-
1
-
-
85067755309
-
-
(in French)
-
Agence nationale de la sécurité des systèmes d'information: EBIOS 2010 – Expression of Needs and Identification of Security Objectives (2010) (in French).
-
(2010)
-
-
-
4
-
-
84902661429
-
Smart grid security: Threats, vulnerabilities and solutions
-
Aloul, F., Al-Ali, A.R., Al-Dalky, R., Al-Mardini, M., El-Hajj, W.: Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy 1(1), 1–6 (2012).
-
(2012)
International Journal of Smart Grid and Clean Energy
, vol.1
, Issue.1
, pp. 1-6
-
-
Aloul, F.1
Al-Ali, A.R.2
Al-Dalky, R.3
Al-Mardini, M.4
El-Hajj, W.5
-
6
-
-
84892427076
-
Common Criteria CompliAnt Software Development (CC-CASD)
-
ACM
-
Beckers, K., Côté, I., Hatebur, D., Fasbender, S., Heisel, M.: Common Criteria CompliAnt Software Development (CC-CASD). In: Proceedings of the 28th Symposium on Applied Computing, pp. 937–943. ACM (2013).
-
(2013)
Proceedings of the 28Th Symposium on Applied Computing
, pp. 937-943
-
-
Beckers, K.1
Côté, I.2
Hatebur, D.3
Fasbender, S.4
Heisel, M.5
-
7
-
-
84857324820
-
Supporting the development and documentation of ISO 27001 Information Security Management Systems through security requirements engineering approaches
-
In: Barthe, G., Livshits, B., Scandariato, R. (eds.), Springer, Heidelberg
-
Beckers, K., Fasbender, S., Heisel, M., Küster, J.-C., Schmidt, H.: Supporting the development and documentation of ISO 27001 Information Security Management Systems through security requirements engineering approaches. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 14–21. Springer, Heidelberg (2012).
-
(2012)
Essos 2012. LNCS
, vol.7159
, pp. 14-21
-
-
Beckers, K.1
Fasbender, S.2
Heisel, M.3
Küster, J.-C.4
Schmidt, H.5
-
8
-
-
84858326746
-
A pattern-based method for identifying and analyzing laws
-
In: Regnell, B., Damian, D. (eds.), Springer, Heidelberg
-
Beckers, K., Fasbender, S., Küster, J.-C., Schmidt, H.: A pattern-based method for identifying and analyzing laws. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol. 7195, pp. 256–262. Springer, Heidelberg (2012).
-
(2012)
REFSQ 2011. LNCS
, vol.7195
, pp. 256-262
-
-
Beckers, K.1
Fasbender, S.2
Küster, J.-C.3
Schmidt, H.4
-
9
-
-
84892423647
-
A problem-based threat analysis in compliance with Common Criteria
-
Beckers, K., Hatebur, D., Heisel, M.: A problem-based threat analysis in compliance with Common Criteria. In: Proceedings of the International Conference on Availability, Reliability and Security (ARES 2013), pp. 111–120 (2013).
-
(2013)
Proceedings of the International Conference on Availability, Reliability and Security (ARES 2013)
, pp. 111-120
-
-
Beckers, K.1
Hatebur, D.2
Heisel, M.3
-
10
-
-
84924959796
-
-
Tech. Rep. A25626, SINTEF ICT
-
Beckers, K., Heisel, M., Solhaug, B., Stolen, K.: ISMS-CORAS - A structured method for establishing an ISO 27001 compliant information security management system. Tech. Rep. A25626, SINTEF ICT (2013).
-
(2013)
ISMS-CORAS - a Structured Method for Establishing an ISO 27001 Compliant Information Security Management System
-
-
Beckers, K.1
Heisel, M.2
Solhaug, B.3
Stolen, K.4
-
13
-
-
85067779955
-
-
OpenNode project deliverable D1.2
-
Evaluation of general requirements according state of the art. OpenNode project deliverable D1.2 (2010).
-
(2010)
-
-
-
15
-
-
85067744815
-
-
(accessed January 21, 2014)
-
FREE ISO27k Toolkit, http://www.iso27001security.com/html/iso27k_toolkit.html (accessed January 21, 2014).
-
-
-
-
16
-
-
85067753635
-
-
OpenNode project deliverable D1.3
-
Functional use cases. OpenNode project deliverable D1.3 (2010).
-
(2010)
-
-
-
18
-
-
85067740595
-
-
International Organization for Standardization: ISO 31000 - Risk management – Principles and guidelines (2009).
-
(2009)
-
-
-
19
-
-
85067753412
-
-
International Organization for Standardization/International Electrotechnical Commission: ISO/IEC 27001 - Information technology - Security techniques - Information security management systems - Requirements (2005).
-
(2005)
-
-
-
20
-
-
85067761842
-
-
International Organization for Standardization/International Electrotechnical Commission: ISO/IEC 27005 - Information technology - Security techniques - Information security risk management (2008).
-
(2008)
-
-
-
21
-
-
85067764917
-
-
International Organization for Standardization/International Electrotechnical Commission: ISO/IEC 15408 – Common Criteria for Information Technology Security Evaluation (2009).
-
(2009)
-
-
-
23
-
-
85067751063
-
-
IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz. Vieweg+Teubner (2011) (in German)
-
Kersten, H., Reuter, J., Schröder, K.W.: IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz. Vieweg+Teubner (2011) (in German).
-
-
-
Kersten, H.1
Reuter, J.2
Schröder, K.W.3
-
24
-
-
85067744790
-
-
Information Security Risk Management mit ISO/IEC 27005: Risikomanagement mit ISO/IEC 27001, 27005 und 31010. Vieweg+Teubner, (in German)
-
Klipper, S.: Information Security Risk Management mit ISO/IEC 27005: Risikomanagement mit ISO/IEC 27001, 27005 und 31010. Vieweg+Teubner (2010) (in German).
-
(2010)
-
-
Klipper, S.1
-
25
-
-
84855937100
-
Smart metering under EU data protection law
-
Knyrim, R., Trieb, G.: Smart metering under EU data protection law. International Data Privacy Law 1(2), 121–128 (2011).
-
(2011)
International Data Privacy Law
, vol.1
, Issue.2
, pp. 121-128
-
-
Knyrim, R.1
Trieb, G.2
-
26
-
-
84860848088
-
-
Tech. Rep. BSI-CC-PP-0073, Federal Office for Information Security, version 1.2, Final Release
-
Kreutzmann, H., Vollmer, S.: Protection profile for the gateway of a smart metering system (Smart meter gateway PP). Tech. Rep. BSI-CC-PP-0073, Federal Office for Information Security, version 1.2, Final Release (2013).
-
(2013)
Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)
-
-
Kreutzmann, H.1
Vollmer, S.2
-
27
-
-
84875055161
-
Privacy-aware profiling and statistical data extraction for smart sustainable energy systems
-
Lin, H., Fang, Y.: Privacy-aware profiling and statistical data extraction for smart sustainable energy systems. IEEE Transactions on Smart Grid 4(1), 332–340 (2013).
-
(2013)
IEEE Transactions on Smart Grid
, vol.4
, Issue.1
, pp. 332-340
-
-
Lin, H.1
Fang, Y.2
-
29
-
-
80455140332
-
Information security integral engineering technique and its application in ISMS design
-
IEEE Computer Society
-
Lyubimov, A., Cheremushkin, D., Andreeva, N., Shustikov, S.: Information security integral engineering technique and its application in ISMS design. In: Sixth International Conference on Availability, Reliability and Security (ARES 2011), pp. 585–590. IEEE Computer Society (2011).
-
(2011)
Sixth International Conference on Availability, Reliability and Security (ARES 2011)
, pp. 585-590
-
-
Lyubimov, A.1
Cheremushkin, D.2
Reeva, N.3
Shustikov, S.4
-
31
-
-
33750950652
-
A comparison of the Common Criteria with proposals of information systems security requirements
-
IEEE Computer Society
-
Mellado, D., Fernandez-Medina, E., Piattini, M.: A comparison of the Common Criteria with proposals of information systems security requirements. In: The First International Conference on Availability, Reliability and Security (ARES 2006), pp. 654–661. IEEE Computer Society (2006).
-
(2006)
The First International Conference on Availability, Reliability and Security (ARES 2006)
, pp. 654-661
-
-
Mellado, D.1
Fernandez-Medina, E.2
Piattini, M.3
-
32
-
-
33750273034
-
Applying a security requirements engineering process
-
In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.), Springer, Heidelberg
-
Mellado, D., Fernández-Medina, E., Piattini, M.: Applying a security requirements engineering process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 192–206. Springer, Heidelberg (2006).
-
(2006)
ESORICS 2006. LNCS
, vol.4189
, pp. 192-206
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
33
-
-
85067744252
-
-
Microsoft Solutions for Security and Compliance and Microsoft Security Center of Excellence: The Security Risk Management Guide (2006).
-
(2006)
-
-
-
35
-
-
85067764428
-
-
(accessed December 19, 2013)
-
Network of Excellence on Engineering Secure Future Internet Software Services and Systems (NESSoS), http://www.nessos-project.eu/ (accessed December 19, 2013).
-
-
-
-
36
-
-
85067744309
-
-
Superstructure. Version 2.3, OMG Document: formal/2010-05-03
-
Object Management Group: OMG Unified Modeling Language (OMG UML), Superstructure. Version 2.3, OMG Document: formal/2010-05-03 (2010).
-
(2010)
-
-
-
37
-
-
60949097689
-
Experimental comparison of attack trees and misuse cases for security threat identification
-
Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Inf. Softw. Technol. 51, 916–932 (2009).
-
(2009)
Inf. Softw. Technol
, vol.51
, pp. 916-932
-
-
Opdahl, A.L.1
Sindre, G.2
-
39
-
-
84924958432
-
-
Tech. rep., Karlsruher Institut für Technologie, KIT, (in German)
-
Raabe, O., Lorenz, M., Pallas, F., Weis, E.: Datenschutz im Smart Grid und in der Elektromobilität. Tech. rep., Karlsruher Institut für Technologie, KIT (2011) (in German).
-
(2011)
Datenschutz Im Smart Grid Und in Der Elektromobilität
-
-
Raabe, O.1
Lorenz, M.2
Pallas, F.3
Weis, E.4
-
40
-
-
85067775113
-
-
OPEN meter project deliverable D1.1
-
Report on the identification and specification of functional, technical, economical and general requirements of advanced multi-metering infrastructure, including security requirements. OPEN meter project deliverable D1.1 (2009).
-
(2009)
-
-
-
41
-
-
84877938074
-
At home with agents: Exploring attitudes towards future smart energy infrastructures
-
ACM
-
Rodden, T.A., Fischer, J.E., Pantidi, N., Bachour, K., Moran, S.: At home with agents: Exploring attitudes towards future smart energy infrastructures. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 1173–1182. ACM (2013).
-
(2013)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013
, pp. 1173-1182
-
-
Rodden, T.A.1
Fischer, J.E.2
Pantidi, N.3
Bachour, K.4
Moran, S.5
-
42
-
-
85067745061
-
-
(accessed: January 15, 2013)
-
Siemens: CRAMM - The total information security toolkit, http://www.cramm.com/ (accessed: January 15, 2013).
-
-
-
-
43
-
-
85067774660
-
-
(accessed December 19, 2013)
-
Siemens: No longer a one-way street, http://www.siemens.com/innovation/apps/pofmicrosite/ pof-spring-2011/html en/smart-grids.html (accessed December 19, 2013).
-
-
-
-
46
-
-
84881138235
-
An approach to select cost-effective risk countermeasures
-
In: Wang, L., Shafiq, B. (eds.), Springer, Heidelberg
-
Tran, L.M.S., Solhaug, B., Stolen, K.: An approach to select cost-effective risk countermeasures. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 266–273. Springer, Heidelberg (2013).
-
(2013)
Dbsec 2013. LNCS
, vol.7964
, pp. 266-273
-
-
Tran, L.1
Solhaug, B.2
Stolen, K.3
-
47
-
-
85067757021
-
-
(accessed January 21, 2014)
-
verinice, http://www.verinice.org (accessed January 21, 2014).
-
-
-
|