Migliavacca, M., Papagiannis, I., Eyers, D. M., Shand, B.,
Bacon, J., and Pietzuch, P. (2010). DEFCON: High-
performance Event Processing with Information Secu-
rity. In Proceedings of the 2010 USENIX Conference
on USENIX Annual Technical Conference, pages 1–15.
Mindermann, K., Riedel, F., Abdulkhaleq, A., Stach, C.,
and Wagner, S. (2017). Exploratory Study of the Pri-
vacy Extension for System Theoretic Process Analysis
(STPA-Priv) to elicit Privacy Risks in eHealth. In Pro-
ceedings of the 2017 IEEE 4
th
International Workshop
on Evolving Security & Privacy Requirements Engi-
neering, pages 90–96.
Mood, B. and Butler, K. R. B. (2018). PAL: A pseudo assem-
bly language for optimizing secure function evaluation
in mobile devices. Journal of Information Security and
Applications, 40:78–91.
Orr, D. A. and Sanchez, L. (2018). Alexa, did you get that?
Determining the evidentiary value of data stored by the
Amazon Echo. Digital Investigation, 24:72–78.
Palanisamy, S. M., Dürr, F., Tariq, M. A., and Rothermel, K.
(2018). Preserving Privacy and Quality of Service in
Complex Event Processing Through Event Reordering.
In Proceedings of the 12
th
ACM International Confer-
ence on Distributed and Event-based Systems, pages
40–51.
Purington, A., Taft, J. G., Sannon, S., Bazarova, N. N.,
and Taylor, S. H. (2017). “Alexa is My New BFF”:
Social Roles, User Satisfaction, and Personification of
the Amazon Echo. In Proceedings of the 2017 CHI
Conference Extended Abstracts on Human Factors in
Computing Systems, pages 2853–2859.
Rashidi, P. and Cook, D. J. (2009). Keeping the Resident in
the Loop: Adapting the Smart Home to the User. IEEE
Transactions on Systems, Man, and Cybernetics – Part
A: Systems and Humans, 39(5):949–959.
Samsung Newsroom (2018). Samsung Delivers Vi-
sion for Open and Intelligent IoT Experiences
to Simplify Everyday Life. Press release, Sam-
sung. https://news.samsung.com/us/samsung-vision-
iot-experiences-ces2018-press-conference.
Schaub, F., Balebako, R., and Cranor, L. F. (2017). De-
signing Effective Privacy Notices and Controls. IEEE
Internet Computing, 21(3):70–77.
Shu, J., Jia, X., Yang, K., and Wang, H. (2018). Privacy-
Preserving Task Recommendation Services for Crowd-
sourcing. IEEE Transactions on Services Computing,
pages 1–13.
Sopaoglu, U. and Abul, O. (2017). A Top-Down k-
Anonymization Implementation for Apache Spark. In
Proceedings of the 2017 IEEE International Confer-
ence on Big Data, pages 4513–4521.
Stach, C. (2018). Big Brother is Smart Watching You: Pri-
vacy Concerns about Health and Fitness Applications.
In Proceedings of the 4
th
International Conference on
Information Systems Security and Privacy, pages 13–
23.
Stach, C., Alpers, S., Betz, S., Dürr, F., Fritsch, A., Min-
dermann, K., Palanisamy, S. M., Schiefer, G., Wag-
ner, M., Mitschang, B., Oberweis, A., and Wagner, S.
(2018a). The AVARE PATRON - A Holistic Privacy
Approach for the Internet of Things. In Proceedings of
the 15
th
International Joint Conference on e-Business
and Telecommunications, pages 372–379.
Stach, C., Dürr, F., Mindermann, K., Palanisamy, S. M.,
and Wagner, S. (2018b). How a Pattern-based Privacy
System Contributes to Improve Context Recognition.
In Proceedings of the 2018 IEEE International Con-
ference on Pervasive Computing and Communications
Workshops, pages 238–243.
Stach, C. and Mitschang, B. (2013). Privacy Management
for Mobile Platforms – A Review of Concepts and
Approaches. In Proceedings of the 2013 IEEE 14
th
In-
ternational Conference on Mobile Data Management,
pages 305–313.
Stach, C. and Mitschang, B. (2018a). ACCESSORS: A Data-
Centric Permission Model for the Internet of Things.
In Proceedings of the 4
th
International Conference on
Information Systems Security and Privacy, pages 30–
40.
Stach, C. and Mitschang, B. (2018b). CURATOR—A Secure
Shared Object Store: Design, Implementation, and
Evaluation of a Manageable, Secure, and Performant
Data Exchange Mechanism for Smart Devices. In
Proceedings of the 33
rd
ACM/SIGAPP Symposium On
Applied Computing, pages 533–540.
Stach, C. and Steimle, F. (2019). Recommender-based Pri-
vacy Requirements Elicitation — EPICUREAN: An
Approach to Simplify Privacy Settings in IoT Applica-
tions with Respect to the GDPR. In Proceedings of the
34
th
ACM/SIGAPP Symposium On Applied Computing,
pages 1–8.
Stach, C., Steimle, F., and Mitschang, B. (2018c). THOR —
Ein Datenschutzkonzept für die Industrie 4.0: Daten-
schutzsysteme für die Smart Factory zur Realisierung
der DSGVO. In Workshops der INFORMATIK 2018,
pages 71–83.
Townsend, D., Knoefel, F., and Goubran, R. (2011). Pri-
vacy versus autonomy: A tradeoff model for smart
home monitoring technologies. In Proceedings of the
2011 Annual International Conference of the IEEE
Engineering in Medicine and Biology Society, pages
4749–4752.
Wallis, K., Hüffmeyer, M., Koca, A. S., and Reich, C. (2018).
Access Rules Enhanced by Dynamic IIoT Context. In
Proceedings of the 3
rd
International Conference on
Internet of Things, Big Data and Security, pages 204–
211.
Wieland, M., Hirmer, P., Steimle, F., Gröger, C., Mitschang,
B., Rehder, E., Lucke, D., Rahman, O. A., and Bauern-
hansl, T. (2016). Towards a Rule-based Manufacturing
Integration Assistant. Procedia CIRP, 57(1):213–218.
Zhang, J., Li, H., Liu, X., Luo, Y., Chen, F., Wang, H., and
Chang, L. (2017). On Efficient and Robust Anonymiza-
tion for Privacy Protection on Massive Streaming Cat-
egorical Information. IEEE Transactions on Depend-
able and Secure Computing, 14(5):507–520.
Zheng, S., Apthorpe, N., Chetty, M., and Feamster, N.
(2018). User Perceptions of Smart Home IoT Privacy.
Proceedings of the ACM on Human-Computer Interac-
tion, 2(CSCW):200:1–200:20.
IoTBDS 2019 - 4th International Conference on Internet of Things, Big Data and Security
68