, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95, ECGeneral Data Protection Regulation) Official Journal of the European Union, vol.4688, issue.119, pp.1-119, 2016.
What Is Privacy Worth?, The Journal of Legal Studies, vol.42, issue.2, pp.246-274, 2013. ,
DOI : 10.1086/671754
May) The Secretive World of Selling Data About You, Newsweek, pp.2-34, 2016. ,
May) Facebook, Google and personal data: What's your worth? BBC, p.7, 2014. ,
Aug) Why big companies buy, sell your data? CNN, pp.7-9, 2012. ,
The nine companies that know more about you than Google or Facebook Available: https://goo, Quartz. [Online], p.7, 2014. ,
Aug) Companies are making money from our personal data but at what cost? The Guardian Available: https://goo, p.5, 2016. ,
Jun) Facebook to show you ads based on your Web browsing, 2012. ,
Sep) This Is How Facebook Is Tracking Your Internet Activity Business Insider. [Online] Available: http://goo.gl/BPvUoR Data as the new currency: Governments role in facilitating the exchange, Deloitte Review, vol.13, pp.19-31, 2012. ,
Jan) Data is a New Currency Available: https://goo.gl Available: https://goo, Feb) Gartner Says 8.4 Billion Connected " Things " Will Be in Use in 2017, Up 31 Percent From 2016. Gartner, Inc. [Online], pp.3-12, 2017. ,
Privacy in the Internet of Things: threats and???challenges, Security and Communication Networks, pp.2728-2742, 2014. ,
DOI : 10.1007/978-3-642-14527-8_1
Security and privacy in the Internet of Things: Current status and open issues, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp.1-8, 2014. ,
DOI : 10.1109/PRISMS.2014.6970594
IoT Security & Privacy, Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, IoTPTS '15, p.1, 2015. ,
DOI : 10.1145/2732209.2732216
Mar) Click to agree with what? No one reads terms of service, studies confirm. The Guardian. [Online] Available: https://goo.gl, Privacy by Design. Information & Privacy Commissioner of Ontario. [Online]. Available, 2009. ,
Privacy As an Operating System Service, Proceedings of the 1 st USENIX Workshop on Hot Topics in Security, ser. HOTSEC'06, pp.8-8, 2006. ,
, The Guide to Data Protection Inofrmation Commissioner's Office (ICO), Tech. Rep, 2017.
, Available: https://ico.org.uk/media/for-organisations/guide-to-data- protection
Secure Deletion of Data from Magnetic and Solidstate Memory Focusing on Applications of Cryptography -Volume 6, ser. SSYM'96, 6 th Conference on USENIX Security Symposium, pp.8-8, 1996. ,
NIST Special Publication 800-88, Revision 1: Guidelines for Media Sanitization, NIST ITL Bulletin, 2015. ,
A P3P Preference Exchange Language 1.0 (APPEL1.0) Available: https, W3C Working Draft, p.1, 2002. ,
A comparison of two privacy policy languages, Proceedings of the 3rd ACM workshop on Secure web services , SWS '06, 2005. ,
DOI : 10.1145/1180367.1180378
XPref: a preference language for P3P, Computer Networks, vol.48, issue.5, pp.809-827, 2005. ,
DOI : 10.1016/j.comnet.2005.01.004
Distributed Ledgers & Linked Data, Proceedings of the 26th International Conference on World Wide Web Companion , WWW '17 Companion, pp.1451-1451, 2017. ,
DOI : 10.1145/3041021.3053898
A Distributed-Ledger Consortium Model for Collaborative Innovation, Computer, vol.50, issue.9, pp.29-37, 2017. ,
DOI : 10.1109/MC.2017.3571057
Blockchains and Smart Contracts for the Internet of Things, IEEE Access, vol.4, pp.2292-2303, 2016. ,
DOI : 10.1109/ACCESS.2016.2566339
Making Smart Contracts Smarter, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.254-269, 2016. ,
DOI : 10.1145/359545.359563
Privacy Capsules, Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '16, pp.399-411, 2016. ,
DOI : 10.1145/2342549.2342561
TaintDroid, th USENIX Conference on Operating Systems Design and Implementation. USENIX Association, pp.393-407, 2010. ,
DOI : 10.1145/1629575.1629604
Towards secure elements for the Internet of Things: The eLock use case, nd International Conference on Mobile and Secure Services, pp.1-5, 2016. ,
Analysis of a hardware security module's high-availability setting, IEEE Security & Privacy, vol.11, issue.3, pp.77-80, 2013. ,
DOI : 10.1109/MSP.2013.56