{"id":456,"date":"2014-08-06T08:17:08","date_gmt":"2014-08-06T08:17:08","guid":{"rendered":"http:\/\/www.iot-conference.org\/iot2014\/?page_id=456"},"modified":"2019-11-19T13:18:13","modified_gmt":"2019-11-19T13:18:13","slug":"workshop-on-privacy-trust-and-the-iot-pt-iot14","status":"publish","type":"page","link":"https:\/\/iot-conference.org\/iot2014\/workshop-on-privacy-trust-and-the-iot-pt-iot14\/","title":{"rendered":"Workshop on Privacy, Trust, and the IoT (PT-IoT&#8217;14)"},"content":{"rendered":"<p><strong>Mit Media Lab, Cambridge, MA, October 8, 2014<br \/>\nWorkshop Website: <a href=\"https:\/\/sites.google.com\/site\/ptiot2014\/\">https:\/\/sites.google.com\/site\/ptiot2014\/<\/a><\/strong><\/p>\n<h3><\/h3>\n<p>The PT-IoT&#8217;14 invites submission of previously unpublished extended abstracts on recent developments in the area of Privacy, Trust and the Internet of Things. With this workshop we aim to draw together academics and professionals of all disciplines and backgrounds to discuss the key problems in these areas, and explore methodologies, technologies and tools for addressing them. We seek contributions that highlight\/discuss challenges in IoT and solutions that may benefit from knowledge driven approaches.<\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"614\"><strong>Workshop Agenda<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"103\">9:45-10:30<\/td>\n<td width=\"511\">Introduction &amp; Keynote<\/p>\n<p><em>Policy Controlled Access in IoT: Current and Future Trends <\/em>Seraphin Calo (Cloud-based networking, IBM)<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">10:30-10:45<\/td>\n<td width=\"511\"><em>Private.iot: IoT Privacy Notice using ONS<\/em> Edward Wang, Richard Chow (University of Washington Ubiquitous Computing Lab, Intel Corporation)<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">10:45-11:00<\/td>\n<td width=\"511\"><em>RIPPLE: Scalable Medical Telemetry System for Supporting Combat Rescue<\/em>Sanjay Kumar Boddhu (Qbase LLC)<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">11:00-11:15<\/td>\n<td width=\"511\"><em>Localizing Computation for IoT: a Cloud-based Approach<\/em>Jorge Ortiz (IBM)<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">11:15-11:30<\/td>\n<td width=\"511\">&nbsp;<\/p>\n<p>Coffee break<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">11:30-11:45<\/td>\n<td width=\"511\"><em>Model-Based Simulation Systems for Adaptive Training in Time-Critical Decision Making<\/em> Subhashini Ganapathy (Wright State University)<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">11:45-12:00<\/td>\n<td width=\"511\"><em>Towards a Secure and Trusted Physical Object Model for Context Aware Computing<\/em> Andrew Gowing, Siliang Qian, Alexandru Verzea, Minjoo Cha &amp; Muthucumaru Maheswaran (McGill University)<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">12:00-12:30<\/td>\n<td width=\"511\">Lunch and Discussion <em>(boxed lunches provided)<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Workshop Chairs<\/h3>\n<ul>\n<li>Edoardo Pignotti (University of Aberdeen)<\/li>\n<li>Geeth de Mel (IBM TJ Watson Research)<\/li>\n<li>Murat Sensoy (\u00d6zye\u011fin University)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Mit Media Lab, Cambridge, MA, October 8, 2014 Workshop Website: https:\/\/sites.google.com\/site\/ptiot2014\/ The PT-IoT&#8217;14 invites submission of previously unpublished extended abstracts on recent developments in the area of Privacy, Trust and the Internet of Things. With this workshop we aim to&hellip;  <\/p>\n<p class=\"more-link\"><a href=\"https:\/\/iot-conference.org\/iot2014\/workshop-on-privacy-trust-and-the-iot-pt-iot14\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-456","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/iot-conference.org\/iot2014\/wp-json\/wp\/v2\/pages\/456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iot-conference.org\/iot2014\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iot-conference.org\/iot2014\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iot-conference.org\/iot2014\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/iot-conference.org\/iot2014\/wp-json\/wp\/v2\/comments?post=456"}],"version-history":[{"count":1,"href":"https:\/\/iot-conference.org\/iot2014\/wp-json\/wp\/v2\/pages\/456\/revisions"}],"predecessor-version":[{"id":872,"href":"https:\/\/iot-conference.org\/iot2014\/wp-json\/wp\/v2\/pages\/456\/revisions\/872"}],"wp:attachment":[{"href":"https:\/\/iot-conference.org\/iot2014\/wp-json\/wp\/v2\/media?parent=456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}