-
1
-
-
85063420558
-
-
London, U.K.: Chapman & Hall, ch. 7
-
T. Yu, N. Chawla, and S. Simoff, Eds., Computational Intelligent Data Analysis for Sustainable Development. London, U.K.: Chapman & Hall, 2013, ch. 7.
-
(2013)
Computational Intelligent Data Analysis for Sustainable Development
-
-
Yu, T.1
Chawla, N.2
Simoff, S.3
-
2
-
-
84933043595
-
A secure cloud computing based framework for big data information management of smart grid
-
Apr./Jun.
-
J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, "A secure cloud computing based framework for big data information management of smart grid," IEEE Trans. Cloud Comput., vol. 3, no. 2, pp. 233-244, Apr./Jun. 2015.
-
(2015)
IEEE Trans. Cloud Comput.
, vol.3
, Issue.2
, pp. 233-244
-
-
Baek, J.1
Vu, Q.H.2
Liu, J.K.3
Huang, X.4
Xiang, Y.5
-
4
-
-
84893390194
-
An efficient privacy preserving scheme of high frequency reports for secure smart grid communications
-
Oct./Nov.
-
S. H. M. Zargar and M. H. Yaghmaee, "An efficient privacy preserving scheme of high frequency reports for secure smart grid communications," in Proc. 3rd Int. Conf. Comput. Knowl. Eng. (ICCKE), Oct./Nov. 2013, pp. 368-373.
-
(2013)
Proc. 3rd Int. Conf. Comput. Knowl. Eng. (ICCKE)
, pp. 368-373
-
-
Zargar, S.H.M.1
Yaghmaee, M.H.2
-
5
-
-
84866928541
-
A privacy preserving smart metering system supporting multiple time granularities
-
Jun.
-
H.-Y. Lin, S.-T. Shen, and B. P. Lin, "A privacy preserving smart metering system supporting multiple time granularities," in Proc. IEEE 6th Int. Conf. Softw. Secur. Rel. Companion (SERE-C), Jun. 2012, pp. 119-126.
-
(2012)
Proc. IEEE 6th Int. Conf. Softw. Secur. Rel. Companion (SERE-C)
, pp. 119-126
-
-
Lin, H.-Y.1
Shen, S.-T.2
Lin, B.P.3
-
8
-
-
84877957864
-
Big data for all: Privacy and user control in the age of analytics
-
Apr.
-
O. Tene and J. Polonetsky, "Big data for all: Privacy and user control in the age of analytics," Northwestern J. Technol. Intellectual Property, vol. 11, no. 1, p. 27, Apr. 2013.
-
(2013)
Northwestern J. Technol. Intellectual Property
, vol.11
, Issue.1
, pp. 27
-
-
Tene, O.1
Polonetsky, J.2
-
9
-
-
84897791696
-
Beyond big data
-
H. R. Varian, "Beyond big data," Bus. Econ., vol. 49, no. 1, pp. 27-31, 2014.
-
(2014)
Bus. Econ.
, vol.49
, Issue.1
, pp. 27-31
-
-
Varian, H.R.1
-
10
-
-
79959920329
-
Impact of privacy concerns on consumers' acceptance of smart metering in The Netherlands
-
Apr.
-
L. AlAbdulkarim and S. Lukszo, "Impact of privacy concerns on consumers' acceptance of smart metering in The Netherlands," in Proc. IEEE Int. Conf. Netw., Sens. Control (ICNSC), Apr. 2011, pp. 287-292.
-
(2011)
Proc. IEEE Int. Conf. Netw., Sens. Control (ICNSC)
, pp. 287-292
-
-
AlAbdulkarim, L.1
Lukszo, S.2
-
11
-
-
84859821912
-
Smart metering in power grids: Application scenarios and security
-
Nov.
-
A. Barenghi, G. M. Bertoni, L. Breveglieri, M. G. Fugini, and G. Pelosi, "Smart metering in power grids: Application scenarios and security," in Proc. IEEE PES Innov. Smart Grid Technol. Asia (ISGT), Nov. 2011, pp. 1-8.
-
(2011)
Proc. IEEE PES Innov. Smart Grid Technol. Asia (ISGT)
, pp. 1-8
-
-
Barenghi, A.1
Bertoni, G.M.2
Breveglieri, L.3
Fugini, M.G.4
Pelosi, G.5
-
12
-
-
80051651344
-
Privacy for smart meters: Towards undetectable appliance load signatures
-
Oct.
-
G. Kalogridis, C. Efthymiou, S. Z. Denic, T. A. Lewis, and R. Cepeda, "Privacy for smart meters: Towards undetectable appliance load signatures," in Proc. IEEE SmartGridComm, Oct. 2010, pp. 232-237.
-
(2010)
Proc. IEEE SmartGridComm
, pp. 232-237
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.Z.3
Lewis, T.A.4
Cepeda, R.5
-
13
-
-
78650887542
-
Private memoirs of a smart meter
-
Zürich, Switzerland, Nov.
-
A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin, "Private memoirs of a smart meter," in Proc. ACM BuildSys, Zürich, Switzerland, Nov. 2010, pp. 61-66.
-
(2010)
Proc. ACM BuildSys
, pp. 61-66
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
14
-
-
84908276461
-
Multimedia content identification through smart meter power usage profiles
-
U. Greveler, B. Justus, and D. Loehr, "Multimedia content identification through smart meter power usage profiles," in Proc. Comput., Privacy Data Protection, 2012, pp. 1-10.
-
(2012)
Proc. Comput., Privacy Data Protection
, pp. 1-10
-
-
Greveler, U.1
Justus, B.2
Loehr, D.3
-
15
-
-
84883332180
-
A survey on cyber security for smart grid communications
-
Oct.
-
Y. Yan et al., "A survey on cyber security for smart grid communications," IEEE Commun. Surveys Tuts., vol. 14, no. 4, pp. 998-1010, Oct. 2012.
-
(2012)
IEEE Commun. Surveys Tuts.
, vol.14
, Issue.4
, pp. 998-1010
-
-
Yan, Y.1
-
16
-
-
77249154055
-
Inferring personal information from demand-response systems
-
Jan./Feb.
-
M. A. Lisovich, D. K. Mulligan, and S. B. Wicker, "Inferring personal information from demand-response systems," IEEE Security Privacy, vol. 8, no. 1, pp. 11-20, Jan./Feb. 2010.
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.1
, pp. 11-20
-
-
Lisovich, M.A.1
Mulligan, D.K.2
Wicker, S.B.3
-
17
-
-
84886466952
-
From a barrier to a bridge: Data-privacy in deregulated smart grids
-
Orlando, FL, USA
-
J. Strüker and F. Kerschbaum, "From a barrier to a bridge: Data-privacy in deregulated smart grids," in Proc. 33rd Int. Conf. Inf. Syst., Orlando, FL, USA, 2012, pp. 1-15.
-
(2012)
Proc. 33rd Int. Conf. Inf. Syst.
, pp. 1-15
-
-
Strüker, J.1
Kerschbaum, F.2
-
18
-
-
84870644156
-
Intermediaries for the Internet of energy - Exchanging smart meter data as a business model
-
paper 103
-
J. Strüker, H. Weppner, and G. Bieser, "Intermediaries for the Internet of energy - Exchanging smart meter data as a business model," in Proc. ECIS, 2011, pp. 1-13, paper 103.
-
(2011)
Proc. ECIS
, pp. 1-13
-
-
Strüker, J.1
Weppner, H.2
Bieser, G.3
-
19
-
-
78149274300
-
AERO: Extraction of user's activities from electric power consumption data
-
Aug.
-
H. S. Cho, T. Yamazaki, and M. Hahn, "AERO: Extraction of user's activities from electric power consumption data," IEEE Trans. Consum. Electron., vol. 56, no. 3, pp. 2011-2018, Aug. 2010.
-
(2010)
IEEE Trans. Consum. Electron.
, vol.56
, Issue.3
, pp. 2011-2018
-
-
Cho, H.S.1
Yamazaki, T.2
Hahn, M.3
-
20
-
-
84864296248
-
Knowledge-empowered agent information system for privacy payoff in eCommerce
-
Aug.
-
A. Yassine, A. A. N. Shirehjini, S. Shirmohammadi, and T. T. Tran, "Knowledge-empowered agent information system for privacy payoff in eCommerce," Knowl. Inf. Syst., vol. 32, no. 2, pp. 445-473, Aug. 2012.
-
(2012)
Knowl. Inf. Syst.
, vol.32
, Issue.2
, pp. 445-473
-
-
Yassine, A.1
Shirehjini, A.A.N.2
Shirmohammadi, S.3
Tran, T.T.4
-
21
-
-
78651557638
-
A business privacy model for virtual communities
-
Mar.
-
A. Yassine and S. Shirmohammadi, "A business privacy model for virtual communities," Int. J. Web Based Commun., vol. 5, no. 2, pp. 313-335, Mar. 2009.
-
(2009)
Int. J. Web Based Commun.
, vol.5
, Issue.2
, pp. 313-335
-
-
Yassine, A.1
Shirmohammadi, S.2
-
22
-
-
84930090029
-
Pricing private data
-
Jun.
-
V. Gkatzelis, C. Aperjis, and B. A. Huberman, "Pricing private data," Electron. Markets, vol. 25, no. 2, pp. 109-123, Jun. 2015.
-
(2015)
Electron. Markets
, vol.25
, Issue.2
, pp. 109-123
-
-
Gkatzelis, V.1
Aperjis, C.2
Huberman, B.A.3
-
23
-
-
84930091176
-
Personal data markets
-
S. Spiekermann, R. Böhme, A. Acquisti, and K.-L. Hui "Personal data markets" Electron Markets, vol. 25, no. 2, pp. 91-93, 2015. DOI: 10.1007/s12525-015-0190-1
-
(2015)
Electron Markets
, vol.25
, Issue.2
, pp. 91-93
-
-
Spiekermann, S.1
Böhme, R.2
Acquisti, A.3
Hui, K.-L.4
-
24
-
-
84930091176
-
Personal data markets
-
Jun.
-
S. Spiekermann, R. Böhme, A. Acquisti, and K.-L. Hui, "Personal data markets," Electron. Markets, vol. 25, no. 2, pp. 91-93, Jun. 2015.
-
(2015)
Electron. Markets
, vol.25
, Issue.2
, pp. 91-93
-
-
Spiekermann, S.1
Böhme, R.2
Acquisti, A.3
Hui, K.-L.4
-
25
-
-
84872152419
-
Smart grid forensic science: Applications, challenges, and open issues
-
Jan.
-
M. Erol-Kantarci and H. T. Mouftah, "Smart grid forensic science: Applications, challenges, and open issues," IEEE Commun. Mag., vol. 51, no. 1, pp. 68-74, Jan. 2013.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.1
, pp. 68-74
-
-
Erol-Kantarci, M.1
Mouftah, H.T.2
-
26
-
-
84961350352
-
Data aggregation as a method of protecting privacy in smart grid networks
-
Mar. [Online]
-
G. Taban and A. A. Cárdenas, "Data aggregation as a method of protecting privacy in smart grid networks," IEEE Smart Grid, Mar. 2012. [Online]. Available: http://smartgrid.ieee.org/newsletters/march-2012/data-aggregation-as-a-method-of-protecting-privacy-in-smart-grid-networks
-
(2012)
IEEE Smart Grid
-
-
Taban, G.1
Cárdenas, A.A.2
-
27
-
-
84939200228
-
Model-based assessment for balancing privacy requirements and operational capabilities in the smart grid
-
Feb.
-
F. Knirsch, D. Engel, M. Frincu, and V. Prasanna, "Model-based assessment for balancing privacy requirements and operational capabilities in the smart grid," in Proc. IEEE Power Energy Soc. Innov. Smart Grid Technol. Conf. (ISGT), Feb. 2015, pp. 1-5.
-
(2015)
Proc. IEEE Power Energy Soc. Innov. Smart Grid Technol. Conf. (ISGT)
, pp. 1-5
-
-
Knirsch, F.1
Engel, D.2
Frincu, M.3
Prasanna, V.4
-
28
-
-
84855192602
-
For sale: Your data by: You
-
C. Riederer, V. Erramilli, A. Chaintreau, B. Krishnamurthy, and P. Rodriguez, "For sale: Your data by: You," in Proc. 10th ACM Workshop Hot Topics Netw., 2011, pp. 13:1-13:6.
-
(2011)
Proc. 10th ACM Workshop Hot Topics Netw.
, pp. 13:1-13:6
-
-
Riederer, C.1
Erramilli, V.2
Chaintreau, A.3
Krishnamurthy, B.4
Rodriguez, P.5
-
29
-
-
84906513884
-
What's the gist? Privacy-preserving aggregation of user profiles
-
Computer Security ESORICS M. Kutyłowski and J. Vaidya, Eds. Wroclaw, Poland: Springer
-
I. Bilogrevic, J. Freudiger, E. De Cristofaro, and E. Uzun, "What's the gist? Privacy-preserving aggregation of user profiles," in Computer Security ESORICS (Lecture Notes in Computer Science), vol. 8713, M. Kutyłowski and J. Vaidya, Eds. Wroclaw, Poland: Springer, 2014, pp. 128-145.
-
(2014)
Lecture Notes in Computer Science
, vol.8713
, pp. 128-145
-
-
Bilogrevic, I.1
Freudiger, J.2
De Cristofaro, E.3
Uzun, E.4
-
31
-
-
84871390246
-
Take it or leave it: Running a survey when privacy comes at a cost
-
Internet and Network Economics P. W. Goldberg, Ed. Berlin, Germany: Springer
-
K. Ligett and A. Roth, "Take it or leave it: Running a survey when privacy comes at a cost," in Internet and Network Economics (Lecture Notes in Computer Science), vol. 7695, P. W. Goldberg, Ed. Berlin, Germany: Springer, 2012, pp. 378-391.
-
(2012)
Lecture Notes in Computer Science
, vol.7695
, pp. 378-391
-
-
Ligett, K.1
Roth, A.2
-
32
-
-
84879756092
-
Truthful mechanisms for agents that value privacy
-
Y. Chen, S. Chong, I. A. Kash, T. Moran, and S. Vadhan, "Truthful mechanisms for agents that value privacy," in Proc. 14th ACM Conf. Electron. Commerce (EC), 2013, pp. 215-232.
-
(2013)
Proc. 14th ACM Conf. Electron. Commerce (EC)
, pp. 215-232
-
-
Chen, Y.1
Chong, S.2
Kash, I.A.3
Moran, T.4
Vadhan, S.5
-
33
-
-
84873340810
-
Is privacy compatible with truthfulness?
-
D. Xiao, "Is privacy compatible with truthfulness?" in Proc. ITCS, 2013, pp. 67-86.
-
(2013)
Proc. ITCS
, pp. 67-86
-
-
Xiao, D.1
-
34
-
-
84904460092
-
Game theoretic analysis of multiparty access control in online social networks
-
London, U.K., Jun.
-
H. Hu, G.-J. Ahn, Z. Zhao, and D. Yang, "Game theoretic analysis of multiparty access control in online social networks," in Proc. SACMAT, London, U.K., Jun. 2014, pp. 93-102.
-
(2014)
Proc. SACMAT
, pp. 93-102
-
-
Hu, H.1
Ahn, G.-J.2
Zhao, Z.3
Yang, D.4
-
35
-
-
84961327972
-
A game-theoretic study on nonmonetary incentives in data analytics projects with privacy implications
-
Verona, Italy, Jul.
-
M. Chessa, J. Grossklags, and P. Loiseau, "A game-theoretic study on nonmonetary incentives in data analytics projects with privacy implications," in Proc. IEEE 28th Comput. Secur. Found. Symp. (CSF), Verona, Italy, Jul. 2015, pp. 90-104.
-
(2015)
Proc. IEEE 28th Comput. Secur. Found. Symp. (CSF)
, pp. 90-104
-
-
Chessa, M.1
Grossklags, J.2
Loiseau, P.3
-
36
-
-
84961290995
-
Accuracy for sale: Aggregating data with a variance constraint
-
R. Cummings, K. Ligett, A. Roth, Z. S. Wu, and J. Ziani, "Accuracy for sale: Aggregating data with a variance constraint," in Proc. Conf. Innov. Theoretical Comput. Sci. (ITCS), 2015, pp. 317-324.
-
(2015)
Proc. Conf. Innov. Theoretical Comput. Sci. (ITCS)
, pp. 317-324
-
-
Cummings, R.1
Ligett, K.2
Roth, A.3
Wu, Z.S.4
Ziani, J.5
-
37
-
-
84864356611
-
Privacy consensus in anonymization systems via game theory
-
R. K. Adl, M. Askari, K. Barker, and R. Safavi-Naini, "Privacy consensus in anonymization systems via game theory," in Proc. 26th Data Appl. Secur. Privacy (DBSec), 2012, pp. 74-89.
-
(2012)
Proc. 26th Data Appl. Secur. Privacy (DBSec)
, pp. 74-89
-
-
Adl, R.K.1
Askari, M.2
Barker, K.3
Safavi-Naini, R.4
-
39
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
Oct.
-
L. Sweeney, "K-anonymity: A model for protecting privacy," Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, Oct. 2002.
-
(2002)
Int. J. Uncertainty, Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
40
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Mar.
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity," ACM Trans. Knowl. Discovery Data, vol. 1, no. 1, Mar. 2007, Art. ID 3.
-
(2007)
ACM Trans. Knowl. Discovery Data
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
41
-
-
33746335051
-
Differential privacy
-
Automata, Languages and Programming M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds. Heidelberg, Germany: Springer
-
C. Dwork, "Differential privacy," in Automata, Languages and Programming (Lecture Notes in Computer Science), vol. 4052, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds. Heidelberg, Germany: Springer, 2006, pp. 1-12.
-
(2006)
Lecture Notes in Computer Science
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
42
-
-
84875576230
-
A theory of pricing private data
-
C. Li, D. Y. Li, G. Miklau, and D. Suciu, "A theory of pricing private data," in Proc. ICDT, 2013, pp. 33-44.
-
(2013)
Proc. ICDT
, pp. 33-44
-
-
Li, C.1
Li, D.Y.2
Miklau, G.3
Suciu, D.4
|