-
1
-
-
79954610963
-
Smartprivacy for the smart grid: Embedding privacy into the design of electricity conservation
-
Cavoukian, A., Polonetsky, J., Wolf, C.: Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity Inf. Soc. 3, 275-294 (2010)
-
(2010)
Identity Inf. Soc
, vol.3
, pp. 275-294
-
-
Cavoukian, A.1
Polonetsky, J.2
Wolf, C.3
-
2
-
-
84893535590
-
Privacy issues of smart e-mobility
-
IEEE
-
Langer, L., Skopik, F., Kienesberger, G., Li, Q.: Privacy issues of smart e-mobility. In: 39th Annual Conference of the Industrial Electronics Society, IECON 2013, pp. 6682-6687. IEEE (2013)
-
(2013)
39Th Annual Conference of the Industrial Electronics Society, IECON 2013
, pp. 6682-6687
-
-
Langer, L.1
Skopik, F.2
Kienesberger, G.3
Li, Q.4
-
3
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7, 75-77 (2009)
-
(2009)
IEEE Secur. Priv
, vol.7
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
4
-
-
80053168238
-
An analysis of security and privacy issues in smart grid software architectures on clouds
-
IEEE
-
Simmhan, Y., Kumbhare, A., Cao, B., Prasanna, V.: An analysis of security and privacy issues in smart grid software architectures on clouds. In: IEEE International Conference on Cloud Computing (CLOUD 2011), pp. 582-589. IEEE (2011)
-
(2011)
IEEE International Conference on Cloud Computing (CLOUD 2011)
, pp. 582-589
-
-
Simmhan, Y.1
Kumbhare, A.2
Cao, B.3
Prasanna, V.4
-
6
-
-
84867770781
-
-
Release 2.0. Technical Report NIST Special Publication 1108R2. National Institute of Standards and Technology
-
National Institute of Standards and Technology: NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0. Technical Report NIST Special Publication 1108R2. National Institute of Standards and Technology (2012)
-
(2012)
NIST Framework and Roadmap for Smart Grid Interoperability Standards
-
-
-
7
-
-
84888597791
-
-
Technical report, CEN/Cenelec/ETSI Smart Grid Coordination Group Std
-
CEN, Cenelec and ETSI: Smart Grid Reference Architecture. Technical report, CEN/Cenelec/ETSI Smart Grid Coordination Group Std. (2012)
-
(2012)
Smart Grid Reference Architecture
-
-
-
8
-
-
84927792323
-
Towards a modeldriven- architecture process for smart grid projects
-
In: Benghozi, P.-J., Krob, D., Lonjon, A., Panetto, H. (eds.), Springer, Heidelberg
-
Dänekas, C., Neureiter, C., Rohjans, S., Uslar, M., Engel, D.: Towards a modeldriven- architecture process for smart grid projects. In: Benghozi, P.-J., Krob, D., Lonjon, A., Panetto, H. (eds.) DED & M 2014. AISC, vol. 261, pp. 47-58. Springer, Heidelberg (2014)
-
(2014)
DED & M 2014. AISC
, vol.261
, pp. 47-58
-
-
Dänekas, C.1
Neureiter, C.2
Rohjans, S.3
Uslar, M.4
Engel, D.5
-
9
-
-
79954605963
-
-
privacy and the smart grid. Technical report, The Smart Grid Interoperability Panel-Cyber Security Working Group
-
National Institute of Standards and Technology: Guidelines for smart grid cyber security, vol. 2, privacy and the smart grid. Technical report, The Smart Grid Interoperability Panel-Cyber Security Working Group (2010)
-
(2010)
Guidelines for Smart Grid Cyber Security
, vol.2
-
-
-
10
-
-
84883389151
-
-
Technical report, CEN/Cenelec/ETSI Smart Grid Coordination Group Std
-
CEN, Cenelec and ETSI: Smart Grid Information Security. Technical report, CEN/Cenelec/ETSI Smart Grid Coordination Group Std. (2012)
-
(2012)
Smart Grid Information Security
-
-
-
11
-
-
78751642043
-
Privacy-aware design principles for information networks
-
Wicker, S., Schrader, D.: Privacy-aware design principles for information networks. Proc. IEEE 99, 330-350 (2011)
-
(2011)
Proc. IEEE
, vol.99
, pp. 330-350
-
-
Wicker, S.1
Schrader, D.2
-
12
-
-
70350674935
-
A data privacy taxonomy
-
In: Sexton, A.P. (ed.), Springer, Heidelberg
-
Barker, K., Askari, M., Banerjee, M., Ghazinour, K., Mackas, B., Majedi, M., Pun, S., Williams, A.: A data privacy taxonomy. In: Sexton, A.P. (ed.) BNCOD 26. LNCS, vol. 5588, pp. 42-54. Springer, Heidelberg (2009)
-
(2009)
BNCOD 26. LNCS
, vol.5588
, pp. 42-54
-
-
Barker, K.1
Askari, M.2
Banerjee, M.3
Ghazinour, K.4
Mackas, B.5
Majedi, M.6
Pun, S.7
Williams, A.8
-
13
-
-
34548166079
-
Towards an ontology-based risk assessment in collaborative environment using the semanticlife
-
Washington, D.C
-
Ahmed, M., Anjomshoaa, A., Nguyen, T., Tjoa, A.: Towards an ontology-based risk assessment in collaborative environment using the semanticlife. In: Proceedings of the Second International Conference on Availability, Reliability and Security, ARES 2007. IEEE Computer Society, Washington, D.C., pp. 400-407 (2007)
-
(2007)
Proceedings of the Second International Conference on Availability, Reliability and Security, ARES 2007. IEEE Computer Society
, pp. 400-407
-
-
Ahmed, M.1
Anjomshoaa, A.2
Nguyen, T.3
Tjoa, A.4
-
14
-
-
80455162330
-
Privacy verification using ontologies
-
IEEE Computer Society, Washington, D.C
-
Kost, M., Freytag, J.C., Kargl, F., Kung, A.: Privacy verification using ontologies. In: Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, ARES 2011, pp. 627-632. IEEE Computer Society, Washington, D.C. (2011)
-
(2011)
Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, ARES 2011
, pp. 627-632
-
-
Kost, M.1
Freytag, J.C.2
Kargl, F.3
Kung, A.4
-
15
-
-
84888862906
-
Privacy analysis using ontologies
-
San Antonio, Texas, USA, ACM
-
Kost, M., Freytag, J.C.: Privacy analysis using ontologies. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, Texas, USA, pp. 205-2016. ACM (2012)
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012
, pp. 205-2016
-
-
Kost, M.1
Freytag, J.C.2
-
16
-
-
84919473849
-
Go with the flow: Toward workflow-oriented security assessment
-
Banff, Canada
-
Chen, B., Kalbarczyk, Z., Nicol, D., Sanders, W., Tan, R., Temple, W., Tippenhauer, N., Vu, A., Yau, D.: Go with the flow: toward workflow-oriented security assessment. In: Proceedings of New Security Paradigm Workshop (NSPW), Banff, Canada (2013)
-
(2013)
Proceedings of New Security Paradigm Workshop (NSPW)
-
-
Chen, B.1
Kalbarczyk, Z.2
Nicol, D.3
Sanders, W.4
Tan, R.5
Temple, W.6
Tippenhauer, N.7
Vu, A.8
Yau, D.9
-
17
-
-
84939200228
-
Model-based assessment for balancing privacy requirements and operational capabilities in the smart grid
-
Washington, D.C., USA
-
Knirsch, F., Engel, D., Frincu, M., Prasanna, V.: Model-based assessment for balancing privacy requirements and operational capabilities in the smart grid. In: Proceedings of the 6th Conference on Innovative Smart Grid Technologies (ISGT 2015), 2015 IEEE Power & Energy Society,Washington, D.C., USA, pp. 1-5 (2015)
-
(2015)
Proceedings of the 6Th Conference on Innovative Smart Grid Technologies (ISGT 2015), 2015 IEEE Power & Energy Society,
, pp. 1-5
-
-
Knirsch, F.1
Engel, D.2
Frincu, M.3
Prasanna, V.4
-
18
-
-
84885817347
-
Hermit: A highly-efficient owl reasoner
-
Dolbear, C., Ruttenberg, A., Sattler, U. (eds.) OWLED, CEUR-WS.org
-
Shearer, R., Motik, B., Horrocks, I.: Hermit: a highly-efficient owl reasoner. In: Dolbear, C., Ruttenberg, A., Sattler, U. (eds.) OWLED, vol. 432. CEURWorkshop Proceedings. CEUR-WS.org (2008)
-
(2008)
Ceurworkshop Proceedings
, vol.432
-
-
Shearer, R.1
Motik, B.2
Horrocks, I.3
-
19
-
-
84893560424
-
Towards a framework for engineering smart-grid-speficic privacy requirements
-
Vienna, Austria. IEEE
-
Neureiter, C., Eibl, G., Veichtlbauer, A., Engel, D.: Towards a framework for engineering smart-grid-speficic privacy requirements. In: Proceedings of IEEE IECON 2013, Special Session on Energy Informatics, Vienna, Austria. IEEE (2013)
-
(2013)
Proceedings of IEEE IECON 2013, Special Session on Energy Informatics
-
-
Neureiter, C.1
Eibl, G.2
Veichtlbauer, A.3
Engel, D.4
-
20
-
-
69049092602
-
What is an ontology
-
In: Staab, S., Studer, R. (eds.), 2nd edn, Springer, Heidelberg
-
Guarino, N., Oberle, D., Staab, S.: What is an ontology? In: Staab, S., Studer, R. (eds.) Handbook on Ontologies. International Handbooks on Information Systems, 2nd edn, pp. 1-17. Springer, Heidelberg (2009)
-
(2009)
Handbook on Ontologies. International Handbooks on Information Systems
, pp. 1-17
-
-
Guarino, N.1
Oberle, D.2
Staab, S.3
-
21
-
-
84955273100
-
-
Official Journal L 281, 23/11/1995 P. 0031-0050-Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995. Online
-
The European Parliament and the Council: Official Journal L 281, 23/11/1995 P. 0031-0050-Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995. Online (1995)
-
(1995)
-
-
-
22
-
-
84863947604
-
Semantic information integration for smart grid applications
-
In: Kim, J.H., Lee, M.J. (eds.), Springer, Heidelberg
-
Simmhan, Y., Zhou, Q., Prasanna, V.: Semantic information integration for smart grid applications. In: Kim, J.H., Lee, M.J. (eds.) Green IT: Technologies and Applications, pp. 361-380. Springer, Heidelberg (2011)
-
(2011)
Green IT: Technologies and Applications
, pp. 361-380
-
-
Simmhan, Y.1
Zhou, Q.2
Prasanna, V.3
-
23
-
-
84863947604
-
Semantic information integration for smart grid applications
-
In: Kim, J.H., Lee, M.J. (eds.), Springer, Heidelberg
-
Simmhan, Y., Zhou, Q., Prasanna, V.: Semantic information integration for smart grid applications. In: Kim, J.H., Lee, M.J. (eds.) Green IT: Technologies and Applications, vol. 77, pp. 361-380. Springer, Heidelberg (2011)
-
(2011)
Green IT: Technologies and Applications
, vol.77
, pp. 361-380
-
-
Simmhan, Y.1
Zhou, Q.2
Prasanna, V.3
-
25
-
-
84955251639
-
-
eXtensible Access Control Markup Language (XACML) Version 3.0
-
Rissanen, E.: eXtensible Access Control Markup Language (XACML) Version 3.0 (2013). http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.pdf
-
(2013)
-
-
Rissanen, E.1
-
26
-
-
84876187528
-
Access control for a smart grid SOA
-
London, UK, IEEE
-
Jung, M., Hofer, T., Dbelt, S., Kienesberger, G., Judex, F., Kastner, W.: Access control for a smart grid SOA. In: Proceedings of the 7th IEEE Conference for Internet Technology and Secured Transactions, London, UK, pp. 281-287. IEEE (2012)
-
(2012)
Proceedings of the 7Th IEEE Conference for Internet Technology and Secured Transactions
, pp. 281-287
-
-
Jung, M.1
Hofer, T.2
Dbelt, S.3
Kienesberger, G.4
Judex, F.5
Kastner, W.6
|