메뉴 건너뛰기




Volumn , Issue , 2011, Pages 234-241

Towards a holistic privacy engineering approach for smart grid systems

Author keywords

Privacy Engineering; Privacy Enhancing Technologies; Privacy Principles; Smart Grid

Indexed keywords

ADOPTION AND DIFFUSION; CONTEXT OF USE; ENERGY CONSUMER; ENGINEERING CHALLENGES; GUIDING PRINCIPLES; KEY FACTORS; METHODOLOGICAL FRAMEWORKS; MODELING SYSTEMS; PRIVACY CONCERNS; PRIVACY ENHANCING TECHNOLOGIES; PRIVACY PRINCIPLES; SMART GRID; SYSTEM DEVELOPMENT; TECHNICAL SECURITY;

EID: 84856207966     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2011.32     Document Type: Conference Paper
Times cited : (22)

References (59)
  • 1
    • 84856176913 scopus 로고    scopus 로고
    • [Online]. Available
    • National Energy Technology Laboratory (NETL), "The Modern Grid Strategy Vision," 2009. [Online]. Available: http://www.netl.doe.gov/ moderngrid/vision.html
    • (2009) The Modern Grid Strategy Vision
  • 2
    • 77952526989 scopus 로고    scopus 로고
    • The Smart Grid Interoperability Panel-Cyber Security Working Group, The National Institute of Standards and Technology (NIST), Tech. Rep., February
    • The Smart Grid Interoperability Panel-Cyber Security Working Group, "Smart grid cyber security strategy and requirements (draft nistir 7628),"The National Institute of Standards and Technology (NIST), Tech. Rep., February 2010.
    • (2010) Smart Grid Cyber Security Strategy and Requirements (Draft Nistir 7628)
  • 5
    • 56349121964 scopus 로고    scopus 로고
    • Towards the development of privacy-aware systems
    • February
    • P. Guarda and N. Zannone, "Towards the development of privacy-aware systems," Inf. Softw. Technol., vol. 51, pp. 337-350, February 2009.
    • (2009) Inf. Softw. Technol. , vol.51 , pp. 337-350
    • Guarda, P.1    Zannone, N.2
  • 13
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as Contextual Integrity
    • June
    • H. F. Nissenbaum, "Privacy as Contextual Integrity," Washington Law Review, vol. 79, June 2004.
    • (2004) Washington Law Review , vol.79
    • Nissenbaum, H.F.1
  • 17
    • 78751642043 scopus 로고    scopus 로고
    • Privacy-aware design principles for information networks
    • feb
    • S. Wicker and D. Schrader, "Privacy-aware design principles for information networks," Proceedings of the IEEE, vol. 99, no. 2, pp. 330-350, feb. 2011.
    • (2011) Proceedings of the IEEE , vol.99 , Issue.2 , pp. 330-350
    • Wicker, S.1    Schrader, D.2
  • 21
    • 63849328022 scopus 로고    scopus 로고
    • Privacy impact assessment: Its origins and development
    • R. Clarke, "Privacy impact assessment: Its origins and development,"Computer Law & Security Review, vol. 25, no. 2, pp. 123-135, 2009.
    • (2009) Computer Law & Security Review , vol.25 , Issue.2 , pp. 123-135
    • Clarke, R.1
  • 24
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Workshop on Privacy Enhancing Technologies, ser.
    • C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Workshop on Privacy Enhancing Technologies, ser. LNCS, vol. 2482, 2002.
    • (2002) LNCS , vol.2482
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 27
    • 84856141799 scopus 로고    scopus 로고
    • [Online]. Available
    • The Trusted Computing Group, 2011. [Online]. Available: https: //www.trustedcomputinggroup.org/
    • (2011)
  • 29
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems." in TCC, 2009, pp. 457-473.
    • (2009) TCC , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 33
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for nontransferable anonymous credentials with optional anonymity revocation
    • Advances in Cryptology EUROCRYPT 2001, ser. B. Pfitzmann, Ed. Springer Berlin / Heidelberg
    • J. Camenisch and A. Lysyanskaya, "An efficient system for nontransferable anonymous credentials with optional anonymity revocation,"in Advances in Cryptology EUROCRYPT 2001, ser. Lecture Notes in Computer Science, B. Pfitzmann, Ed. Springer Berlin / Heidelberg, 2001, vol. 2045, pp. 93-118.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 36
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • November
    • B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," J. ACM, vol. 45, pp. 965-981, November 1998.
    • (1998) J. ACM , vol.45 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 37
    • 77951688595 scopus 로고    scopus 로고
    • Differential privacy in new settings
    • C. Dwork, "Differential privacy in new settings," in SODA, 2010, pp. 174-183.
    • (2010) SODA , pp. 174-183
    • Dwork, C.1
  • 39
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: A model for protecting privacy
    • October
    • L. Sweeney, "k-anonymity: a model for protecting privacy," Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, pp. 557-570, October 2002.
    • (2002) Int. J. Uncertain. Fuzziness Knowl.-Based Syst. , vol.10 , pp. 557-570
    • Sweeney, L.1
  • 40
    • 34548805858 scopus 로고    scopus 로고
    • T-closeness: Privacy beyond k-anonymity and l-diversity
    • N. Li, T. Li, and S. Venkatasubramanian, "t-closeness: Privacy beyond k-anonymity and l-diversity," in In ICDE, 2007.
    • (2007) ICDE
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 49
    • 79955806530 scopus 로고    scopus 로고
    • User-Centric Privacy-Enhancing Identity Management
    • Digital Privacy, ser. J. Camenisch, R. Leenes, and D. Sommer, Eds. Springer Berlin / Heidelberg
    • B. Priem, E. Kosta, A. Kuczerawy, J. Dumortier, and R. Leenes, "User-Centric Privacy-Enhancing Identity Management," in Digital Privacy, ser. Lecture Notes in Computer Science, J. Camenisch, R. Leenes, and D. Sommer, Eds. Springer Berlin / Heidelberg, 2011, vol. 6545, pp. 91-106.
    • (2011) Lecture Notes in Computer Science , vol.6545 , pp. 91-106
    • Priem, B.1    Kosta, E.2    Kuczerawy, A.3    Dumortier, J.4    Leenes, R.5
  • 54
    • 84856151758 scopus 로고    scopus 로고
    • A logical method for policy enforcement over evolving audit logs
    • vol. abs/1102.2521
    • D. Garg, L. Jia, and A. Datta, "A logical method for policy enforcement over evolving audit logs," CoRR, vol. abs/1102.2521, 2011.
    • (2011) CoRR
    • Garg, D.1    Jia, L.2    Datta, A.3
  • 56
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
    • M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requirements Engineering, vol. 16, pp. 3-32, 2011.
    • (2011) Requirements Engineering , vol.16 , pp. 3-32
    • Deng, M.1    Wuyts, K.2    Scandariato, R.3    Preneel, B.4    Joosen, W.5
  • 57
    • 56349121964 scopus 로고    scopus 로고
    • Towards the development of privacy-aware systems
    • February
    • P. Guarda and N. Zannone, "Towards the development of privacy-aware systems," Inf. Softw. Technol., vol. 51, pp. 337-350, February 2009.
    • (2009) Inf. Softw. Technol. , vol.51 , pp. 337-350
    • Guarda, P.1    Zannone, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.