{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:01:57Z","timestamp":1725721317494},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380297"},{"type":"electronic","value":"9783642380303"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38030-3_7","type":"book-chapter","created":{"date-parts":[[2013,4,5]],"date-time":"2013-04-05T00:20:18Z","timestamp":1365121218000},"page":"96-107","source":"Crossref","is-referenced-by-count":6,"title":["Data Protection in a Cloud-Enabled Smart Grid"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Fromm","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Florian","family":"Kelbert","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexander","family":"Pretschner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-24178-9_9","volume-title":"Information Hiding","author":"G. \u00c1cs","year":"2011","unstructured":"\u00c1cs, G., Castelluccia, C.: I Have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol.\u00a06958, pp. 118\u2013132. Springer, Heidelberg (2011)"},{"key":"7_CR2","unstructured":"BMWi, T.C.: PeerEnergyCloud, \n                    \n                      http:\/\/www.peerenergycloud.de\/"},{"key":"7_CR3","unstructured":"BMWi, E-Energy: eTelligence Project, \n                    \n                      http:\/\/www.etelligence.de"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s12394-010-0046-y","volume":"3","author":"A. Cavoukian","year":"2010","unstructured":"Cavoukian, A., Polonetsky, J., Wolf, C.: SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. Identity in the Information Society\u00a03, 275\u2013294 (2010)","journal-title":"Identity in the Information Society"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Clements, S., Kirkham, H.: Cyber-security considerations for the smart grid. In: 2010 IEEE Power and Energy Society General Meeting, pp. 1\u20135 (July 2010)","DOI":"10.1109\/PES.2010.5589829"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/s11623-011-0133-8","volume":"35","author":"C. Eckert","year":"2011","unstructured":"Eckert, C., Krau\u00df, C.: Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen. Datenschutz und Datensicherheit - DuD\u00a035, 535\u2013541 (2011)","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Efthymiou, C., Kalogridis, G.: Smart Grid Privacy via Anonymization of Smart Metering Data. In: 1st IEEE Intl. Conf. on Smart Grid Communications (October 2010)","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MPE.2009.934876","volume":"8","author":"H. Farhangi","year":"2010","unstructured":"Farhangi, H.: The path of the smart grid. IEEE Power and Energy Magazine\u00a08(1), 18\u201328 (2010)","journal-title":"IEEE Power and Energy Magazine"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The Characteristics of Cloud Computing. In: 39th Intl. Conf. on Parallel Processing Workshops (September 2010)","DOI":"10.1109\/ICPPW.2010.45"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Kalogridis, G., Efthymiou, C., Denic, S., Lewis, T., Cepeda, R.: Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures. In: First IEEE International Conference on Smart Grid Communications, pp. 232\u2013237 (October 2010)","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Kelbert, F., Pretschner, A.: Towards a Policy Enforcement Infrastructure for Distributed Usage Control. In: Proc. 17th ACM Symp. on Access Control Models and Technologies (June 2012)","DOI":"10.1145\/2295136.2295159"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Kelbert, F., Pretschner, A.: Data Usage Control Enforcement in Distributed Systems. In: Proc. 3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013. ACM (to appear, February 2013)","DOI":"10.1145\/2435349.2435358"},{"key":"7_CR13","unstructured":"Kumari, P., Kelbert, F., Pretschner, A.: Data Protection in Heterogeneous Distributed Systems: A Smart Meter Example. In: Proc. Workshop on Dependable Software for Critical Infrastructures. GI Lecture Notes in Informatics (October 2011)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kumari, P., Pretschner, A.: Deriving implementation-level policies for usage control enforcement. In: Proc. 2nd ACM Conf. on Data and Application Security and Privacy (2012)","DOI":"10.1145\/2133601.2133612"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Tech. rep., National Institute of Standards and Technology (September 2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proc. 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61\u201366 (2010)","DOI":"10.1145\/1878431.1878446"},{"key":"7_CR17","unstructured":"National Energy Technology Laboratory for the U.S. Department of Energy: Advanced Metering Infrastructure. Tech. rep., U.S. Department of Energy (February 2008)"},{"key":"7_CR18","unstructured":"Ockwell, G.: The DOE\u2019s \u201c7 Traits of a Smart Grid\u201d. Fortnightly\u2019s Spark (October 2009)"},{"issue":"1","key":"7_CR19","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur.\u00a07(1), 128\u2013174 (2004), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/984334.984339","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7_CR20","unstructured":"Pretschner, A.: An Overview of Distributed Usage Control. In: Proc. 2nd Conf. Knowledge Engineering: Principles and Techniques, Romania (July 2009)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for Usage Control. In: Proc. 2008 ACM Symposium on Information, Computer and Communications Security, pp. 240\u2013244 (March 2008)","DOI":"10.1145\/1368310.1368344"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-28879-1_9","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"A. Pretschner","year":"2012","unstructured":"Pretschner, A., Lovat, E., B\u00fcchler, M.: Representation-Independent Data Usage Control. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol.\u00a07122, pp. 122\u2013140. Springer, Heidelberg (2012)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Quinn, E.L.: Smart Metering & Privacy: Existing Law and Competting Policies. Tech. Rep., Colorado Public Utilities Commission (2009)","DOI":"10.2139\/ssrn.1462285"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Rusitschka, S., Eger, K., Gerdes, C.: Smart Grid Data Cloud: A Model for Utilizing Cloud Computing in the Smart Grid Domain. In: First IEEE International Conference on Smart Grid Communications, pp. 483\u2013488 (October 2010)","DOI":"10.1109\/SMARTGRID.2010.5622089"},{"key":"7_CR25","unstructured":"Simmhan, Y., Aman, S., Cao, B., Giakkoupis, M., Kumbhare, A., Zhou, Q., Paul, D., Fern, C., Sharma, A., Prasanna, V.: An Informatics Approach to Demand Response Optimization in Smart Grids. Tech. rep. (2011)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications\u00a034(1) (2011)","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"7_CR27","unstructured":"Wetzel, D.: Ende der Subventionen (September 2011), \n                    \n                      http:\/\/www.welt.de\/print\/die_welt\/wirtschaft\/article13603359\/Ende-der-Subventionen.html"}],"container-title":["Lecture Notes in Computer Science","Smart Grid Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38030-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T23:49:24Z","timestamp":1557618564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38030-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380297","9783642380303"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38030-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}