{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:04:50Z","timestamp":1746072290701,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380297"},{"type":"electronic","value":"9783642380303"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38030-3_6","type":"book-chapter","created":{"date-parts":[[2013,4,5]],"date-time":"2013-04-05T04:20:18Z","timestamp":1365135618000},"page":"85-95","source":"Crossref","is-referenced-by-count":7,"title":["Maintaining Privacy in Data Rich Demand Response Applications"],"prefix":"10.1007","author":[{"given":"Markus","family":"Karwe","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jens","family":"Str\u00fcker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Molina-Markham, A., Shenoy, P., et al.: Private memoirs of a smart meter. In: BuildSys 2010. ACM (2010)","DOI":"10.1145\/1878431.1878446"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-22263-4_11","volume-title":"Privacy Enhancing Technologies","author":"M. Jawurek","year":"2011","unstructured":"Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol.\u00a06794, pp. 192\u2013210. Springer, Heidelberg (2011)"},{"key":"6_CR3","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. Technical report, Microsoft Research (2010), http:\/\/research.microsoft.com\/apps\/pubs\/?id=141726 (called October 26, 2012)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Piette, M., Gahtikar, G., et al.: Open Automated Demand Responsecommunications Specification (2009)","DOI":"10.2172\/951952"},{"key":"6_CR5","unstructured":"AHAM: Assessment of Communication Standards of Smart Appliances, http:\/\/www.aham.org\/ht\/a\/GetDocumentAction\/i\/50696 (called September 27, 2012)"},{"key":"6_CR6","unstructured":"FERC: A National Assessment of Demand Response Potential (2009), http:\/\/www.ferc.gov\/legal\/staff-reports\/06-09-demand-response.pdf (called November 2012)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Roos, J., Lane, I.: Industrial power demand response analysis for one- part real-time pricing. IEEE Transactions on Power Systems\u00a013 (1998)","DOI":"10.1109\/59.651628"},{"key":"6_CR8","unstructured":"Piette, M., Sezgen, O., et al.: Development and evaluation of fully automated demand response in large facilities (2005), http:\/\/escholarship.org\/uc\/item\/4r45b9zt (called November 25, 2012)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Herter, K.: An exploratory analysis of California residential customer response to critical peak pricing of electricity. Energy\u00a032(1) (2007), http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0360544206000314 (called November 25, 2012)","DOI":"10.1016\/j.energy.2006.01.014"},{"key":"6_CR10","unstructured":"Faruqui, A., George, S.: Quantifying customer response to dynamic pricing. The Electricity Journal\u00a018(4) (2005), http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1040619005000412 (called November 25, 2012)"},{"key":"6_CR11","unstructured":"Jeske, T.: Privacy-preserving Smart Metering without a Trusted third-party. In: Proceedings of the International Conference on Security and Cryptography (2011)"},{"key":"6_CR12","unstructured":"Petrlic, R.: A privacy-preserving concept for smart grids. In: 18. DFN Workshop \u201cSicherheit in vernetzten Systemen\u201d (2011)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Li, D., Williams, J., et al.: Privacy Preservation for Appliance Control Application. Technical Report DNA#2012-09 (2012)","DOI":"10.1109\/SmartGridComm.2012.6485999"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-22263-4_10","volume-title":"Privacy Enhancing Technologies","author":"K. Kursawe","year":"2011","unstructured":"Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-friendly aggregation for the smart-grid. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol.\u00a06794, pp. 175\u2013191. Springer, Heidelberg (2011)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Schaefer, C., et al.: Mechanisms for Usage Control. In: ASIACCS (2008)","DOI":"10.1145\/1368310.1368344"},{"key":"6_CR16","unstructured":"Pretschner, A.: An overview of Distributed Usage Control. In: Knowledge Engineering: Principles and Techniques (2009)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., et al.: Attribute-based encryption for fine- grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"6_CR18","unstructured":"BSI (Federal Office for Information Security): Protection Profile for the Gateway of a Smart Metering System, final draft (2011), https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/SmartMeter\/PP-SmartMeter.pdf?__blob=publicationFile (called November 25, 2012)"},{"key":"6_CR19","unstructured":"Str\u00fcker, J., Kerschbaum, F.: From a Barrier to a Bridge: Data-Privacy in Dregulated Smart Grids. In: International Conference on Information Systems (2012)"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 457\u2013473. Springer, Heidelberg (2005)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity Based Encryption from the Weil Pairing. SIAM J. of Computing\u00a032(3) (2001)","DOI":"10.1137\/S0097539701398521"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Lazouski, A., Martinelli, F., Mori, P.: Usagecontrol in computer security: A survey. Computer Science Review\u00a04(2) (2010)","DOI":"10.1016\/j.cosrev.2010.02.002"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Park, J., Sandhu, R.: Towards usagecontrol models: Beyond traditional access control. In: SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies. ACM (2002)","DOI":"10.1145\/507711.507722"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Rajkumar, P., Ghoshand, S., Dasgupta, P.: Application Specific Usage Control Implementation Verification. International Journal of Network Security & Its Applications (IJNSA)\u00a01(3) (2009)","DOI":"10.1109\/ICIINFS.2009.5429902"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11555827_7","volume-title":"Computer Security \u2013 ESORICS 2005","author":"M. Hilty","year":"2005","unstructured":"Hilty, M., Basin, D., Pretschner, A.: On obligations. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 98\u2013117. Springer, Heidelberg (2005)"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Cutillo, L., Molva, R., \u00d6nen, M.: Privacy Preserving Picture Sharing: Enforcing Usage Control in Distributed On-Line Social Networks. In: Proceedings of the Fifth Workshop on Social Network Systems (2012)","DOI":"10.1145\/2181176.2181182"},{"key":"6_CR27","unstructured":"NIST. Guidelines for Smart Grid Cyber Security: vol. 2 Privacy and the Smart Grid, NISTIR 7628 (2008)"},{"key":"6_CR28","unstructured":"Jawurek, M., Freiling, F.: Privacy Threat Analysis of Smart Metering. In: 41. Jahrestagung der Gesellschaft f\u00fcr Informatik, Berlin (2011)"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Lisovich, M., Mulligan, D., Wicker, S.: Inferring personal information from demand-response systems. IEEE Security & Privacy\u00a08(1) (2010)","DOI":"10.1109\/MSP.2010.40"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 238\u2013243 (2010)","DOI":"10.1109\/SMARTGRID.2010.5622050"}],"container-title":["Lecture Notes in Computer Science","Smart Grid Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38030-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T03:17:36Z","timestamp":1745983056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38030-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380297","9783642380303"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38030-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}