{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:37:06Z","timestamp":1725691026719},"reference-count":24,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Law & Security Review"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1016\/j.clsr.2017.06.007","type":"journal-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T17:31:38Z","timestamp":1503595898000},"page":"125-133","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":35,"title":["Data integration in IoT ecosystem: Information linkage as a privacy threat"],"prefix":"10.1016","volume":"34","author":[{"given":"Nishtha","family":"Madaan","sequence":"first","affiliation":[]},{"given":"Mohd Abdul","family":"Ahad","sequence":"additional","affiliation":[]},{"given":"Sunil M.","family":"Sastry","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/j.clsr.2017.06.007_bib0010","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17485\/ijst\/2017\/v10i8\/105400","article-title":"Comparing and analyzing the characteristics of Hadoop, Cassandra and Quantcast file systems for handling big data","volume":"10","author":"Ahad","year":"2017","journal-title":"Indian J Sci Technol"},{"issue":"9","key":"10.1016\/j.clsr.2017.06.007_bib0015","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MCOM.2015.7263375","article-title":"Toward better horizontal integration among IoT services","volume":"53","author":"Al-Fuqaha","year":"2015","journal-title":"IEEE Commun Mag"},{"key":"10.1016\/j.clsr.2017.06.007_bib0020","first-page":"1","article-title":"Privacy of the internet of things: a systematic literature review (extended discussion)","author":"Aleisa","year":"2016","journal-title":"CoRR"},{"key":"10.1016\/j.clsr.2017.06.007_bib0025","author":"Beart"},{"key":"10.1016\/j.clsr.2017.06.007_bib0035","author":"Cavoukian"},{"key":"10.1016\/j.clsr.2017.06.007_bib0030","author":"Clifton"},{"key":"10.1016\/j.clsr.2017.06.007_bib0040","author":"Community"},{"key":"10.1016\/j.clsr.2017.06.007_bib0045","author":"Danezis"},{"issue":"11","key":"10.1016\/j.clsr.2017.06.007_bib0050","doi-asserted-by":"crossref","first-page":"15582","DOI":"10.3390\/s131115582","article-title":"Data management for the internet of things: design primitives and solution","volume":"13","author":"Elkheir","year":"2013","journal-title":"Sensors (Basel)"},{"key":"10.1016\/j.clsr.2017.06.007_bib0055","series-title":"Access Control for Data Integration in Presence of Data Dependencies","author":"Haddad","year":"2014"},{"key":"10.1016\/j.clsr.2017.06.007_bib0060","author":"Hans"},{"issue":"5","key":"10.1016\/j.clsr.2017.06.007_bib0070","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1016\/j.clsr.2014.07.006","article-title":"Legal aspects of managing big data","volume":"30","author":"Kemp","year":"2014","journal-title":"Comput Law Secur Rev"},{"issue":"5","key":"10.1016\/j.clsr.2017.06.007_bib9000","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1016\/j.clsr.2016.05.002","article-title":"Data analytics and consumer profiling: finding appropriate privacy principles for discovered data","volume":"32","author":"King","year":"2016","journal-title":"Comput Law Secur Rev"},{"key":"10.1016\/j.clsr.2017.06.007_bib0075","author":"Mainetti"},{"issue":"2","key":"10.1016\/j.clsr.2017.06.007_bib0080","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.clsr.2016.01.014","article-title":"Personal data for decisional purposes in the age of analytics: from an individual to a collective dimension of data protection","volume":"32","author":"Mantelero","year":"2016","journal-title":"Comput Law Secur Rev"},{"issue":"5","key":"10.1016\/j.clsr.2017.06.007_bib0085","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1016\/j.clsr.2016.05.002","article-title":"Data analytics and consumer profiling: finding appropriate privacy principles for discovered data","volume":"32","author":"Nancy","year":"2016","journal-title":"Comput Law Secur Rev"},{"key":"10.1016\/j.clsr.2017.06.007_bib0090","author":"Neisse"},{"key":"10.1016\/j.clsr.2017.06.007_bib0095","author":"NEST"},{"issue":"3","key":"10.1016\/j.clsr.2017.06.007_bib0100","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MITP.2015.34","article-title":"Big data privacy in the internet of things era","volume":"17","author":"Perera","year":"2015","journal-title":"IT Prof"},{"issue":"2","key":"10.1016\/j.clsr.2017.06.007_bib0105","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/3068777.3068781","article-title":"User identity linkage across online social networks: a review","volume":"18","author":"Shu","year":"2017","journal-title":"SIGKDD Explor Newsl"},{"key":"10.1016\/j.clsr.2017.06.007_bib0110","author":"Single-sign-on"},{"issue":"5","key":"10.1016\/j.clsr.2017.06.007_bib0115","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1016\/j.clsr.2016.07.002","article-title":"Cyber security in the internet of things: legal aspects","volume":"32","author":"Weber","year":"2016","journal-title":"Comput Law Secur Rev"},{"key":"10.1016\/j.clsr.2017.06.007_bib0120","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1109\/ACCESS.2014.2362522","article-title":"Information security in big data: privacy and data mining","volume":"2","author":"Xu","year":"2014","journal-title":"IEEE Access"},{"key":"10.1016\/j.clsr.2017.06.007_bib0125","doi-asserted-by":"crossref","first-page":"2728","DOI":"10.1002\/sec.795","article-title":"Privacy in the internet of things: threats and challenges","volume":"7","author":"Ziegeldorf","year":"2014","journal-title":"Security Comm Netw"}],"container-title":["Computer Law & Security Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364917301358?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364917301358?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,8,28]],"date-time":"2018-08-28T05:55:39Z","timestamp":1535435739000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0267364917301358"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["S0267364917301358"],"URL":"https:\/\/doi.org\/10.1016\/j.clsr.2017.06.007","relation":{},"ISSN":["0267-3649"],"issn-type":[{"value":"0267-3649","type":"print"}],"subject":[],"published":{"date-parts":[[2018,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Data integration in IoT ecosystem: Information linkage as a privacy threat","name":"articletitle","label":"Article Title"},{"value":"Computer Law & Security Review","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.clsr.2017.06.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Nishtha Madaan, Mohd Abdul Ahad, Sunil M. Sastry. Published by Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}