{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:01:55Z","timestamp":1725721315281},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380297"},{"type":"electronic","value":"9783642380303"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38030-3_4","type":"book-chapter","created":{"date-parts":[[2013,4,5]],"date-time":"2013-04-05T04:20:18Z","timestamp":1365135618000},"page":"58-71","source":"Crossref","is-referenced-by-count":5,"title":["A Holistic View of Security and Privacy Issues in Smart Grids"],"prefix":"10.1007","author":[{"given":"Muhammad Rizwan","family":"Asghar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniele","family":"Miorandi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"NIST, Smart grid: A beginner\u2019s guide, http:\/\/www.nist.gov\/smartgrid\/beginnersguide.cfm (last accessed October 28, 2012)"},{"key":"4_CR2","unstructured":"Wiki, Smart meter, http:\/\/en.wikipedia.org\/wiki\/File:Intelligenter_zaehler-_Smart_meter.jpg (last accessed February 18, 2013)"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1109\/TCE.2010.5606278","volume":"56","author":"D.-M. Han","year":"2010","unstructured":"Han, D.-M., Lim, J.-H.: Design and implementation of smart home energy management systems based on zigbee. IEEE Transactions on Consumer Electronics\u00a056, 1417\u20131425 (2010)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"4_CR4","unstructured":"Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, COM (2010) 639. Energy 2020 A Strategy for Competitive, Sustainable and Secure Energy (October 2010)"},{"key":"4_CR5","unstructured":"Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, COM (2011) 885. Energy Roadmap 2050 (December 2011)"},{"key":"4_CR6","unstructured":"Massey, R., Russo, M.: Clarification of data controller and data processor under eu privacy directive new opinion of article 29 data protection working party, http:\/\/www.mwe.com\/publications\/uniEntity.aspx?xpST=PublicationDetail&pub=4959 (last accessed February 18, 2013)"},{"issue":"5","key":"4_CR7","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"\u00c1cs, G., Castelluccia, C.: Dream: Differentially private smart metering. CoRR\u00a0abs\/1201.2531 (2012)","DOI":"10.1007\/978-3-642-24178-9_9"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-22263-4_11","volume-title":"Privacy Enhancing Technologies","author":"M. Jawurek","year":"2011","unstructured":"Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol.\u00a06794, pp. 192\u2013210. Springer, Heidelberg (2011)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Ion, M., Russello, G., Crispo, B.: ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. In: The Sixth International Conference on Availability, Reliability and Security, ARES 2011, pp. 99\u2013108 (August 2011)","DOI":"10.1109\/ARES.2011.23"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Russello, G., Crispo, B.: Poster: ESPOON ERBAC : Enforcing security policies in outsourced environments with encrypted RBAC. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 841\u2013844. ACM (2011)","DOI":"10.1109\/ARES.2011.23"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-27585-2_12","volume-title":"Open Problems in Network Security","author":"M.R. Asghar","year":"2012","unstructured":"Asghar, M.R., Ion, M., Russello, G., Crispo, B.: Securing data provenance in the cloud. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol.\u00a07039, pp. 145\u2013160. Springer, Heidelberg (2012)"},{"key":"4_CR13","unstructured":"European Communities: Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. (November 1995), http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML (last accessed October 27, 2012)"},{"key":"4_CR14","unstructured":"Personal data protection act. (November 1999), http:\/\/www.dutchdpa.nl\/Pages\/en_wetten_wbp.aspx (last accessed October 29, 2012)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-27585-2_10","volume-title":"Open Problems in Network Security","author":"M.R. Asghar","year":"2012","unstructured":"Asghar, M.R., Russello, G.: Flexible and dynamic consent-capturing. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol.\u00a07039, pp. 119\u2013131. Springer, Heidelberg (2012)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Asghar, M., Russello, G.: Actors: A goal-driven approach for capturing and managing consent in e-health systems. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, pp. 61\u201369 (July 2012)","DOI":"10.1109\/POLICY.2012.10"},{"issue":"9","key":"4_CR17","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J. Saltzer","year":"1975","unstructured":"Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proceedings of the IEEE\u00a063(9), 1278\u20131308 (1975)","journal-title":"Proceedings of the IEEE"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Ion, M., Russello, G., Crispo, B.: ESPOON ERBAC : Enforcing security policies in outsourced environments. Computers & Security (2012)","DOI":"10.1109\/ARES.2011.23"},{"issue":"8","key":"4_CR19","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1016\/S0378-7788(02)00241-4","volume":"35","author":"G. Wood","year":"2003","unstructured":"Wood, G., Newborough, M.: Dynamic energy-consumption indicators for domestic appliances: environment, behaviour and design. Energy and Buildings\u00a035(8), 821\u2013841 (2003)","journal-title":"Energy and Buildings"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Quinn, E.: Privacy and the new energy infrastructure. Available at SSRN 1370731 (2009)","DOI":"10.2139\/ssrn.1370731"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1878431.1878446","volume-title":"Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys 2010","author":"A. Molina-Markham","year":"2010","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys 2010, pp. 61\u201366. ACM, New York (2010)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Bohli, J., Sorge, C., Ugus, O.: A privacy model for smart metering. In: 2010 IEEE International Conference on Communications Workshops (ICC), pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/ICCW.2010.5503916"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: First IEEE International Conference on Smart Grid Communications, SmartGridComm 2010, pp. 238\u2013243 (October 2010)","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"4_CR24","first-page":"49","volume-title":"Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2011","author":"A. Rial","year":"2011","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2011, pp. 49\u201360. ACM, New York (2011)"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MPRV.2010.73","volume":"10","author":"V. Sundramoorthy","year":"2011","unstructured":"Sundramoorthy, V., Cooper, G., Linge, N., Liu, Q.: Domesticating energy-monitoring systems: Challenges and design concerns. IEEE Pervasive Computing\u00a010, 20\u201327 (2011)","journal-title":"IEEE Pervasive Computing"},{"key":"4_CR26","unstructured":"Anderson, R., Fuloria, S.: On the security economics of electricity metering. In: WEIS (2010)"},{"issue":"1","key":"4_CR27","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TSG.2010.2046347","volume":"1","author":"A. Metke","year":"2010","unstructured":"Metke, A., Ekl, R.: Security technology for smart grid networks. IEEE Transactions on Smart Grid\u00a01(1), 99\u2013107 (2010)","journal-title":"IEEE Transactions on Smart Grid"},{"key":"4_CR28","unstructured":"Lee, A., Brewer, T.: Smart grid cyber security strategy and requirements (September 2009), http:\/\/www.meits.us\/MEITS-SECURE\/MS-EAP\/Download\/Cyber_Security_Coordination_Task_Group.pdf (last accessed on August 28, 2012)"},{"key":"4_CR29","unstructured":"Annex, V.: Smart grid security (March 2012), http:\/\/www.thecre.com\/fisma\/wp-content\/uploads\/2012\/07\/ENISA_Annex-V-Smart-grid-Security-Related-Initiatives.pdf (last accessed October 25 , 2012)"},{"key":"4_CR30","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSP.2010.49","volume":"8","author":"H. Khurana","year":"2010","unstructured":"Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-grid security issues. IEEE Security and Privacy\u00a08, 81\u201385 (2010)","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"4_CR31","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s12394-010-0046-y","volume":"3","author":"A. Cavoukian","year":"2010","unstructured":"Cavoukian, A., Polonetsky, J., Wolf, C.: Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity in the Information Society\u00a03(2), 275\u2013294 (2010)","journal-title":"Identity in the Information Society"},{"issue":"3","key":"4_CR32","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P. McDaniel","year":"2009","unstructured":"McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security & Privacy\u00a07(3), 75\u201377 (2009)","journal-title":"IEEE Security & Privacy"},{"key":"4_CR33","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2366316.2366328","volume":"55","author":"T. Kostyk","year":"2012","unstructured":"Kostyk, T., Herkert, J.: Societal implications of the emerging smart grid. Commun. ACM\u00a055, 34\u201336 (2012)","journal-title":"Commun. ACM"},{"key":"4_CR34","unstructured":"Baumeister, T.: Literature review on smart grid cyber security. Tech. rep., Collaborative Software Development Laboratory, Department of Information and Computer Sciences, University of Hawaii (December 2010) (last accessed October 28, 2012)"}],"container-title":["Lecture Notes in Computer Science","Smart Grid Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38030-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T03:36:23Z","timestamp":1644723383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38030-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380297","9783642380303"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38030-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}