-
1
-
-
84856176913
-
-
[Online]. Available
-
National Energy Technology Laboratory (NETL), "The Modern Grid Strategy Vision," 2009. [Online]. Available: http://www.netl.doe.gov/ moderngrid/vision.html
-
(2009)
The Modern Grid Strategy Vision
-
-
-
2
-
-
77952526989
-
-
The Smart Grid Interoperability Panel-Cyber Security Working Group, The National Institute of Standards and Technology (NIST), Tech. Rep., February
-
The Smart Grid Interoperability Panel-Cyber Security Working Group, "Smart grid cyber security strategy and requirements (draft nistir 7628),"The National Institute of Standards and Technology (NIST), Tech. Rep., February 2010.
-
(2010)
Smart Grid Cyber Security Strategy and Requirements (Draft Nistir 7628)
-
-
-
5
-
-
56349121964
-
Towards the development of privacy-aware systems
-
February
-
P. Guarda and N. Zannone, "Towards the development of privacy-aware systems," Inf. Softw. Technol., vol. 51, pp. 337-350, February 2009.
-
(2009)
Inf. Softw. Technol.
, vol.51
, pp. 337-350
-
-
Guarda, P.1
Zannone, N.2
-
8
-
-
70849084080
-
Methods for designing privacy aware information systems: A review
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis, "Methods for designing privacy aware information systems: A review," in Informatics, 2009. PCI '09. 13th Panhellenic Conference on, sept. 2009, pp. 185-194.
-
Informatics, 2009. PCI '09. 13th Panhellenic Conference on, Sept. 2009
, pp. 185-194
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
13
-
-
1842538795
-
Privacy as Contextual Integrity
-
June
-
H. F. Nissenbaum, "Privacy as Contextual Integrity," Washington Law Review, vol. 79, June 2004.
-
(2004)
Washington Law Review
, vol.79
-
-
Nissenbaum, H.F.1
-
15
-
-
84856190841
-
-
U.S. Federal Trade Commission, FTC, Washington, DC, USA, Tech. Rep.
-
U.S. Federal Trade Commission, "Privacy online: Fair information practices in the electronic marketplace: A federal trade commission report to congress," FTC, Washington, DC, USA, Tech. Rep., 2000.
-
(2000)
Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress
-
-
-
17
-
-
78751642043
-
Privacy-aware design principles for information networks
-
feb
-
S. Wicker and D. Schrader, "Privacy-aware design principles for information networks," Proceedings of the IEEE, vol. 99, no. 2, pp. 330-350, feb. 2011.
-
(2011)
Proceedings of the IEEE
, vol.99
, Issue.2
, pp. 330-350
-
-
Wicker, S.1
Schrader, D.2
-
21
-
-
63849328022
-
Privacy impact assessment: Its origins and development
-
R. Clarke, "Privacy impact assessment: Its origins and development,"Computer Law & Security Review, vol. 25, no. 2, pp. 123-135, 2009.
-
(2009)
Computer Law & Security Review
, vol.25
, Issue.2
, pp. 123-135
-
-
Clarke, R.1
-
22
-
-
78649989557
-
-
[Online]. Available
-
A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, v0.32." 2009. [Online]. Available: http://dud.inf.tu-dresden.de/AnonTerminology.shtml
-
(2009)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, V0.32
-
-
Pfitzmann, A.1
Hansen, M.2
-
24
-
-
84957800033
-
Towards measuring anonymity
-
Workshop on Privacy Enhancing Technologies, ser.
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Workshop on Privacy Enhancing Technologies, ser. LNCS, vol. 2482, 2002.
-
(2002)
LNCS
, vol.2482
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
25
-
-
84856155468
-
On adversary models and compositional security
-
A. Datta, J. Franklin, D. Garg, L. Jia, and D. Kaynar, "On adversary models and compositional security," Security Privacy, IEEE, vol. PP, no. 99, p. 1, 2010.
-
(2010)
Security Privacy, IEEE
, vol.PP
, Issue.99
, pp. 1
-
-
Datta, A.1
Franklin, J.2
Garg, D.3
Jia, L.4
Kaynar, D.5
-
26
-
-
84856190843
-
Towards a Generic Process for Security Pattern Integration
-
Springer
-
A. Fuchs, S. Gürgens, and C. Rudolph, "Towards a Generic Process for Security Pattern Integration," in Trust, Privacy and Security in Digital Business 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings. Springer, 2009.
-
(2009)
Trust, Privacy and Security in Digital Business 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings
-
-
Fuchs, A.1
Gürgens, S.2
Rudolph, C.3
-
27
-
-
84856141799
-
-
[Online]. Available
-
The Trusted Computing Group, 2011. [Online]. Available: https: //www.trustedcomputinggroup.org/
-
(2011)
-
-
-
28
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ser. CCS '06. New York, NY, USA: ACM
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM conference on Computer and communications security, ser. CCS '06. New York, NY, USA: ACM, 2006, pp. 89-98.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
29
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems." in TCC, 2009, pp. 457-473.
-
(2009)
TCC
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
31
-
-
24944578141
-
Enterprise privacy authorization language (epal 1.2)
-
P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter, "Enterprise privacy authorization language (epal 1.2)," IBM, 2003.
-
(2003)
IBM
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
32
-
-
34548016110
-
Privacy-aware role based access control
-
ser. SACMAT '07. New York, NY, USA: ACM
-
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, "Privacy-aware role based access control," in Proceedings of the 12th ACM symposium on Access control models and technologies, ser. SACMAT '07. New York, NY, USA: ACM, 2007, pp. 41-50.
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
33
-
-
84945135810
-
An efficient system for nontransferable anonymous credentials with optional anonymity revocation
-
Advances in Cryptology EUROCRYPT 2001, ser. B. Pfitzmann, Ed. Springer Berlin / Heidelberg
-
J. Camenisch and A. Lysyanskaya, "An efficient system for nontransferable anonymous credentials with optional anonymity revocation,"in Advances in Cryptology EUROCRYPT 2001, ser. Lecture Notes in Computer Science, B. Pfitzmann, Ed. Springer Berlin / Heidelberg, 2001, vol. 2045, pp. 93-118.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
35
-
-
74049137084
-
Oblivious transfer with access control
-
ser. CCS '09. New York, NY, USA: ACM
-
J. Camenisch, M. Dubovitskaya, and G. Neven, "Oblivious transfer with access control," in Proceedings of the 16th ACM conference on Computer and communications security, ser. CCS '09. New York, NY, USA: ACM, 2009, pp. 131-140.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 131-140
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
-
36
-
-
0032201622
-
Private information retrieval
-
November
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," J. ACM, vol. 45, pp. 965-981, November 1998.
-
(1998)
J. ACM
, vol.45
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
37
-
-
77951688595
-
Differential privacy in new settings
-
C. Dwork, "Differential privacy in new settings," in SODA, 2010, pp. 174-183.
-
(2010)
SODA
, pp. 174-183
-
-
Dwork, C.1
-
38
-
-
33749001998
-
Anonymous yet accountable access control
-
ser. WPES '05. New York: ACM
-
M. Backes, J. Camenisch, and D. Sommer, "Anonymous yet accountable access control," in Proc. of the 2005 ACM workshop on Privacy in the electronic society, ser. WPES '05. New York: ACM, 2005, pp. 40-46.
-
(2005)
Proc. of the 2005 ACM Workshop on Privacy in the Electronic Society
, pp. 40-46
-
-
Backes, M.1
Camenisch, J.2
Sommer, D.3
-
39
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
October
-
L. Sweeney, "k-anonymity: a model for protecting privacy," Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, pp. 557-570, October 2002.
-
(2002)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst.
, vol.10
, pp. 557-570
-
-
Sweeney, L.1
-
40
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
N. Li, T. Li, and S. Venkatasubramanian, "t-closeness: Privacy beyond k-anonymity and l-diversity," in In ICDE, 2007.
-
(2007)
ICDE
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
41
-
-
80051651344
-
Privacy for smart meters: Towards undetectable appliance load signatures
-
G. Kalogridis, C. Efthymiou, S. Denic, T. Lewis, and R. Cepeda, "Privacy for smart meters: Towards undetectable appliance load signatures,"in Smart Grid Communications, 2010 First IEEE International Conference on, oct. 2010, pp. 232-237.
-
Smart Grid Communications, 2010 First IEEE International Conference on, Oct. 2010
, pp. 232-237
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.3
Lewis, T.4
Cepeda, R.5
-
42
-
-
34548301953
-
Pda: Privacy-preserving data aggregation in wireless sensor networks
-
W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, "Pda: Privacy-preserving data aggregation in wireless sensor networks," in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, May 2007, pp. 2045-2053.
-
INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, May 2007
, pp. 2045-2053
-
-
He, W.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
43
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, oct. 2010, pp. 327-332.
-
Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, Oct. 2010
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
44
-
-
77249089045
-
Pbes: A policy based encryption system with application to data sharing in the power grid
-
ser. ASIACCS '09. New York, NY, USA: ACM
-
R. Bobba, H. Khurana, M. AlTurki, and F. Ashraf, "Pbes: a policy based encryption system with application to data sharing in the power grid," in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ser. ASIACCS '09. New York, NY, USA: ACM, 2009, pp. 262-275.
-
(2009)
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
, pp. 262-275
-
-
Bobba, R.1
Khurana, H.2
AlTurki, M.3
Ashraf, F.4
-
45
-
-
78649311656
-
Enhanced privacy id from bilinear pairing for hardware authentication and attestation
-
0
-
E. Brickell and J. Li, "Enhanced privacy id from bilinear pairing for hardware authentication and attestation," Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on, vol. 0, pp. 768-775, 2010.
-
(2010)
Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on
, pp. 768-775
-
-
Brickell, E.1
Li, J.2
-
46
-
-
80051646795
-
Smart grid privacy via anonymization of smart metering data
-
C. Efthymiou and G. Kalogridis, "Smart grid privacy via anonymization of smart metering data," in Smart Grid Communications, 2010 First IEEE International Conference on, oct. 2010, pp. 238-243.
-
Smart Grid Communications, 2010 First IEEE International Conference on, Oct. 2010
, pp. 238-243
-
-
Efthymiou, C.1
Kalogridis, G.2
-
48
-
-
74549203914
-
A framework for safely publishing communication traces
-
ser. CIKM '09. New York, NY, USA: ACM
-
A. Parate and G. Miklau, "A framework for safely publishing communication traces," in Proceeding of the 18th ACM conference on Information and knowledge management, ser. CIKM '09. New York, NY, USA: ACM, 2009, pp. 1469-1472.
-
(2009)
Proceeding of the 18th ACM Conference on Information and Knowledge Management
, pp. 1469-1472
-
-
Parate, A.1
Miklau, G.2
-
49
-
-
79955806530
-
User-Centric Privacy-Enhancing Identity Management
-
Digital Privacy, ser. J. Camenisch, R. Leenes, and D. Sommer, Eds. Springer Berlin / Heidelberg
-
B. Priem, E. Kosta, A. Kuczerawy, J. Dumortier, and R. Leenes, "User-Centric Privacy-Enhancing Identity Management," in Digital Privacy, ser. Lecture Notes in Computer Science, J. Camenisch, R. Leenes, and D. Sommer, Eds. Springer Berlin / Heidelberg, 2011, vol. 6545, pp. 91-106.
-
(2011)
Lecture Notes in Computer Science
, vol.6545
, pp. 91-106
-
-
Priem, B.1
Kosta, E.2
Kuczerawy, A.3
Dumortier, J.4
Leenes, R.5
-
50
-
-
45849084997
-
Addressing legal requirements in requirements engineering
-
P. Otto and A. Anton, "Addressing legal requirements in requirements engineering," in Requirements Engineering Conference, 2007. RE '07. 15th IEEE International, oct. 2007, pp. 5-14.
-
Requirements Engineering Conference, 2007. RE '07. 15th IEEE International, Oct. 2007
, pp. 5-14
-
-
Otto, P.1
Anton, A.2
-
51
-
-
78650209519
-
Experiences in the logical specification of the hipaa and glba privacy laws
-
ser. WPES '10. New York: ACM
-
H. DeYoung, D. Garg, L. Jia, D. Kaynar, and A. Datta, "Experiences in the logical specification of the hipaa and glba privacy laws," in Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, ser. WPES '10. New York: ACM, 2010, pp. 73-82.
-
(2010)
Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society
, pp. 73-82
-
-
DeYoung, H.1
Garg, D.2
Jia, L.3
Kaynar, D.4
Datta, A.5
-
53
-
-
77951450978
-
Data disclosure risk evaluation
-
S. Trabelsi, V. Salzgeber, M. Bezzi, and G. Montagnon, "Data disclosure risk evaluation," in Risks and Security of Internet and Systems (CRiSIS), 2009 Fourth International Conference on, oct. 2009, pp. 35-72.
-
Risks and Security of Internet and Systems (CRiSIS), 2009 Fourth International Conference on, Oct. 2009
, pp. 35-72
-
-
Trabelsi, S.1
Salzgeber, V.2
Bezzi, M.3
Montagnon, G.4
-
54
-
-
84856151758
-
A logical method for policy enforcement over evolving audit logs
-
vol. abs/1102.2521
-
D. Garg, L. Jia, and A. Datta, "A logical method for policy enforcement over evolving audit logs," CoRR, vol. abs/1102.2521, 2011.
-
(2011)
CoRR
-
-
Garg, D.1
Jia, L.2
Datta, A.3
-
55
-
-
80052648896
-
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions
-
R. Berthier, W. Sanders, and H. Khurana, "Intrusion detection for advanced metering infrastructures: Requirements and architectural directions,"in Smart Grid Communications, 2010 First IEEE International Conference on, oct. 2010, pp. 350-355.
-
Smart Grid Communications, 2010 First IEEE International Conference on, Oct. 2010
, pp. 350-355
-
-
Berthier, R.1
Sanders, W.2
Khurana, H.3
-
56
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requirements Engineering, vol. 16, pp. 3-32, 2011.
-
(2011)
Requirements Engineering
, vol.16
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
57
-
-
56349121964
-
Towards the development of privacy-aware systems
-
February
-
P. Guarda and N. Zannone, "Towards the development of privacy-aware systems," Inf. Softw. Technol., vol. 51, pp. 337-350, February 2009.
-
(2009)
Inf. Softw. Technol.
, vol.51
, pp. 337-350
-
-
Guarda, P.1
Zannone, N.2
-
59
-
-
39749178297
-
Unified architecture for large-scale attested metering
-
Big Island. ACM
-
M. LeMay, G. Gross, C. A. Gunter, and S. Garg, "Unified architecture for large-scale attested metering," in in Hawaii International Conference on System Sciences. Big Island. ACM, 2007.
-
(2007)
Hawaii International Conference on System Sciences
-
-
LeMay, M.1
Gross, G.2
Gunter, C.A.3
Garg, S.4
|