{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:39:23Z","timestamp":1752982763682,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276670"},{"type":"electronic","value":"9783319276687"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27668-7_6","type":"book-chapter","created":{"date-parts":[[2015,12,31]],"date-time":"2015-12-31T01:37:45Z","timestamp":1451525865000},"page":"89-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid"],"prefix":"10.1007","author":[{"given":"Fabian","family":"Knirsch","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dominik","family":"Engel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cristian","family":"Neureiter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marc","family":"Frincu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Viktor","family":"Prasanna","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,1,1]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s12394-010-0046-y","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A., Polonetsky, J., Wolf, C.: Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity Inf. Soc. 3, 275\u2013294 (2010)","journal-title":"Identity Inf. Soc."},{"doi-asserted-by":"crossref","unstructured":"Langer, L., Skopik, F., Kienesberger, G., Li, Q.: Privacy issues of smart e-mobility. In: 39th Annual Conference of the Industrial Electronics Society, IECON 2013, pp. 6682\u20136687. IEEE (2013)","key":"6_CR2","DOI":"10.1109\/IECON.2013.6700238"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P McDaniel","year":"2009","unstructured":"McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7, 75\u201377 (2009)","journal-title":"IEEE Secur. Priv."},{"doi-asserted-by":"crossref","unstructured":"Simmhan, Y., Kumbhare, A., Cao, B., Prasanna, V.: An analysis of security and privacy issues in smart grid software architectures on clouds. In: IEEE International Conference on Cloud Computing (CLOUD 2011), pp. 582\u2013589. IEEE (2011)","key":"6_CR4","DOI":"10.1109\/CLOUD.2011.107"},{"doi-asserted-by":"crossref","unstructured":"Boehm, B.: A view of 20th and 21st century software engineering. In: Proceedings of the 28th International Conference on Software Engineering, ICSE 2006, pp. 12\u201329. ACM, New York (2006)","key":"6_CR5","DOI":"10.1145\/1134285.1134288"},{"unstructured":"National Institute of Standards and Technology: NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0. Technical Report NIST Special Publication 1108R2. National Institute of Standards and Technology (2012)","key":"6_CR6"},{"unstructured":"CEN, Cenelec and ETSI: Smart Grid Reference Architecture. Technical report, CEN\/Cenelec\/ETSI Smart Grid Coordination Group Std. (2012)","key":"6_CR7"},{"key":"6_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-319-04313-5_5","volume-title":"Digital Enterprise Design and Management","author":"C D\u00e4nekas","year":"2014","unstructured":"D\u00e4nekas, C., Neureiter, C., Rohjans, S., Uslar, M., Engel, D.: Towards a model-driven-architecture process for smart grid projects. In: Benghozi, P.-J., Krob, D., Lonjon, A., Panetto, H. (eds.) DED & M 2014. AISC, vol. 261, pp. 47\u201358. Springer, Heidelberg (2014)"},{"unstructured":"National Institute of Standards and Technology: Guidelines for smart grid cyber security, vol. 2, privacy and the smart grid. Technical report, The Smart Grid Interoperability Panel - Cyber Security Working Group (2010)","key":"6_CR9"},{"unstructured":"CEN, Cenelec and ETSI: Smart Grid Information Security. Technical report, CEN\/Cenelec\/ETSI Smart Grid Coordination Group Std. (2012)","key":"6_CR10"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/JPROC.2010.2073670","volume":"99","author":"S Wicker","year":"2011","unstructured":"Wicker, S., Schrader, D.: Privacy-aware design principles for information networks. Proc. IEEE 99, 330\u2013350 (2011)","journal-title":"Proc. IEEE"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-02843-4_7","volume-title":"Dataspace: The Final Frontier","author":"K Barker","year":"2009","unstructured":"Barker, K., Askari, M., Banerjee, M., Ghazinour, K., Mackas, B., Majedi, M., Pun, S., Williams, A.: A data privacy taxonomy. In: Sexton, A.P. (ed.) BNCOD 26. LNCS, vol. 5588, pp. 42\u201354. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Ahmed, M., Anjomshoaa, A., Nguyen, T., Tjoa, A.: Towards an ontology-based risk assessment in collaborative environment using the semanticlife. In: Proceedings of the Second International Conference on Availability, Reliability and Security, ARES 2007. IEEE Computer Society, Washington, D.C., pp. 400\u2013407 (2007)","key":"6_CR13","DOI":"10.1109\/ARES.2007.152"},{"doi-asserted-by":"crossref","unstructured":"Kost, M., Freytag, J.C., Kargl, F., Kung, A.: Privacy verification using ontologies. In: Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, ARES 2011, pp. 627\u2013632. IEEE Computer Society, Washington, D.C. (2011)","key":"6_CR14","DOI":"10.1109\/ARES.2011.97"},{"doi-asserted-by":"crossref","unstructured":"Kost, M., Freytag, J.C.: Privacy analysis using ontologies. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, Texas, USA, pp. 205\u20132016. ACM (2012)","key":"6_CR15","DOI":"10.1145\/2133601.2133627"},{"doi-asserted-by":"crossref","unstructured":"Chen, B., Kalbarczyk, Z., Nicol, D., Sanders, W., Tan, R., Temple, W., Tippenhauer, N., Vu, A., Yau, D.: Go with the flow: toward workflow-oriented security assessment. In: Proceedings of New Security Paradigm Workshop (NSPW), Banff, Canada (2013)","key":"6_CR16","DOI":"10.1145\/2535813.2535821"},{"doi-asserted-by":"crossref","unstructured":"Knirsch, F., Engel, D., Frincu, M., Prasanna, V.: Model-based assessment for balancing privacy requirements and operational capabilities in the smart grid. In: Proceedings of the 6th Conference on Innovative Smart Grid Technologies (ISGT 2015), 2015 IEEE Power & Energy Society, Washington, D.C., USA, pp. 1\u20135 (2015)","key":"6_CR17","DOI":"10.1109\/ISGT.2015.7131805"},{"unstructured":"Shearer, R., Motik, B., Horrocks, I.: Hermit: a highly-efficient owl reasoner. In: Dolbear, C., Ruttenberg, A., Sattler, U. (eds.) OWLED, vol. 432. CEUR Workshop Proceedings. CEUR-WS.org (2008)","key":"6_CR18"},{"doi-asserted-by":"crossref","unstructured":"Neureiter, C., Eibl, G., Veichtlbauer, A., Engel, D.: Towards a framework for engineering smart-grid-speficic privacy requirements. In: Proceedings of IEEE IECON 2013, Special Session on Energy Informatics, Vienna, Austria. IEEE (2013)","key":"6_CR19","DOI":"10.1109\/IECON.2013.6699912"},{"key":"6_CR20","series-title":"International Handbooks on Information Systems","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-92673-3_0","volume-title":"Handbook on Ontologies","author":"N Guarino","year":"2009","unstructured":"Guarino, N., Oberle, D., Staab, S.: What is an ontology? In: Staab, S., Studer, R. (eds.) Handbook on Ontologies. International Handbooks on Information Systems, 2nd edn, pp. 1\u201317. Springer, Heidelberg (2009)","edition":"2"},{"unstructured":"The European Parliament and the Council: Official Journal L 281, 23\/11\/1995 P. 0031\u20130050 - Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995. Online (1995)","key":"6_CR21"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-642-22179-8_19","volume-title":"Green IT: Technologies and Applications","author":"Y Simmhan","year":"2011","unstructured":"Simmhan, Y., Zhou, Q., Prasanna, V.: Semantic information integration for smart grid applications. In: Kim, J.H., Lee, M.J. (eds.) Green IT: Technologies and Applications, pp. 361\u2013380. Springer, Heidelberg (2011)"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-642-22179-8_19","volume-title":"Green IT: Technologies and Applications","author":"Y Simmhan","year":"2011","unstructured":"Simmhan, Y., Zhou, Q., Prasanna, V.: Semantic information integration for smart grid applications. In: Kim, J.H., Lee, M.J. (eds.) Green IT: Technologies and Applications, vol. 77, pp. 361\u2013380. Springer, Heidelberg (2011)"},{"unstructured":"Knirsch, F.: Model-driven Privacy Assessment in the Smart Grid. Master\u2019s thesis, Salzburg University of Applied Sciences (2014)","key":"6_CR24"},{"unstructured":"Rissanen, E.: eXtensible Access Control Markup Language (XACML) Version 3.0 (2013). \n                    http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.pdf","key":"6_CR25"},{"unstructured":"Jung, M., Hofer, T., Dbelt, S., Kienesberger, G., Judex, F., Kastner, W.: Access control for a smart grid SOA. In: Proceedings of the 7th IEEE Conference for Internet Technology and Secured Transactions, London, UK, pp. 281\u2013287. IEEE (2012)","key":"6_CR26"}],"container-title":["Communications in Computer and Information Science","Information Systems Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27668-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:15:46Z","timestamp":1559358946000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27668-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276670","9783319276687"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27668-7_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}