{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:01:58Z","timestamp":1725721318229},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380297"},{"type":"electronic","value":"9783642380303"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38030-3_2","type":"book-chapter","created":{"date-parts":[[2013,4,5]],"date-time":"2013-04-05T00:20:18Z","timestamp":1365121218000},"page":"26-44","source":"Crossref","is-referenced-by-count":3,"title":["Smart Grid Information Exchange \u2013 Securing the Smart Grid from the Ground"],"prefix":"10.1007","author":[{"given":"Steffen","family":"Fries","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rainer","family":"Falk","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ariane","family":"Sutor","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Falk, R., Fries, S.: Smart Grid Cyber Security \u2013 An Overview About Selected Scenarios and Their Security Implications. PIK Journal (November 2011) ISSN: 0930-5157","DOI":"10.1515\/piko.2011.037"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Fries, S., Falk, R.: Securing the Smart Grid Information exchange. VDE-Kongress Smart Grid (October 2012)","DOI":"10.1007\/978-3-642-38030-3_2"},{"key":"2_CR3","unstructured":"NERC, North American Reliability Corporation, \n                    \n                      http:\/\/www.nerc.com\/page.php?cid=220"},{"key":"2_CR4","unstructured":"NIST, National Institute of Standards and Technologies, Smart Grid Interoperability Project, \n                    \n                      http:\/\/www.nist.gov\/smartgrid\/"},{"key":"2_CR5","unstructured":"NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0 (2012), \n                    \n                      http:\/\/www.nist.gov\/smartgrid\/upload\/NIST_Framework_Release_2-0_corr.pdf"},{"key":"2_CR6","unstructured":"NIST IR 7628 Guidelines for Smart Grid Cyber Security, vol. 1-3 (August 2010), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/nistir\/ir7628"},{"key":"2_CR7","unstructured":"EU-funded project FINSENY \u2013 Future Internet for Smart Energy, \n                    \n                      http:\/\/www.fi-ppp-finseny.eu\/"},{"key":"2_CR8","unstructured":"BDEW \u2013 Bundesverband Energie- und Wasserwirtschaft, Datensicherheit, \n                    \n                      http:\/\/www.bdew.de\/bdew.nsf\/id\/DE_Datensicherheit"},{"key":"2_CR9","unstructured":"ISO-IEC 62351, Part 1-11, \n                    \n                      http:\/\/www.iec.ch\/cgi-bin\/procgi.pl\/www\/iecwww.p?wwwlang=E&wwwprog=sea22.p&search=iecnumber&header=IEC&pubno=62351&part=&se"},{"key":"2_CR10","unstructured":"Mandate M490, \n                    \n                      http:\/\/ec.europa.eu\/energy\/gas_electricity\/smartgrids\/doc\/2011_03_01_mandate_m490_en.pdf"},{"key":"2_CR11","unstructured":"Smart Grid Coordination Group, \n                    \n                      http:\/\/www.cenelec.eu\/aboutcenelec\/whatwedo\/technologysectors\/smartgrids.html"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: RFC5246: The Transport Layer Security (TLS) Protocol Version 1.2 (August 2008), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc5246","DOI":"10.17487\/rfc5246"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Baker, F., Meyer, D.: RFC6272: Internet Protocols for the Smart Grid (June 2011), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc6272","DOI":"10.17487\/rfc6272"},{"key":"2_CR14","unstructured":"DIN SPEC 27009: Information security management guidelines for process control systems used in the energy utility industry on the basis of ISO\/IEC 27002 (March 2012)"},{"key":"2_CR15","unstructured":"ISO\/IEC 27002:2005 Information technology \u2013 Security techniques \u2013 Code of practice for information security management (June 2005), \n                    \n                      http:\/\/www.iso27001security.com\/html\/27002.html"},{"key":"2_CR16","unstructured":"ISO\/IEC 15118 Road vehicles \u2013 Vehicle-to-Grid Communication Interface, currently under development"},{"key":"2_CR17","unstructured":"XML Signature Syntax and Processing 2.0, Candidate Recommendation (January 2012), \n                    \n                      http:\/\/www.w3.org\/TR\/2012\/CR-xmldsig-core2-20120124\/"},{"key":"2_CR18","unstructured":"XML Encryption Syntax and Processing Version 1.1, Candidate Recommendation (March 2012), \n                    \n                      http:\/\/www.w3.org\/TR\/2012\/CR-xmlenc-core1-20120313\/"},{"key":"2_CR19","unstructured":"The harmonised electricity market role model (January 2011), \n                    \n                      http:\/\/www.entsoe.eu"},{"key":"2_CR20","unstructured":"Energy Policy Act of (2005), \n                    \n                      http:\/\/www.epa.gov\/oust\/fedlaws\/publ_109-058.pdf"},{"key":"2_CR21","unstructured":"Bub, U., Huder, C.: Business models from the perspective of different market participants-International perspective. M\u00fcnchener Kreis (September 2012)"},{"key":"2_CR22","unstructured":"ISO 15408 Series \u201cInformation technology \u2013 Security techniques \u2013 Evaluation criteria for IT security\u201d, \n                    \n                      http:\/\/webstore.iec.ch\/webstore\/webstore.nsf\/mysearchajax?Openform&key=15408&sorting=&start=1&onglet=1"},{"key":"2_CR23","unstructured":"Protection Profile for the Gateway of a Smart Metering System (Gateway PP), BSI, Version 1.0.1 (December 2012), \n                    \n                      https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/SmartMeter\/PP-SmartMeter.pdf"},{"key":"2_CR24","unstructured":"Technische Richtlinie BSI TR-03109, Smart Energy, BSI (December 2012), \n                    \n                      https:\/\/www.bsi.bund.de\/DE\/Themen\/SmartMeter\/TechnRichtlinie\/TR_node.html"},{"key":"2_CR25","unstructured":"SOG-IS - Seniors Officials Group Information Systems Security, \n                    \n                      http:\/\/sogis.org\/"},{"key":"2_CR26","series-title":"LNCS","first-page":"1","volume-title":"Proceedings of EIT ICT Labs Workshop SmartGridSec12","author":"D. Oheimb von","year":"2013","unstructured":"von Oheimb, D.: IT Security architecture approaches for Smart Metering and Smart Grid. In: Cuellar, J. (ed.) SmartGridSec 2012. LNCS, vol.\u00a07823, pp. 1\u201325. Springer, Heidelberg (2013)"},{"key":"2_CR27","unstructured":"EIT ICT Labs Smart Energy Systems, \n                    \n                      http:\/\/www.eitictlabs.eu\/action-lines\/smart-energy-systems\/"}],"container-title":["Lecture Notes in Computer Science","Smart Grid Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38030-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T23:47:56Z","timestamp":1557618476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38030-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380297","9783642380303"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38030-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}