skip to main content
10.1145/2988336.2988349acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things

Published:28 November 2016Publication History

ABSTRACT

Internet of Things (IoT) applications, systems and services are subject to law. We argue that for the IoT to develop lawfully, there must be technical mechanisms that allow the enforcement of specified policy, such that systems align with legal realities. The audit of policy enforcement must assist the apportionment of liability, demonstrate compliance with regulation, and indicate whether policy correctly captures legal responsibilities. As both systems and obligations evolve dynamically, this cycle must be continuously maintained.

This poses a huge challenge given the global scale of the IoT vision. The IoT entails dynamically creating new services through managed and flexible data exchange. Data management is complex in this dynamic environment, given the need to both control and share information, often across federated domains of administration.

We see middleware playing a key role in managing the IoT. Our vision is for a middleware-enforced, unified policy model that applies end-to-end, throughout the IoT. This is because policy cannot be bound to things, applications, or administrative domains, since functionality is the result of composition, with dynamically formed chains of data flows.

We have investigated the use of Information Flow Control (IFC) to manage and audit data flows in cloud computing; a domain where trust can be well-founded, regulations are more mature and associated responsibilities clearer. We feel that IFC has great potential in the broader IoT context. However, the sheer scale and the dynamic, federated nature of the IoT pose a number of significant research challenges.

References

  1. Combining heterogeneous service technologies for building an Internet of Things middleware. Computer Communications, 35(4):405--417, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Overview of the Internet of Things. Technical Report Y.2060, ITU Telecommunication Standardization Sector, June 2012.Google ScholarGoogle Scholar
  3. Software Guard Extensions Programming Reference. (Intel, Technical Report 329298-001 US), 2013.Google ScholarGoogle Scholar
  4. Internet of Things (Preliminary Report 2014). (Technical Report, ISO/IEC JTC 1), 2015.Google ScholarGoogle Scholar
  5. N. Aaraj, A. Raghunathan, and N. K. Jha. Analysis and Design of a Hardware/Software Trusted Platform Module for Embedded Systems. Transactions on Embedded Computing Systems (TECS), 8(1):8, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Accorsi. BBox: A distributed secure log architecture. In Public Key Infrastructures, Services and Applications, pages 109--124. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved Proxy re-Encryption Schemes with Applications to Secure Distributed Storage. ACM Transactions on Information and System Security (TISSEC), 9(1):1--30, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Atzori, A. Iera, and G. Morabito. The Internet of Things: A survey. Computer networks, 54(15):2787--2805, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch. Information Flow Control for Secure Cloud Computing. Transactions on Network and System Management SI Cloud Service Management, 11(1):76--89, 2014.Google ScholarGoogle Scholar
  10. J. Bacon, K. Moody, and W. Yao. A Model of OASIS Role-based Access Control and its Support for Active Security. ACM Transactions on Information and System Security (TISSEC), 5(4):492--540, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Bajikar. Trusted Platform Module (TPM) based Security on Notebook PCs-White Paper. Mobile Platforms Group, Intel Corporation, pages 1--20, 2002.Google ScholarGoogle Scholar
  12. M. Baldauf, S. Dustdar, and F. Rosenberg. A survey on context-aware systems. International Journal of Ad Hoc and Ubiquitous Computing, 2(4):263--277, June 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Bandyopadhyay, M. Sengupta, S. Maiti, and S. Dutta. Role of middleware for Internet of Things: A study. International Journal of Computer Science and Engineering Survey, 2:94--105, Aug 2011.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. Bauer and D. Schreckling. Data Provenance in the Internet of Things. In EU Project COMPOSE, Conference 2013.Google ScholarGoogle Scholar
  15. D. E. Bell and L. J. LaPadula. Secure Computer Systems: Mathematical Foundations and Model. Technical Report M74-244, The MITRE Corp., Bedford MA, 1973.Google ScholarGoogle Scholar
  16. T. Bench-Capon, M. Araszkiewicz, K. Ashley, et al. A History of AI and Law in 50 Papers: 25 Years of the International Conference on AI and Law. Artif. Intell. Law, 20(3):215--319, Sept. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Berger, K. Goldman, D. Pendarakis, D. Safford, E. Valdez, and M. Zohar. Scalable Attestation: A Step Toward Secure and Trusted Clouds. In International Conference on Cloud Engineering (IC2E). IEEE, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Bettini, O. Brdiczka, K. Henricksen, J. Indulska, D. Nicklas, A. Ranganathan, and D. Riboni. A survey of context modelling and reasoning techniques. Pervasive and Mobile Computing, 6(2):161--180, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR 76-372, MITRE Corp., 1977.Google ScholarGoogle Scholar
  20. G. S. Blair, A. Bennaceur, N. Georgantas, P. Grace, V. Issarny, V. Nundloll, and M. Paolucci. The role of ontologies in emergent middleware: Supporting interoperability in complex distributed systems. In ACM/IFIP/USENIX Middleware 2011, Springer LNCS 7049, pages 410--430, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. D. W. Chadwick and S. F. Lievens. Enforcing sticky security policies throughout a distributed application. In Workshop on Middleware Security, pages 1--6. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. W. Chadwick, A. Otenko, and E. Ball. Role-based Access Control with X. 509 Attribute Certificates. Internet Computing, IEEE, 7(2):62--69, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Chapman, M. D. Allen, and B. T. Blaustein. It's About the Data: Provenance as a Tool for Assessing Data Fitness. In Workshop on the Theory and Practice of Provenance. USENIX, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. W. Cheng, D. R. K. Ports, D. Schultz, V. Popic, A. Blankstein, J. Cowling, D. Curtis, L. Shrira, and B. Liskov. Abstractions for Usable Information Flow Control in Aeolus. In USENIX Annual Technical Conference, Boston, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Cherkaoui, L. Bossuet, L. Seitz, G. Selander, and R. Borgaonkar. New Paradigms for Access Control in Constrained Environments. In 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), pages 1--4. IEEE, 2014.Google ScholarGoogle Scholar
  26. J. Crowcroft, A. Madhavapeddy, M. Schwarzkopf, T. Hong, and R. Mortier. Unclouded Vision. In Distributed Computing and Networking, pages 29--40. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. P. De Leusse, P. Periorellis, T. Dimitrakos, and S. K. Nair. Self Managed Security Cell, a Security Model for the Internet of Things and Services. In 1st International Conference on Advances in Future Internet, pages 47--52. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236--243, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. C. Dwork. Differential privacy. In Automata, Languages and Programming, pages 1--12. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. S. Farrell and R. Housley. An Internet Attribute Certificate Profile for Authorization. (IETF Technical Report), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. O. Garcia-Morchon, S. Kumar, R. Struik, S. Keoh, and R. Hummen. Security Considerations in the IP-based Internet of Things. IETF, 2013.Google ScholarGoogle Scholar
  32. A. Gehani and D. Tariq. SPADE: Support for Provenance Auditing in Distributed Environments. In ACM/IFIP/USENIX Middleware, pages 101--120. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. P. Grace, Y.-D. Bromberg, L. Réveillère, and G. Blair. Overstar: An open approach to end-to-end middleware services in systems of systems. In ACM/IFIP/USENIX Middleware, pages 229--248. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7):1645--1660, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. W. Hartzog and E. Selinger. The Internet of Heirlooms and Disposable Things. North Carolina Journal of Law & Technology, 581, June 2016.Google ScholarGoogle Scholar
  36. S. Hasan and E. Curry. Thingsonomy: Tackling Variety in Internet of Things Events. Internet Computing, 19(2):10--18, Mar 2015.Google ScholarGoogle ScholarCross RefCross Ref
  37. T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle. Security Challenges in the IP-based Internet of Things. Wireless Personal Communications, 61(3):527--542, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. W. K. Hon, C. Millard, and J. Singh. Twenty Legal Considerations for Clouds of Things. (Queen Mary University of London, School of Law, Technical Report 216/2016), 2016.Google ScholarGoogle Scholar
  39. W. K. Hon, C. Millard, J. Singh, I. Walden, and J. Crowcroft. Policy, legal and regulatory implications of a Europe-only cloud. International Journal of Law and Information Technology, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  40. D. Hrestak and S. Picek. Homomorphic Encryption in the Cloud. In Proc. 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pages 1400--1404. IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  41. R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle. Towards Viable Certificate-based Authentication for the Internet of Things. In 2nd Workshop on Hot Topics in Wireless Network Security and Privacy, pages 37--42. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. N. Ibrahim and F. Le Mouël. A survey on service composition middleware in pervasive environments. International Journal of Computer Science Issues, 1:1--12, Aug 2009.Google ScholarGoogle Scholar
  43. V. Issarny and G. Blair. Guest editorial: Special issue on the future of middleware (FOME'11). Journal of Internet Services and Applications, (1):1--4, May.Google ScholarGoogle Scholar
  44. K. R. Jayaram, D. Safford, U. Sharma, V. Naik, D. Pendarakis, and S. Tao. Trustworthy Geographically Fenced Hybrid Clouds. In ACM/IFIP/USENIX Middleware. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. S. Kalasapur, M. Kumar, and B. Shirazi. Dynamic service composition in pervasive computing. IEEE Transactions on Parallel and Distributed Systems, 18(7):907--918, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. S. L. Keoh, S. Kumar, and H. Tschofenig. Securing the Internet of Things: A Standardization Perspective. Internet of Things Journal, 1(3):265--275, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  47. C. Kil, E. C. Sezer, A. M. Azab, P. Ning, and X. Zhang. Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence. In Dependable Systems & Networks (DSN'09), pages 115--124. IEEE, 2009.Google ScholarGoogle Scholar
  48. F. Kon, F. Costa, G. Blair, and R. H. Campbell. The case for reflective middleware. Communications of the ACM, 45(6):33--38, Jun 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. J.-Y. Lee, W.-C. Lin, and Y.-H. Huang. A Lightweight Authentication Protocol for Internet of Things. In International Symposium on Next-Generation Electronics (ISNE), pages 1--2. IEEE, 2014.Google ScholarGoogle Scholar
  50. N. Love and M. Genesereth. Computational law. In 10th International Conference on Artificial Intelligence and Law, pages 205--209. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. R. Lu, X. Lin, X. Liang, and X. S. Shen. Secure Provenance: the Essential of Bread and Butter of Data Forensics in Cloud Computing. In Symposium on Information, Computer and Communications Security (ASIACCS), pages 282--292. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. P. Macko, M. Chiarini, and M. Seltzer. Collecting Provenance via the Xen Hypervisor. In TaPP. USENIX, 2011.Google ScholarGoogle Scholar
  53. N. Matthys, C. Huygens, D. Hughes, J. Ueyama, S. Michiels, and W. Joosen. Policy-driven tailoring of sensor networks. In Springer, Sensor Systems and Software, S-CUBE'10, pages 20--35, 2010.Google ScholarGoogle Scholar
  54. C. J. Millard, editor. Cloud Computing Law. Oxford University Press, 2013.Google ScholarGoogle Scholar
  55. J. Mineraud, O. Mazhelis, X. Su, and S. Tarkoma. A gap analysis of Internet-of-Things platforms. Computer Communications, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. N. H. Minsky and V. Ungureanu. Law-governed interaction. ACM Transactions on Software Engineering Methodologies, 9(3):273--305, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. G. Mulligan. The 6LoWPAN architecture. In Proceedings of the 4th workshop on Embedded networked sensors, pages 78--82. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. I. Seltzer. Provenance-aware storage systems. In USENIX Annual Technical Conference, pages 43--56, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. A. C. Myers. JFlow: Practical Mostly-static Information Flow Control. In 26th SIGPLAN SIGACT POPL'99, pages 228--241. ACM, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. A. C. Myers and B. Liskov. A Decentralized Model for Information Flow Control. In Symposium on Operating Systems Principles (SOSP), pages 129--142. ACM, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. M. Nauman, S. Khan, X. Zhang, and J.-P. Seifert. Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In Trust and Trustworthy Computing, pages 1--15. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Nuffield Council on Bioethics. The collection, linking and use of data in biomedical research and health care: ethical issues. 2014.Google ScholarGoogle Scholar
  63. S. W. Oh and H. S. Kim. Decentralized Access Permission Control Using Resource-oriented Architecture for the Web of Things. In Conference on Advanced Communication Technology (ICACT), pages 749--753. IEEE, 2014.Google ScholarGoogle Scholar
  64. M. Paolucci and B. Souville. Data interoperability in the future of middleware. Journal of Internet Services and Applications, 3(1):127--131, May 2012.Google ScholarGoogle ScholarCross RefCross Ref
  65. N. Park, M. Kim, and H.-C. Bang. Symmetric Key-Based Authentication and the Session Key Agreement Scheme in IoT Environment. In Computer Science and its Applications, pages 379--384. Springer, 2015.Google ScholarGoogle Scholar
  66. T. Pasquier, J. Bacon, J. Singh, and D. Eyers. Data-Centric Access Control for Cloud Computing. In Symposium on Access Control Models and Technologies (SACMAT). ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. T. Pasquier, J. Singh, and J. Bacon. Clouds of Things need Information Flow Control with Hardware Roots of Trust. In International Conference on Cloud Computing Technology and Science (CloudCom'15). IEEE, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. T. Pasquier, J. Singh, J. Bacon, and D. Eyers. Information Flow Audit for PaaS clouds. In International Conference on Cloud Engineering (IC2E), pages 42--51. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  69. T. Pasquier, J. Singh, D. Eyers, and J. Bacon. CamFlow: Managed Data-Sharing for Cloud Services. IEEE Transactions on Cloud Computing, 2015.Google ScholarGoogle Scholar
  70. S. Pearson. Trusted Computing Platforms, the Next Security Solution. HP Labs, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. S. Pearson and M. Casassa-Mont. Sticky Policies: An Approach for Managing Privacy across Multiple Parties. Computer, 44, July 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos. Context aware computing for the Internet of Things: A survey. Communications Surveys Tutorials, IEEE, 16(1):414--454, First 2014.Google ScholarGoogle ScholarCross RefCross Ref
  73. D. J. Pohly, S. McLaughlin, P. McDaniel, and K. Butler. Hi-Fi: Collecting High-Fidelity whole-system provenance. In Proceedings of the 28th Annual Computer Security Applications Conference, pages 259--268. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila. Two-phase Authentication Protocol for Wireless Sensor Networks in Distributed IoT Applications. In 14th Int. Conf. on Wireless Communications and Networking (WCNC), pages 2770--2775. IEEE, 2014.Google ScholarGoogle Scholar
  75. R. Roman, P. Najera, and J. Lopez. Securing the Internet of Things. Computer, 44(9):51--58, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. S. M. Sadjadi and P. K. McKinley. A survey of adaptive middleware. Michigan State University Report MSU-CSE-03-35, 2003.Google ScholarGoogle Scholar
  77. N. Santos, H. Raj, S. Saroiu, and W. A. Using ARM TrustZone to Build a Trusted Language Runtime for Mobile Applications. In Proc. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pages 67--80. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The Case for VM-based Cloudlets in Mobile Computing. Pervasive Computing, IEEE, 8(4):14--23, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. L. Sfaxi, T. Abdellatif, R. Robbana, and Y. Lakhnech. Information Flow Control of Component-based Distributed Systems. Concurrency and Computation: Practice and Experience, 25(2):161--179, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Z. Shelby, K. Hartke, and C. Bormann. The Constrained Application Protocol (CoAP). IETF Standards Track, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  81. J. Singh and J. Bacon. On Middleware for Emerging Health Services. Journal of Internet Services and Applications, 5(6):1--34, 2014.Google ScholarGoogle Scholar
  82. J. Singh, D. Eyers, and J. Bacon. Policy Enforcement within Emerging Distributed, Event-Based Systems. In Distributed Event-Based Systems (DEBS'14), pages 246--255. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. J. Singh, D. M. Eyers, and J. Bacon. Disclosure Control in Multi-Domain Publish/Subscribe Systems. In Distributed Event-Based Systems (DEBS'11), pages 159--170. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. J. Singh, T. Pasquier, J. Bacon, and D. Eyers. Integrating Middleware and Information Flow Control. In International Conference on Cloud Engineering (IC2E), pages 54--59. IEEE, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers. Twenty security considerations for cloud-supported Internet of Things. IEEE IoT Journal, 3(3):269--284, June 2016.Google ScholarGoogle Scholar
  86. J. Singh, J. Powles, T. Pasquier, and J. Bacon. Data flow management and compliance in cloud computing. IEEE Cloud Computing Magazine, Special Issue on Legal Clouds, 2(4):24--32, July 2015.Google ScholarGoogle Scholar
  87. J. Singh, L. Vargas, J. Bacon, and K. Moody. Policy-based Information Sharing in Publish/Subscribe Middleware. In Policy. IEEE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. M. Sloman. Policy Driven Management For Distributed Systems. Journal of Network and Systems Management, 2:333--360, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  89. J. Stankovic. Research Directions for the Internet of Things. Internet of Things Journal, 1(1):3--9, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  90. S. Subashini and V. Kavitha. A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications, 34(1):1--11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. T. Teixeira, S. Hachem, V. Issarny, and N. Georgantas. Service oriented middleware for the Internet of Things: A perspective. In ServiceWave'11, pages 220--229, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux Security Modules: General security support for the Linux kernel. In Foundations of Intrusion Tolerant Systems, pages 213--213. IEEE, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  93. A. Wun and H.-A. Jacobsen. A policy management framework for content-based publish/subscribe. In ACM/IFIP/USENIX Middleware, pages 368--388. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. A. Zavou, V. Pappas, V. P. Kemerlis, M. Polychronakis, G. Portokalidis, and A. D. Keromytis. Cloudopsy: An autopsy of data flows in the cloud. In Human Aspects of Information Security, Privacy, and Trust, pages 366--375. Springer, 2013.Google ScholarGoogle Scholar
  95. N. Zeldovich, S. Boyd-Wickizer, and D. Mazières. Securing Distributed Systems with Information Flow Control. In 5th Symposium on Networked System Design and Implementation (NSDI 08), pages 293--308. USENIX, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      Middleware '16: Proceedings of the 17th International Middleware Conference
      November 2016
      280 pages
      ISBN:9781450343008
      DOI:10.1145/2988336

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 November 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate203of948submissions,21%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader