메뉴 건너뛰기




Volumn 141, Issue 1, 2015, Pages

Achievable privacy in aggregate residential energy management systems

Author keywords

Demand response; Entropy; Privacy; Scheduling; Utility

Indexed keywords

AGGREGATES; BANDWIDTH; DATA PRIVACY; ECONOMIC AND SOCIAL EFFECTS; ENERGY MANAGEMENT; ENTROPY; INFORMATION MANAGEMENT; QUALITY OF SERVICE; SCHEDULING;

EID: 84923198334     PISSN: 07339402     EISSN: None     Source Type: Journal    
DOI: 10.1061/(ASCE)EY.1943-7897.0000185     Document Type: Article
Times cited : (4)

References (23)
  • 1
    • 0015376113 scopus 로고
    • Computation of channel capacity and rate-distortion functions
    • Blahut, R. E. (1972). "Computation of channel capacity and rate-distortion functions." IEEE Trans. Inform. Theor., 18(4), 460-473.
    • (1972) IEEE Trans. Inform. Theor. , vol.18 , Issue.4 , pp. 460-473
    • Blahut, R.E.1
  • 2
    • 84923179444 scopus 로고    scopus 로고
    • California Public Utilities Commission Jul. 28, 2011
    • California Public Utilities Commission (PUC). (2011). "Decision 11-07-056." California Public Utilities Commission 〈http://www.cpuc.ca.gov/NR/rdonlyres/56281147-02B8-42FC-A768-1448ED18373C/0/SCESmartGridAnnualPrivacyReport2013.pdf〉 (Jul. 28, 2011).
    • (2011) Decision 11-07-056
  • 4
    • 84954409133 scopus 로고    scopus 로고
    • Mixminion: Design of a type III anonymous remailer protocol
    • IEEE Computer Society, Washington, DC
    • Danezis, G., Dingledine, R., and Mathewson, N. (2003). "Mixminion: Design of a type III anonymous remailer protocol." Proc., 2003 Symp. on Security and Privacy, IEEE Computer Society, Washington, DC, 2-15.
    • (2003) Proc., 2003 Symp. on Security and Privacy , pp. 2-15
    • Danezis, G.1    Dingledine, R.2    Mathewson, N.3
  • 5
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Automata, Languages and Programming Springer, Berlin
    • Dwork, C. (2006). "Differential privacy." Automata, languages and programming, lecture notes in computer science, Vol. 4052, Springer, Berlin, 1-12.
    • (2006) Lecture Notes in Computer Science , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 8
    • 80155178384 scopus 로고    scopus 로고
    • Control mechanisms for residential electricity demand in smart grids
    • IEEE Communications Society, Gaithersburg, MD
    • Kishore, S., and Snyder, L. V. (2010). " Control mechanisms for residential electricity demand in smart grids." Proc., IEEE 1st Int. Conf. on Smart Grid Communications, IEEE Communications Society, Gaithersburg, MD, 443-448.
    • (2010) Proc., IEEE 1st Int. Conf. on Smart Grid Communications , pp. 443-448
    • Kishore, S.1    Snyder, L.V.2
  • 9
    • 80051631772 scopus 로고    scopus 로고
    • Secure information aggregation for smart grids using homomorphic encryption
    • IEEE Communications Society
    • Li, F., Luo, B., and Liu, P. (2010). "Secure information aggregation for smart grids using homomorphic encryption." Proc., IEEE 1st Int. Conf. on Smart Grid Communications, IEEE Communications Society, 327-332.
    • (2010) Proc., IEEE 1st Int. Conf. on Smart Grid Communications , pp. 327-332
    • Li, F.1    Luo, B.2    Liu, P.3
  • 13
    • 77954711910 scopus 로고    scopus 로고
    • Differentially private aggregation of distributed time-series with transformation and encryption
    • SCITEPRESS Digital Library
    • Rastogi, V., and Nath, S. (2010). "Differentially private aggregation of distributed time-series with transformation and encryption." Proc., 2010 Int. Conf. Data Management, SCITEPRESS Digital Library, 735-746.
    • (2010) Proc., 2010 Int. Conf. Data Management , pp. 735-746
    • Rastogi, V.1    Nath, S.2
  • 14
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues and open problems
    • Designing Privacy Enhancing Technologies: Proc., Int. Workshop on Design Issues in Anonymity and Unobservability H. Federrath, ed. Springer, Berlin
    • Raymond, J.-F. (2001). "Traffic analysis: Protocols, attacks, design issues and open problems." Designing Privacy Enhancing Technologies: Proc., Int. Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science, H. Federrath, ed., Vol. 2009, Springer, Berlin, 10-29.
    • (2001) Lecture Notes in Computer Science , vol.2009 , pp. 10-29
    • Raymond, J.-F.1
  • 16
    • 19744377978 scopus 로고    scopus 로고
    • Passive-attack analysis for connection-based anonymity systems
    • Serjantov, A., and Sewell, P. (2005). "Passive-attack analysis for connection-based anonymity systems." Int. J. Inform. Secur., 4(3), 5262-5270.
    • (2005) Int. J. Inform. Secur. , vol.4 , Issue.3 , pp. 5262-5270
    • Serjantov, A.1    Sewell, P.2
  • 17
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C. E. (1949). "Communication theory of secrecy systems." Bell Syst. Tech. J., 28(4), 656-714.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-714
    • Shannon, C.E.1
  • 18
    • 0026237284 scopus 로고
    • Using appliance signatures for monitoring residential loads at meter panel level
    • Sultanem, F. (1991). "Using appliance signatures for monitoring residential loads at meter panel level." IEEE Trans. Power Delivery, 6(4), 1380-1385.
    • (1991) IEEE Trans. Power Delivery , vol.6 , Issue.4 , pp. 1380-1385
    • Sultanem, F.1
  • 19
    • 70349151031 scopus 로고    scopus 로고
    • DOE Office of Electricity Delivery and Energy Reliability Jun. 19
    • U.S. Department of Energy (DOE). (2009). "The smart grids: An introduction." DOE Office of Electricity Delivery and Energy Reliability 〈http://energy.gov/oe/downloads/smart-grid-introduction-0〉 (Jun. 19, 2013).
    • (2009) The Smart Grids: An Introduction
    • U.S. Department of Energy (DOE)1
  • 21
    • 80051653423 scopus 로고    scopus 로고
    • Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
    • IEEE Signal Processing Society
    • Varodayan, D., and Khisti, A. (2011). "Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage." Proc., IEEE Int. Conf. on Acoustics, Speech and Signal Processing, IEEE Signal Processing Society.
    • (2011) Proc., IEEE Int. Conf. on Acoustics, Speech and Signal Processing
    • Varodayan, D.1    Khisti, A.2
  • 22
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • Voydock, V. L., and Kent, S. T. (1983). "Security mechanisms in high-level network protocols." ACM Comput. Surv., 15(2), 135-171.
    • (1983) ACM Comput. Surv. , vol.15 , Issue.2 , pp. 135-171
    • Voydock, V.L.1    Kent, S.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.