{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:11:56Z","timestamp":1762002716351,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319728162"},{"type":"electronic","value":"9783319728179"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_6","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T16:44:29Z","timestamp":1513874669000},"page":"77-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["STRIDE to a Secure Smart Grid in a Hybrid Cloud"],"prefix":"10.1007","author":[{"given":"Bojan","family":"Jelacic","sequence":"first","affiliation":[]},{"given":"Daniela","family":"Rosic","sequence":"additional","affiliation":[]},{"given":"Imre","family":"Lendak","sequence":"additional","affiliation":[]},{"given":"Marina","family":"Stanojevic","sequence":"additional","affiliation":[]},{"given":"Sebastijan","family":"Stoja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"key":"6_CR1","unstructured":"Microsoft MSDN documentation, the STRIDE Threat Model. https:\/\/msdn.microsoft.com\/en-us\/library\/ee823878(v=cs.20).aspx"},{"issue":"4","key":"6_CR2","first-page":"1943","volume":"8","author":"Z Cao","year":"2017","unstructured":"Cao, Z., Lin, J., Wan, C., Song, Y., Zhang, Y., Wang, X.: Optimal cloud computing resource allocation for demand side management. IEEE Trans. Smart Grid 8(4), 1943\u20131955 (2017)","journal-title":"IEEE Trans. Smart Grid"},{"key":"6_CR3","unstructured":"Knapp, E.D.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Elsevier (2011)"},{"key":"6_CR4","volume-title":"Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure","author":"ED Knapp","year":"2013","unstructured":"Knapp, E.D., Samani, R.: Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. Elsevier, Amsterdam (2013)"},{"issue":"4","key":"6_CR5","doi-asserted-by":"crossref","first-page":"1896","DOI":"10.1109\/TSG.2015.2452293","volume":"7","author":"F Luo","year":"2015","unstructured":"Luo, F., Zhao, J., Dong, Z.Y., Chen, Y., Xu, Y., Zhang, X., Wong, K.P.: Cloud based information infrastructure for next-generation power grid: conception, architecture, and applications. IEEE Trans. Smart Grid 7(4), 1896\u20131912 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"8","key":"6_CR6","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MCOM.2012.6257525","volume":"50","author":"X Li","year":"2012","unstructured":"Li, X., Liang, X., Lu, R., Shen, X., Lin, X., Zhu, H.: Securing Smart Grid: cyber attacks, countermeasures, and challenges. IEEE Commun. Mag. 50(8), 38\u201345 (2012)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"6_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.12720\/sgce.1.1.1-6","volume":"1","author":"F Aloul","year":"2012","unstructured":"Aloul, F., Al-Ali, A.R., Al-Daku, R., Al-Mardini, M., El-Hajj, W.: Smart Grid security: threats, vulnerabilities and solutions. Int. J. Smart Grid Clean Energy 1(1), 1\u20136 (2012)","journal-title":"Int. J. Smart Grid Clean Energy"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Buyya, R.: DDoS attacks in cloud computing: issues, taxonomy, and future directions, 31 March 2017","DOI":"10.1016\/j.comcom.2017.03.010"},{"key":"6_CR9","unstructured":"Smart Grid and Cyber Security for Energy Assurance. National Association of State Energy Officials (NASEO), November 2011"},{"key":"6_CR10","unstructured":"NIST Special Publication 800-30 Revision 1: Guide for Conducting Risk Assessments"},{"key":"6_CR11","unstructured":"NIST SP 800-39: Managing Information Security Risk"},{"key":"6_CR12","volume-title":"Principles of Information Security","author":"ME Whitman","year":"2011","unstructured":"Whitman, M.E., Mattord, H.J.: Principles of Information Security. Course Technology, Boston (2011)"},{"key":"6_CR13","unstructured":"Souza, R.D.: 3 Approaches to Threat Modeling, 15 April 2016"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Mockel, C., Abdallah, A.E.: Threat modeling approaches and tools for securing architectural designs of an e-banking application. In: 2010 Sixth International Conference on Information Assurance and Security (IAS), pp. 149\u2013154. IEEE (2010)","DOI":"10.1109\/ISIAS.2010.5604049"},{"key":"6_CR15","unstructured":"Burns, S.F.: GIAC Security Essentials Certification (GSEC) Practical Assignment, Version 1.4c, Threat Modeling: A Process To Ensure Application Security, 5 January 2005"},{"key":"6_CR16","unstructured":"The NIST Definition of Cloud Computing. National Institute of Standards and Technology (NIST), Information Technology Laboratory, Version 15 (2009)"},{"key":"6_CR17","unstructured":"NIST SP 500-293: US Government Cloud Computing Technology Roadmap Volume I, High-Priority Requirements to Further USG Agency Cloud Computing Adoption. National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899, October 2014"},{"key":"6_CR18","unstructured":"Hybrid Ris Management for Utility Poviders (HyRiM), EU Project Number 608090"},{"key":"6_CR19","unstructured":"SEcure Cloud computing project for CRITICAL IT infrastructure (SECCRIT), 01 January 2013\u201331 December 2015"},{"key":"6_CR20","unstructured":"NISTIR 7628: Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements. National Institute of Standards and Technology (NIST) (2010)"},{"key":"6_CR21","unstructured":"IEC 61970-301:2013: Energy management system application program interface (EMS-API) - Part 301: Common Information Model (CIM) Base. IEC, Edition 5.0, December 2013"},{"key":"6_CR22","unstructured":"IEC 61968-11:2013: Application Integration at Electric Utilities - System Interfaces for Distribution Management - Part 11: Common Information Model (CIM) Extensions for Distribution. IEC, Edition 2.0, March 2013"},{"key":"6_CR23","unstructured":"NIST SP 800-30: Risk Management Guide for Information Technology Systems"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T11:44:58Z","timestamp":1570535098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}