{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:58:56Z","timestamp":1729627136534,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1109\/isgt.2013.6497900","type":"proceedings-article","created":{"date-parts":[[2013,4,15]],"date-time":"2013-04-15T20:14:44Z","timestamp":1366056884000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Providing security to a smart grid prosumer system based on a service oriented architecture in an office environment"],"prefix":"10.1109","author":[{"given":"A.","family":"Camek","sequence":"first","affiliation":[]},{"given":"F.","family":"Holzl","sequence":"additional","affiliation":[]},{"given":"D.","family":"Bytschkow","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"dutertre","journal-title":"The Yices SMT Solver","key":"17"},{"year":"2012","author":"cito","journal-title":"Design and Implementation of A Right and Role Management System for the Fortiss Smart Energy Living Lab","key":"15"},{"year":"2002","author":"ramachandran","journal-title":"Designing Security Architecture Solutions","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/MIC.2004.54"},{"key":"14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/238168.238177","article-title":"Unified login with pluggable authentication modules (PAM)","author":"samar","year":"1996","journal-title":"Proceedings of the 3rd ACM Conference on Computer and Communications Security Ser CCS '96"},{"key":"11","first-page":"251","article-title":"Format-preserving encryption","volume":"2009","author":"bellare","year":"2009","journal-title":"IACR Cryptology ePrint Archive"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-77","author":"frankel","year":"2005","journal-title":"Sp 800-77 Guide to IPsec VPNs"},{"year":"2008","author":"anderson","journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems","key":"3"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.2172\/751004"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/SE4SG.2012.6225710"},{"year":"0","key":"10"},{"key":"7","article-title":"Attack trees: Modeling security threats","author":"schneier","year":"1999","journal-title":"Dr Dobb's Journal"},{"year":"2004","author":"schneier","journal-title":"Secrets and Lies-digital Security in A Networked World With New Information about post-9\/11 Security","key":"6"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.21236\/ADA443493","author":"mead","year":"2005","journal-title":"Security Quality Requirements Engineering"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/SMFG.2011.6125758"},{"year":"0","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/RFID.2009.4911182"}],"event":{"name":"2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2013)","start":{"date-parts":[[2013,2,24]]},"location":"Washington, DC","end":{"date-parts":[[2013,2,27]]}},"container-title":["2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6490106\/6497783\/06497900.pdf?arnumber=6497900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T11:24:27Z","timestamp":1595676267000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6497900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isgt.2013.6497900","relation":{},"subject":[],"published":{"date-parts":[[2013,2]]}}}