An Approach to Manage and Distribute Pri-
vacy Settings. In Proceedings of the 2017 3
rd
IEEE
International Conference on Computer and Commu-
nications, ICCC ’17, pages 1460–1468.
Alpers, S., Pieper, M., and Wagner, M. (2017b). Heraus-
forderungen bei der Entwicklung von Anwendungen
zum Selbstdatenschutz. In Informatik 2017: Digi-
tale Kulturen, Tagungsband der 47. Jahrestagung der
Gesellschaft f
¨
ur Informatik e.V. (GI), 25.9-29.9.2017,
Chemnitz, volume 275 of LNI, pages 1061–1072. (in
German).
Backes, M., Gerling, S., Hammer, C., Maffei, M., and Styp-
Rekowsky, P. (2014). AppGuard — Fine-Grained
Policy Enforcement for Untrusted Android Applica-
tions. In Revised Selected Papers of the 8
th
Interna-
tional Workshop on Data Privacy Management and
Autonomous Spontaneous Security - Volume 8247,
pages 213–231.
Breitenb
¨
ucher, U., Binz, T., Kopp, O., Leymann, F., and
Wieland, M. (2013). Policy-Aware Provisioning of
Cloud Applications. In Proceedings of the Seventh
International Conference on Emerging Security In-
formation, Systems and Technologies, SECURWARE
’13, pages 86–95.
Cao, J., Carminati, B., Ferrari, E., and Tan, K.-L. (2009).
ACStream: Enforcing Access Control over Data
Streams. In Proceedings of the 2009 IEEE Interna-
tional Conference on Data Engineering, ICDE ’09,
pages 1495–1498.
Davis, B. and Chen, H. (2013). RetroSkeleton: Retrofitting
Android Apps. In Proceeding of the 11
th
Annual Inter-
national Conference on Mobile Systems, Applications,
and Services, MobiSys ’13, pages 181–192.
Dhillon, G. and Backhouse, J. (2000). Technical Opin-
ion: Information System Security Management in
the New Millennium. Communications of the ACM,
43(7):125–128.
GrowthEnabler (2017). Market Pulse Report, Internet of
Things (IoT). Report.
He, Y., Barman, S., Wang, D., and Naughton, J. F. (2011).
On the Complexity of Privacy-preserving Complex
Event Processing. In Proceedings of the Thirti-
eth ACM SIGMOD-SIGACT-SIGART Symposium on
Principles of Database Systems, PODS ’11, pages
165–174.
Jeon, J., Micinski, K. K., Vaughan, J. A., Fogel, A., Reddy,
N., Foster, J. S., and Millstein, T. (2012). Dr. Android
and Mr. Hide: Fine-grained Permissions in Android
Applications. In Proceedings of the Second ACM
Workshop on Security and Privacy in Smartphones
and Mobile Devices, SPSM ’12, pages 3–14.
Kn
¨
oll, M. (2012). Urban Health Games. Collaborative,
Expressive & Reflective. PhD thesis, University of
Stuttgart.
Kwapisz, J. R., Weiss, G. M., and Moore, S. A. (2011). Ac-
tivity Recognition Using Cell Phone Accelerometers.
ACM SIGKDD Explorations Newsletter, 12(2):74–82.
Lindner, W. and Meier, J. (2006). Securing the Borealis
Data Stream Engine. In Proceedings of the 10
th
In-
ternational Database Engineering and Applications
Symposium, IDEAS ’06, pages 137–147.
Mehta, D. D., Za
˜
nartu, M., Feng, S. W., Cheyne II, H. A.,
and Hillman, R. E. (2012). Mobile Voice Health Mon-
itoring Using a Wearable Accelerometer Sensor and a
Smartphone Platform. IEEE Transactions on Biomed-
ical Engineering, 59(11):3090–3096.
Nauman, M., Khan, S., and Zhang, X. (2010). Apex: Ex-
tending Android Permission Model and Enforcement
with User-defined Runtime Constraints. In Proceed-
ings of the 5
th
ACM Symposium on Information, Com-
puter and Communications Security, ASIACCS ’10,
pages 328–332.
Quoc, D. L., Beck, M., Bhatotia, P., Chen, R., Fetzer,
C., and Strufe, T. (2017). PrivApprox: Privacy-
Preserving Stream Analytics. In Proceedings of the
2017 USENIX Annual Technical Conference, ATC
’17, pages 659–672.
Shapiro, S. S. (2016). Privacy Risk Analysis Based on Sys-
tem Control Structures: Adapting System-Theoretic
Process Analysis for Privacy Engineering. In Pro-
ceedings of the 2016 IEEE Security and Privacy Work-
shops, SPW ’16, pages 17–24.
Stach, C., D
¨
urr, F., Mindermann, K., Palanisamy, S. M.,
and Wagner, S. (2018). How a Pattern-based Privacy
System Contributes to Improve Context Recognition.
In Proceedings of the 2018 IEEE International Con-
ference on Pervasive Computing and Communications
Workshops, CoMoRea ’18, pages 238–243.
Stach, C. and Mitschang, B. (2018). ACCESSORS: A Data-
Centric Permission Model for the Internet of Things.
In Proceedings of the 4
th
International Conference
on Information Systems Security and Privacy, ICISSP
’18, pages 30–40.
Wang, D., He, Y., Rundensteiner, E., and Naughton, J. F.
(2013). Utility-maximizing Event Stream Suppres-
sion. In Proceedings of the 2013 ACM SIGMOD In-
ternational Conference on Management of Data, SIG-
MOD ’13, pages 589–600.
Young, W. and Leveson, N. G. (2014). An Integrated Ap-
proach to Safety and Security Based on Systems The-
ory. Communications of the ACM, 57(2):31–35.
The AVARE PATRON - A Holistic Privacy Approach for the Internet of Things
379