-
2
-
-
84861919654
-
On the security economics of electricity metering
-
Cambridge, MA, USA, Jun.
-
R. Anderson and S. Fuloria, "On the security economics of electricity metering," in Proc. 9th Annu. Workshop Econ. Inf. Secur. (WEIS), Cambridge, MA, USA, Jun. 2010.
-
(2010)
Proc. 9th Annu. Workshop Econ. Inf. Secur. (WEIS)
-
-
Anderson, R.1
Fuloria, S.2
-
3
-
-
84856190512
-
Decoupled data for privacy preserving record linkage with error management
-
Oct.
-
H.-C. Kum and S. Ahalt, "Decoupled data for privacy preserving record linkage with error management," in Proc. IEEE 3rd Int. Conf. Privacy, Secur., Risk Trust, IEEE 3rd Int. Conf. Soc. Comput., Oct. 2011, pp. 1294-1301.
-
(2011)
Proc. IEEE 3rd Int. Conf. Privacy, Secur., Risk Trust, IEEE 3rd Int. Conf. Soc. Comput.
, pp. 1294-1301
-
-
Kum, H.-C.1
Ahalt, S.2
-
4
-
-
84979805283
-
-
accessed Oct. 28
-
District of Future Project. [Online]. Available: http://districtoffuture.eu/, accessed Oct. 28, 2015.
-
(2015)
District of Future Project
-
-
-
5
-
-
84979835134
-
-
accessed Oct. 21
-
FIWARE Project. [Online]. Available: https://www.-ware.org/, accessed Oct. 21, 2015.
-
(2015)
FIWARE Project
-
-
-
9
-
-
84911900606
-
Privacy in the Internet of Things: Threats and challenges
-
Dec.
-
J. H. Ziegeldorf, O. G. Morchon, and K. Wehrle, "Privacy in the Internet of Things: Threats and challenges," Secur. Commun. Netw., vol. 7, no. 12, pp. 2728-2742, Dec. 2014.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.12
, pp. 2728-2742
-
-
Ziegeldorf, J.H.1
Morchon, O.G.2
Wehrle, K.3
-
10
-
-
84878631638
-
A cloud-based consumer-centric architecture for energy data analytics
-
R. P. Singh, S. Keshav, and T. Brecht, "A cloud-based consumer-centric architecture for energy data analytics," in Proc. 4th Int. Conf. Future Energy Syst. e-Energy, 2013, pp. 63-74.
-
(2013)
Proc. 4th Int. Conf. Future Energy Syst. E-Energy
, pp. 63-74
-
-
Singh, R.P.1
Keshav, S.2
Brecht, T.3
-
11
-
-
84889053272
-
Customer-centric energy usage data management and sharing in smart grid systems
-
G. Lahoti, D. Mashima, and W.-P. Chen, "Customer-centric energy usage data management and sharing in smart grid systems," in Proc. 1st ACM Workshop Smart Energy Grid Secur. (SEGS), 2013, pp. 53-64.
-
(2013)
Proc. 1st ACM Workshop Smart Energy Grid Secur. (SEGS)
, pp. 53-64
-
-
Lahoti, G.1
Mashima, D.2
Chen, W.-P.3
-
13
-
-
85076893529
-
Bolt: Data management for connected homes
-
T. Gupta, R. P. Singh, A. Phanishayee, J. Jung, and R. Mahajan, "Bolt: Data management for connected homes," in Proc. 11th USENIX Symp. Netw. Syst. Design Implement. (NSDI), 2014, pp. 243-256.
-
(2014)
Proc. 11th USENIX Symp. Netw. Syst. Design Implement. (NSDI)
, pp. 243-256
-
-
Gupta, T.1
Singh, R.P.2
Phanishayee, A.3
Jung, J.4
Mahajan, R.5
-
14
-
-
85001608959
-
Maintaining user control while storing and processing sensor data in the cloud
-
M. Henze, R. Hummen, R. Matzutt, D. Catrein, and K.Wehrle, "Maintaining user control while storing and processing sensor data in the cloud," Int. J. Grid High Perform. Comput., vol. 5, no. 4, pp. 97-112, 2013.
-
(2013)
Int. J. Grid High Perform. Comput.
, vol.5
, Issue.4
, pp. 97-112
-
-
Henze, M.1
Hummen, R.2
Matzutt, R.3
Catrein, D.4
Wehrle, K.5
-
15
-
-
77954893607
-
A privacy model for smart metering
-
May
-
J.-M. Bohli, C. Sorge, and O. Ugus, "A privacy model for smart metering," in Proc. IEEE Int. Conf. Commun. Workshops, May 2010, pp. 1-5.
-
(2010)
Proc. IEEE Int. Conf. Commun. Workshops
, pp. 1-5
-
-
Bohli, J.-M.1
Sorge, C.2
Ugus, O.3
-
16
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
Germany: Springer-Verlag, Jul.
-
K. Kursawe, G. Danezis, and M. Kohlweiss, "Privacy-friendly aggregation for the smart-grid," in Privacy Enhancing Technologies. Berlin, Germany: Springer-Verlag, Jul. 2011, pp. 175-191.
-
(2011)
Privacy Enhancing Technologies. Berlin
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
17
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
Jun.
-
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Comput. Surv., vol. 42, no. 4, Jun. 2010, Art. no. 15.
-
(2010)
ACM Comput. Surv.
, vol.42
, Issue.4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
18
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertainty, Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
19
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and 'diversity
-
Apr.
-
N. Li, T. Li, and S. Venkatasubramanian, "t-closeness: Privacy beyond k-anonymity and '-diversity," in Proc. IEEE 23rd Int. Conf. Data Eng., Apr. 2007, pp. 106-115.
-
(2007)
Proc. IEEE 23rd Int. Conf. Data Eng.
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
20
-
-
77952913726
-
Closeness: A new privacy measure for data publishing
-
Jul.
-
N. Li, T. Li, and S. Venkatasubramanian, "Closeness: A new privacy measure for data publishing," IEEE Trans. Knowl. Data Eng., vol. 22, no. 7, pp. 943-956, Jul. 2010.
-
(2010)
IEEE Trans. Knowl. Data Eng.
, vol.22
, Issue.7
, pp. 943-956
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
21
-
-
84949456343
-
Disclosure risk assessment in perturbative microdata protection
-
Berlin, Germany: Springer-Verlag
-
W. E. Yancey, W. E. Winkler, and R. H. Creecy, "Disclosure risk assessment in perturbative microdata protection," in Inference Control in Sta-tistical Databases: From Theory to Practice, vol. 2316. Berlin, Germany: Springer-Verlag, 2002.
-
(2002)
Inference Control in Sta-tistical Databases: From Theory to Practice
, vol.2316
-
-
Yancey, W.E.1
Winkler, W.E.2
Creecy, R.H.3
-
22
-
-
0036433649
-
Ameasure of disclosure risk for microdata
-
Oct.
-
C. J. Skinner and M. J. Elliot, "Ameasure of disclosure risk for microdata," J. Roy. Statist. Soc. B (Statistical Methodology), vol. 64, no. 4, pp. 855-867, Oct. 2002.
-
(2002)
J. Roy. Statist. Soc. B (Statistical Methodology)
, vol.64
, Issue.4
, pp. 855-867
-
-
Skinner, C.J.1
Elliot, M.J.2
-
24
-
-
35448967088
-
M-invariance: Towards privacy preserving re-publication of dynamic datasets
-
X. Xiao and Y. Tao, "M-invariance: Towards privacy preserving re-publication of dynamic datasets," in Proc. ACM SIGMOD Int. Conf. Manage. Data (SIGMOD), 2007, pp. 689-700.
-
(2007)
Proc. ACM SIGMOD Int. Conf. Manage. Data (SIGMOD)
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
25
-
-
84881139576
-
Access policy consolidation for event processing systems
-
B. Schilling, B. Koldehofe, K. Rotherme, and U. Ramachandran, "Access policy consolidation for event processing systems," in Proc. Conf. Netw. Syst. (NetSys), 2013, pp. 92-101.
-
(2013)
Proc. Conf. Netw. Syst. (NetSys)
, pp. 92-101
-
-
Schilling, B.1
Koldehofe, B.2
Rotherme, K.3
Ramachandran, U.4
-
26
-
-
84881139576
-
Access policy consolidation for event processing systems
-
B. Schilling, B. Koldehofe, K. Rotherme, and U. Ramachandran, "Access policy consolidation for event processing systems," in Proc. Conf. Netw. Syst. (NetSys), 2013, pp. 92-101.
-
(2013)
Proc. Conf. Netw. Syst. (NetSys)
, pp. 92-101
-
-
Schilling, B.1
Koldehofe, B.2
Rotherme, K.3
Ramachandran, U.4
-
27
-
-
85180747369
-
Location leaks on the GSM air interface
-
D. F. Kune, J. Koelndorfer, N. Hopper, and Y. Kim, "Location leaks on the GSM air interface," in Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS), 2012, pp. 1-13.
-
(2012)
Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS)
, pp. 1-13
-
-
Kune, D.F.1
Koelndorfer, J.2
Hopper, N.3
Kim, Y.4
|